Sep 13 01:34:56.028021 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Sep 13 01:34:56.028040 kernel: Linux version 5.15.192-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Sep 12 23:05:37 -00 2025 Sep 13 01:34:56.028048 kernel: earlycon: pl11 at MMIO 0x00000000effec000 (options '') Sep 13 01:34:56.028055 kernel: printk: bootconsole [pl11] enabled Sep 13 01:34:56.028063 kernel: efi: EFI v2.70 by EDK II Sep 13 01:34:56.028069 kernel: efi: ACPI 2.0=0x3fd5f018 SMBIOS=0x3e580000 SMBIOS 3.0=0x3e560000 MEMATTR=0x3f214018 RNG=0x3fd5f998 MEMRESERVE=0x3761cf98 Sep 13 01:34:56.028076 kernel: random: crng init done Sep 13 01:34:56.028082 kernel: ACPI: Early table checksum verification disabled Sep 13 01:34:56.028087 kernel: ACPI: RSDP 0x000000003FD5F018 000024 (v02 VRTUAL) Sep 13 01:34:56.028092 kernel: ACPI: XSDT 0x000000003FD5FF18 00006C (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 01:34:56.028098 kernel: ACPI: FACP 0x000000003FD5FC18 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 01:34:56.028103 kernel: ACPI: DSDT 0x000000003FD41018 01DFCD (v02 MSFTVM DSDT01 00000001 INTL 20230628) Sep 13 01:34:56.028112 kernel: ACPI: DBG2 0x000000003FD5FB18 000072 (v00 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 01:34:56.028118 kernel: ACPI: GTDT 0x000000003FD5FD98 000060 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 01:34:56.028125 kernel: ACPI: OEM0 0x000000003FD5F098 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 01:34:56.028130 kernel: ACPI: SPCR 0x000000003FD5FA98 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 01:34:56.028136 kernel: ACPI: APIC 0x000000003FD5F818 0000FC (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 01:34:56.028143 kernel: ACPI: SRAT 0x000000003FD5F198 000234 (v03 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 01:34:56.028149 kernel: ACPI: PPTT 0x000000003FD5F418 000120 (v01 VRTUAL MICROSFT 00000000 MSFT 00000000) Sep 13 01:34:56.028155 kernel: ACPI: BGRT 0x000000003FD5FE98 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 01:34:56.028163 kernel: ACPI: SPCR: console: pl011,mmio32,0xeffec000,115200 Sep 13 01:34:56.028168 kernel: NUMA: Failed to initialise from firmware Sep 13 01:34:56.028174 kernel: NUMA: Faking a node at [mem 0x0000000000000000-0x00000001bfffffff] Sep 13 01:34:56.028180 kernel: NUMA: NODE_DATA [mem 0x1bf7f2900-0x1bf7f7fff] Sep 13 01:34:56.028186 kernel: Zone ranges: Sep 13 01:34:56.028191 kernel: DMA [mem 0x0000000000000000-0x00000000ffffffff] Sep 13 01:34:56.028197 kernel: DMA32 empty Sep 13 01:34:56.028202 kernel: Normal [mem 0x0000000100000000-0x00000001bfffffff] Sep 13 01:34:56.028209 kernel: Movable zone start for each node Sep 13 01:34:56.028215 kernel: Early memory node ranges Sep 13 01:34:56.028223 kernel: node 0: [mem 0x0000000000000000-0x00000000007fffff] Sep 13 01:34:56.028229 kernel: node 0: [mem 0x0000000000824000-0x000000003e54ffff] Sep 13 01:34:56.028235 kernel: node 0: [mem 0x000000003e550000-0x000000003e87ffff] Sep 13 01:34:56.028240 kernel: node 0: [mem 0x000000003e880000-0x000000003fc7ffff] Sep 13 01:34:56.028246 kernel: node 0: [mem 0x000000003fc80000-0x000000003fcfffff] Sep 13 01:34:56.028251 kernel: node 0: [mem 0x000000003fd00000-0x000000003fffffff] Sep 13 01:34:56.028257 kernel: node 0: [mem 0x0000000100000000-0x00000001bfffffff] Sep 13 01:34:56.028262 kernel: Initmem setup node 0 [mem 0x0000000000000000-0x00000001bfffffff] Sep 13 01:34:56.028268 kernel: On node 0, zone DMA: 36 pages in unavailable ranges Sep 13 01:34:56.028274 kernel: psci: probing for conduit method from ACPI. Sep 13 01:34:56.028283 kernel: psci: PSCIv1.1 detected in firmware. Sep 13 01:34:56.028291 kernel: psci: Using standard PSCI v0.2 function IDs Sep 13 01:34:56.028297 kernel: psci: MIGRATE_INFO_TYPE not supported. Sep 13 01:34:56.028303 kernel: psci: SMC Calling Convention v1.4 Sep 13 01:34:56.028309 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x0 -> Node -1 Sep 13 01:34:56.028316 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1 -> Node -1 Sep 13 01:34:56.028322 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 Sep 13 01:34:56.028328 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 Sep 13 01:34:56.028337 kernel: pcpu-alloc: [0] 0 [0] 1 Sep 13 01:34:56.028343 kernel: Detected PIPT I-cache on CPU0 Sep 13 01:34:56.028349 kernel: CPU features: detected: GIC system register CPU interface Sep 13 01:34:56.028355 kernel: CPU features: detected: Hardware dirty bit management Sep 13 01:34:56.028361 kernel: CPU features: detected: Spectre-BHB Sep 13 01:34:56.028367 kernel: CPU features: kernel page table isolation forced ON by KASLR Sep 13 01:34:56.028373 kernel: CPU features: detected: Kernel page table isolation (KPTI) Sep 13 01:34:56.028380 kernel: CPU features: detected: ARM erratum 1418040 Sep 13 01:34:56.028387 kernel: CPU features: detected: ARM erratum 1542419 (kernel portion) Sep 13 01:34:56.028393 kernel: CPU features: detected: SSBS not fully self-synchronizing Sep 13 01:34:56.028399 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1032156 Sep 13 01:34:56.028406 kernel: Policy zone: Normal Sep 13 01:34:56.028413 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=563df7b8a9b19b8c496587ae06f3c3ec1604a5105c3a3f313c9ccaa21d8055ca Sep 13 01:34:56.028420 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Sep 13 01:34:56.028426 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Sep 13 01:34:56.028435 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Sep 13 01:34:56.028441 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Sep 13 01:34:56.028447 kernel: software IO TLB: mapped [mem 0x000000003a550000-0x000000003e550000] (64MB) Sep 13 01:34:56.028453 kernel: Memory: 3986876K/4194160K available (9792K kernel code, 2094K rwdata, 7592K rodata, 36416K init, 777K bss, 207284K reserved, 0K cma-reserved) Sep 13 01:34:56.028460 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Sep 13 01:34:56.028477 kernel: trace event string verifier disabled Sep 13 01:34:56.028483 kernel: rcu: Preemptible hierarchical RCU implementation. Sep 13 01:34:56.028490 kernel: rcu: RCU event tracing is enabled. Sep 13 01:34:56.028496 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Sep 13 01:34:56.028502 kernel: Trampoline variant of Tasks RCU enabled. Sep 13 01:34:56.028511 kernel: Tracing variant of Tasks RCU enabled. Sep 13 01:34:56.028518 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Sep 13 01:34:56.028524 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Sep 13 01:34:56.028530 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Sep 13 01:34:56.028536 kernel: GICv3: 960 SPIs implemented Sep 13 01:34:56.028544 kernel: GICv3: 0 Extended SPIs implemented Sep 13 01:34:56.028551 kernel: GICv3: Distributor has no Range Selector support Sep 13 01:34:56.028557 kernel: Root IRQ handler: gic_handle_irq Sep 13 01:34:56.028563 kernel: GICv3: 16 PPIs implemented Sep 13 01:34:56.028569 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000effee000 Sep 13 01:34:56.028575 kernel: ITS: No ITS available, not enabling LPIs Sep 13 01:34:56.028581 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Sep 13 01:34:56.028588 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Sep 13 01:34:56.028594 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Sep 13 01:34:56.028600 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Sep 13 01:34:56.028606 kernel: Console: colour dummy device 80x25 Sep 13 01:34:56.028618 kernel: printk: console [tty1] enabled Sep 13 01:34:56.028624 kernel: ACPI: Core revision 20210730 Sep 13 01:34:56.028631 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Sep 13 01:34:56.028638 kernel: pid_max: default: 32768 minimum: 301 Sep 13 01:34:56.028644 kernel: LSM: Security Framework initializing Sep 13 01:34:56.028650 kernel: SELinux: Initializing. Sep 13 01:34:56.028656 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Sep 13 01:34:56.028663 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Sep 13 01:34:56.028670 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3a8030, hints 0xe, misc 0x31e1 Sep 13 01:34:56.028677 kernel: Hyper-V: Host Build 10.0.22477.1619-1-0 Sep 13 01:34:56.028684 kernel: rcu: Hierarchical SRCU implementation. Sep 13 01:34:56.028690 kernel: Remapping and enabling EFI services. Sep 13 01:34:56.028699 kernel: smp: Bringing up secondary CPUs ... Sep 13 01:34:56.028706 kernel: Detected PIPT I-cache on CPU1 Sep 13 01:34:56.028712 kernel: GICv3: CPU1: found redistributor 1 region 1:0x00000000f000e000 Sep 13 01:34:56.028718 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Sep 13 01:34:56.028725 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Sep 13 01:34:56.028731 kernel: smp: Brought up 1 node, 2 CPUs Sep 13 01:34:56.028737 kernel: SMP: Total of 2 processors activated. Sep 13 01:34:56.028745 kernel: CPU features: detected: 32-bit EL0 Support Sep 13 01:34:56.028752 kernel: CPU features: detected: Instruction cache invalidation not required for I/D coherence Sep 13 01:34:56.028758 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Sep 13 01:34:56.028764 kernel: CPU features: detected: CRC32 instructions Sep 13 01:34:56.028771 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Sep 13 01:34:56.028780 kernel: CPU features: detected: LSE atomic instructions Sep 13 01:34:56.028786 kernel: CPU features: detected: Privileged Access Never Sep 13 01:34:56.028793 kernel: CPU: All CPU(s) started at EL1 Sep 13 01:34:56.028799 kernel: alternatives: patching kernel code Sep 13 01:34:56.028806 kernel: devtmpfs: initialized Sep 13 01:34:56.028817 kernel: KASLR enabled Sep 13 01:34:56.028823 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Sep 13 01:34:56.028831 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Sep 13 01:34:56.028840 kernel: pinctrl core: initialized pinctrl subsystem Sep 13 01:34:56.028847 kernel: SMBIOS 3.1.0 present. Sep 13 01:34:56.028854 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 09/28/2024 Sep 13 01:34:56.028861 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Sep 13 01:34:56.028867 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Sep 13 01:34:56.028875 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Sep 13 01:34:56.028882 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Sep 13 01:34:56.028889 kernel: audit: initializing netlink subsys (disabled) Sep 13 01:34:56.028898 kernel: audit: type=2000 audit(0.086:1): state=initialized audit_enabled=0 res=1 Sep 13 01:34:56.028904 kernel: thermal_sys: Registered thermal governor 'step_wise' Sep 13 01:34:56.028910 kernel: cpuidle: using governor menu Sep 13 01:34:56.028917 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Sep 13 01:34:56.028925 kernel: ASID allocator initialised with 32768 entries Sep 13 01:34:56.028931 kernel: ACPI: bus type PCI registered Sep 13 01:34:56.028938 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Sep 13 01:34:56.028944 kernel: Serial: AMBA PL011 UART driver Sep 13 01:34:56.028954 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Sep 13 01:34:56.028961 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Sep 13 01:34:56.028967 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Sep 13 01:34:56.028974 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Sep 13 01:34:56.028980 kernel: cryptd: max_cpu_qlen set to 1000 Sep 13 01:34:56.028988 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Sep 13 01:34:56.028995 kernel: ACPI: Added _OSI(Module Device) Sep 13 01:34:56.029004 kernel: ACPI: Added _OSI(Processor Device) Sep 13 01:34:56.029011 kernel: ACPI: Added _OSI(Processor Aggregator Device) Sep 13 01:34:56.029017 kernel: ACPI: Added _OSI(Linux-Dell-Video) Sep 13 01:34:56.029024 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Sep 13 01:34:56.029030 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Sep 13 01:34:56.029037 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Sep 13 01:34:56.029046 kernel: ACPI: Interpreter enabled Sep 13 01:34:56.029054 kernel: ACPI: Using GIC for interrupt routing Sep 13 01:34:56.029066 kernel: ARMH0011:00: ttyAMA0 at MMIO 0xeffec000 (irq = 12, base_baud = 0) is a SBSA Sep 13 01:34:56.029073 kernel: printk: console [ttyAMA0] enabled Sep 13 01:34:56.029079 kernel: printk: bootconsole [pl11] disabled Sep 13 01:34:56.029086 kernel: ARMH0011:01: ttyAMA1 at MMIO 0xeffeb000 (irq = 13, base_baud = 0) is a SBSA Sep 13 01:34:56.029093 kernel: iommu: Default domain type: Translated Sep 13 01:34:56.029100 kernel: iommu: DMA domain TLB invalidation policy: strict mode Sep 13 01:34:56.029106 kernel: vgaarb: loaded Sep 13 01:34:56.029113 kernel: pps_core: LinuxPPS API ver. 1 registered Sep 13 01:34:56.029123 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Sep 13 01:34:56.029131 kernel: PTP clock support registered Sep 13 01:34:56.029137 kernel: Registered efivars operations Sep 13 01:34:56.029144 kernel: No ACPI PMU IRQ for CPU0 Sep 13 01:34:56.029151 kernel: No ACPI PMU IRQ for CPU1 Sep 13 01:34:56.029157 kernel: clocksource: Switched to clocksource arch_sys_counter Sep 13 01:34:56.029166 kernel: VFS: Disk quotas dquot_6.6.0 Sep 13 01:34:56.029173 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Sep 13 01:34:56.029180 kernel: pnp: PnP ACPI init Sep 13 01:34:56.029186 kernel: pnp: PnP ACPI: found 0 devices Sep 13 01:34:56.029194 kernel: NET: Registered PF_INET protocol family Sep 13 01:34:56.029200 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Sep 13 01:34:56.029210 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Sep 13 01:34:56.029216 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Sep 13 01:34:56.029223 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Sep 13 01:34:56.029230 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Sep 13 01:34:56.029236 kernel: TCP: Hash tables configured (established 32768 bind 32768) Sep 13 01:34:56.029243 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Sep 13 01:34:56.029253 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Sep 13 01:34:56.029260 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Sep 13 01:34:56.029267 kernel: PCI: CLS 0 bytes, default 64 Sep 13 01:34:56.029273 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 1 counters available Sep 13 01:34:56.029279 kernel: kvm [1]: HYP mode not available Sep 13 01:34:56.029286 kernel: Initialise system trusted keyrings Sep 13 01:34:56.029293 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Sep 13 01:34:56.029302 kernel: Key type asymmetric registered Sep 13 01:34:56.029308 kernel: Asymmetric key parser 'x509' registered Sep 13 01:34:56.029316 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Sep 13 01:34:56.029323 kernel: io scheduler mq-deadline registered Sep 13 01:34:56.029329 kernel: io scheduler kyber registered Sep 13 01:34:56.029336 kernel: io scheduler bfq registered Sep 13 01:34:56.029343 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Sep 13 01:34:56.029352 kernel: thunder_xcv, ver 1.0 Sep 13 01:34:56.029359 kernel: thunder_bgx, ver 1.0 Sep 13 01:34:56.029365 kernel: nicpf, ver 1.0 Sep 13 01:34:56.029372 kernel: nicvf, ver 1.0 Sep 13 01:34:56.029508 kernel: rtc-efi rtc-efi.0: registered as rtc0 Sep 13 01:34:56.029572 kernel: rtc-efi rtc-efi.0: setting system clock to 2025-09-13T01:34:55 UTC (1757727295) Sep 13 01:34:56.029582 kernel: efifb: probing for efifb Sep 13 01:34:56.029588 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Sep 13 01:34:56.029595 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Sep 13 01:34:56.029601 kernel: efifb: scrolling: redraw Sep 13 01:34:56.029608 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Sep 13 01:34:56.029615 kernel: Console: switching to colour frame buffer device 128x48 Sep 13 01:34:56.029623 kernel: fb0: EFI VGA frame buffer device Sep 13 01:34:56.029630 kernel: SMCCC: SOC_ID: ARCH_SOC_ID not implemented, skipping .... Sep 13 01:34:56.029636 kernel: hid: raw HID events driver (C) Jiri Kosina Sep 13 01:34:56.029643 kernel: NET: Registered PF_INET6 protocol family Sep 13 01:34:56.029649 kernel: Segment Routing with IPv6 Sep 13 01:34:56.029656 kernel: In-situ OAM (IOAM) with IPv6 Sep 13 01:34:56.029662 kernel: NET: Registered PF_PACKET protocol family Sep 13 01:34:56.029669 kernel: Key type dns_resolver registered Sep 13 01:34:56.029675 kernel: registered taskstats version 1 Sep 13 01:34:56.029682 kernel: Loading compiled-in X.509 certificates Sep 13 01:34:56.029690 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.192-flatcar: 47ac98e9306f36eebe4291d409359a5a5d0c2b9c' Sep 13 01:34:56.029697 kernel: Key type .fscrypt registered Sep 13 01:34:56.029703 kernel: Key type fscrypt-provisioning registered Sep 13 01:34:56.029710 kernel: ima: No TPM chip found, activating TPM-bypass! Sep 13 01:34:56.029716 kernel: ima: Allocated hash algorithm: sha1 Sep 13 01:34:56.029723 kernel: ima: No architecture policies found Sep 13 01:34:56.029729 kernel: clk: Disabling unused clocks Sep 13 01:34:56.029736 kernel: Freeing unused kernel memory: 36416K Sep 13 01:34:56.029744 kernel: Run /init as init process Sep 13 01:34:56.029750 kernel: with arguments: Sep 13 01:34:56.029757 kernel: /init Sep 13 01:34:56.029763 kernel: with environment: Sep 13 01:34:56.029769 kernel: HOME=/ Sep 13 01:34:56.029775 kernel: TERM=linux Sep 13 01:34:56.029782 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Sep 13 01:34:56.029790 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 13 01:34:56.029800 systemd[1]: Detected virtualization microsoft. Sep 13 01:34:56.029808 systemd[1]: Detected architecture arm64. Sep 13 01:34:56.029814 systemd[1]: Running in initrd. Sep 13 01:34:56.029821 systemd[1]: No hostname configured, using default hostname. Sep 13 01:34:56.029828 systemd[1]: Hostname set to . Sep 13 01:34:56.029836 systemd[1]: Initializing machine ID from random generator. Sep 13 01:34:56.029842 systemd[1]: Queued start job for default target initrd.target. Sep 13 01:34:56.029849 systemd[1]: Started systemd-ask-password-console.path. Sep 13 01:34:56.029857 systemd[1]: Reached target cryptsetup.target. Sep 13 01:34:56.029864 systemd[1]: Reached target paths.target. Sep 13 01:34:56.029871 systemd[1]: Reached target slices.target. Sep 13 01:34:56.029878 systemd[1]: Reached target swap.target. Sep 13 01:34:56.029885 systemd[1]: Reached target timers.target. Sep 13 01:34:56.029892 systemd[1]: Listening on iscsid.socket. Sep 13 01:34:56.029899 systemd[1]: Listening on iscsiuio.socket. Sep 13 01:34:56.029906 systemd[1]: Listening on systemd-journald-audit.socket. Sep 13 01:34:56.029914 systemd[1]: Listening on systemd-journald-dev-log.socket. Sep 13 01:34:56.029922 systemd[1]: Listening on systemd-journald.socket. Sep 13 01:34:56.029929 systemd[1]: Listening on systemd-networkd.socket. Sep 13 01:34:56.029936 systemd[1]: Listening on systemd-udevd-control.socket. Sep 13 01:34:56.029943 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 13 01:34:56.029950 systemd[1]: Reached target sockets.target. Sep 13 01:34:56.029957 systemd[1]: Starting kmod-static-nodes.service... Sep 13 01:34:56.029964 systemd[1]: Finished network-cleanup.service. Sep 13 01:34:56.029971 systemd[1]: Starting systemd-fsck-usr.service... Sep 13 01:34:56.029979 systemd[1]: Starting systemd-journald.service... Sep 13 01:34:56.029986 systemd[1]: Starting systemd-modules-load.service... Sep 13 01:34:56.029993 systemd[1]: Starting systemd-resolved.service... Sep 13 01:34:56.030000 systemd[1]: Starting systemd-vconsole-setup.service... Sep 13 01:34:56.030011 systemd-journald[276]: Journal started Sep 13 01:34:56.030048 systemd-journald[276]: Runtime Journal (/run/log/journal/0dfecd8ee6844d60ac3ade32806f943e) is 8.0M, max 78.5M, 70.5M free. Sep 13 01:34:56.013824 systemd-modules-load[277]: Inserted module 'overlay' Sep 13 01:34:56.054459 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Sep 13 01:34:56.062771 systemd-modules-load[277]: Inserted module 'br_netfilter' Sep 13 01:34:56.072291 kernel: Bridge firewalling registered Sep 13 01:34:56.072314 systemd[1]: Started systemd-journald.service. Sep 13 01:34:56.072327 systemd-resolved[278]: Positive Trust Anchors: Sep 13 01:34:56.100731 kernel: audit: type=1130 audit(1757727296.083:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:56.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:56.072346 systemd-resolved[278]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 13 01:34:56.072373 systemd-resolved[278]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 13 01:34:56.172802 kernel: audit: type=1130 audit(1757727296.112:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:56.172829 kernel: SCSI subsystem initialized Sep 13 01:34:56.112000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:56.078101 systemd-resolved[278]: Defaulting to hostname 'linux'. Sep 13 01:34:56.100876 systemd[1]: Started systemd-resolved.service. Sep 13 01:34:56.244014 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Sep 13 01:34:56.244040 kernel: device-mapper: uevent: version 1.0.3 Sep 13 01:34:56.244049 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Sep 13 01:34:56.244058 kernel: audit: type=1130 audit(1757727296.203:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:56.244068 kernel: audit: type=1130 audit(1757727296.223:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:56.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:56.223000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:56.163845 systemd[1]: Finished kmod-static-nodes.service. Sep 13 01:34:56.270709 kernel: audit: type=1130 audit(1757727296.249:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:56.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:56.204209 systemd-modules-load[277]: Inserted module 'dm_multipath' Sep 13 01:34:56.204273 systemd[1]: Finished systemd-fsck-usr.service. Sep 13 01:34:56.306606 kernel: audit: type=1130 audit(1757727296.275:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:56.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:56.226118 systemd[1]: Finished systemd-modules-load.service. Sep 13 01:34:56.249715 systemd[1]: Finished systemd-vconsole-setup.service. Sep 13 01:34:56.275419 systemd[1]: Reached target nss-lookup.target. Sep 13 01:34:56.306504 systemd[1]: Starting dracut-cmdline-ask.service... Sep 13 01:34:56.311405 systemd[1]: Starting systemd-sysctl.service... Sep 13 01:34:56.343878 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Sep 13 01:34:56.351234 systemd[1]: Finished dracut-cmdline-ask.service. Sep 13 01:34:56.359000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:56.384419 systemd[1]: Finished systemd-sysctl.service. Sep 13 01:34:56.389245 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Sep 13 01:34:56.417280 kernel: audit: type=1130 audit(1757727296.359:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:56.417303 kernel: audit: type=1130 audit(1757727296.388:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:56.388000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:56.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:56.434717 systemd[1]: Starting dracut-cmdline.service... Sep 13 01:34:56.439300 kernel: audit: type=1130 audit(1757727296.417:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:56.443970 dracut-cmdline[299]: dracut-dracut-053 Sep 13 01:34:56.447845 dracut-cmdline[299]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=563df7b8a9b19b8c496587ae06f3c3ec1604a5105c3a3f313c9ccaa21d8055ca Sep 13 01:34:56.506488 kernel: Loading iSCSI transport class v2.0-870. Sep 13 01:34:56.522491 kernel: iscsi: registered transport (tcp) Sep 13 01:34:56.543076 kernel: iscsi: registered transport (qla4xxx) Sep 13 01:34:56.543101 kernel: QLogic iSCSI HBA Driver Sep 13 01:34:56.572450 systemd[1]: Finished dracut-cmdline.service. Sep 13 01:34:56.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:56.577852 systemd[1]: Starting dracut-pre-udev.service... Sep 13 01:34:56.631486 kernel: raid6: neonx8 gen() 13814 MB/s Sep 13 01:34:56.651476 kernel: raid6: neonx8 xor() 10812 MB/s Sep 13 01:34:56.671489 kernel: raid6: neonx4 gen() 13530 MB/s Sep 13 01:34:56.692477 kernel: raid6: neonx4 xor() 11111 MB/s Sep 13 01:34:56.712475 kernel: raid6: neonx2 gen() 12960 MB/s Sep 13 01:34:56.732475 kernel: raid6: neonx2 xor() 10281 MB/s Sep 13 01:34:56.753485 kernel: raid6: neonx1 gen() 10467 MB/s Sep 13 01:34:56.773475 kernel: raid6: neonx1 xor() 8765 MB/s Sep 13 01:34:56.793515 kernel: raid6: int64x8 gen() 6270 MB/s Sep 13 01:34:56.814478 kernel: raid6: int64x8 xor() 3543 MB/s Sep 13 01:34:56.834475 kernel: raid6: int64x4 gen() 7250 MB/s Sep 13 01:34:56.854475 kernel: raid6: int64x4 xor() 3859 MB/s Sep 13 01:34:56.875475 kernel: raid6: int64x2 gen() 6150 MB/s Sep 13 01:34:56.895475 kernel: raid6: int64x2 xor() 3320 MB/s Sep 13 01:34:56.915475 kernel: raid6: int64x1 gen() 5050 MB/s Sep 13 01:34:56.940696 kernel: raid6: int64x1 xor() 2646 MB/s Sep 13 01:34:56.940733 kernel: raid6: using algorithm neonx8 gen() 13814 MB/s Sep 13 01:34:56.940750 kernel: raid6: .... xor() 10812 MB/s, rmw enabled Sep 13 01:34:56.945114 kernel: raid6: using neon recovery algorithm Sep 13 01:34:56.962482 kernel: xor: measuring software checksum speed Sep 13 01:34:56.970059 kernel: 8regs : 16165 MB/sec Sep 13 01:34:56.970069 kernel: 32regs : 20670 MB/sec Sep 13 01:34:56.973779 kernel: arm64_neon : 27719 MB/sec Sep 13 01:34:56.973788 kernel: xor: using function: arm64_neon (27719 MB/sec) Sep 13 01:34:57.034483 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Sep 13 01:34:57.043795 systemd[1]: Finished dracut-pre-udev.service. Sep 13 01:34:57.048000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:57.051000 audit: BPF prog-id=7 op=LOAD Sep 13 01:34:57.051000 audit: BPF prog-id=8 op=LOAD Sep 13 01:34:57.052682 systemd[1]: Starting systemd-udevd.service... Sep 13 01:34:57.067170 systemd-udevd[475]: Using default interface naming scheme 'v252'. Sep 13 01:34:57.073655 systemd[1]: Started systemd-udevd.service. Sep 13 01:34:57.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:57.085283 systemd[1]: Starting dracut-pre-trigger.service... Sep 13 01:34:57.099772 dracut-pre-trigger[496]: rd.md=0: removing MD RAID activation Sep 13 01:34:57.133087 systemd[1]: Finished dracut-pre-trigger.service. Sep 13 01:34:57.137000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:57.138406 systemd[1]: Starting systemd-udev-trigger.service... Sep 13 01:34:57.177435 systemd[1]: Finished systemd-udev-trigger.service. Sep 13 01:34:57.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:57.239499 kernel: hv_vmbus: Vmbus version:5.3 Sep 13 01:34:57.257496 kernel: hv_vmbus: registering driver hid_hyperv Sep 13 01:34:57.257544 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input0 Sep 13 01:34:57.274395 kernel: hid-generic 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Sep 13 01:34:57.274604 kernel: hv_vmbus: registering driver hv_netvsc Sep 13 01:34:57.274615 kernel: hv_vmbus: registering driver hyperv_keyboard Sep 13 01:34:57.295756 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/MSFT1000:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input1 Sep 13 01:34:57.295806 kernel: hv_vmbus: registering driver hv_storvsc Sep 13 01:34:57.303487 kernel: scsi host0: storvsc_host_t Sep 13 01:34:57.303679 kernel: scsi host1: storvsc_host_t Sep 13 01:34:57.314871 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Sep 13 01:34:57.322026 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Sep 13 01:34:57.349282 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Sep 13 01:34:57.377945 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Sep 13 01:34:57.378059 kernel: sd 0:0:0:0: [sda] Write Protect is off Sep 13 01:34:57.378136 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Sep 13 01:34:57.378214 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Sep 13 01:34:57.378292 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Sep 13 01:34:57.378301 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Sep 13 01:34:57.389938 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Sep 13 01:34:57.391224 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Sep 13 01:34:57.391243 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Sep 13 01:34:57.432488 kernel: hv_netvsc 000d3a06-7cd4-000d-3a06-7cd4000d3a06 eth0: VF slot 1 added Sep 13 01:34:57.441493 kernel: hv_vmbus: registering driver hv_pci Sep 13 01:34:57.451047 kernel: hv_pci 896664d6-1673-4442-952c-11929ad2c3d5: PCI VMBus probing: Using version 0x10004 Sep 13 01:34:57.748454 kernel: hv_pci 896664d6-1673-4442-952c-11929ad2c3d5: PCI host bridge to bus 1673:00 Sep 13 01:34:57.748589 kernel: pci_bus 1673:00: root bus resource [mem 0xfc0000000-0xfc00fffff window] Sep 13 01:34:57.748696 kernel: pci_bus 1673:00: No busn resource found for root bus, will use [bus 00-ff] Sep 13 01:34:57.748767 kernel: pci 1673:00:02.0: [15b3:1018] type 00 class 0x020000 Sep 13 01:34:57.748856 kernel: pci 1673:00:02.0: reg 0x10: [mem 0xfc0000000-0xfc00fffff 64bit pref] Sep 13 01:34:57.748932 kernel: pci 1673:00:02.0: enabling Extended Tags Sep 13 01:34:57.749007 kernel: pci 1673:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 1673:00:02.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) Sep 13 01:34:57.749084 kernel: pci_bus 1673:00: busn_res: [bus 00-ff] end is updated to 00 Sep 13 01:34:57.749154 kernel: pci 1673:00:02.0: BAR 0: assigned [mem 0xfc0000000-0xfc00fffff 64bit pref] Sep 13 01:34:57.787433 kernel: mlx5_core 1673:00:02.0: enabling device (0000 -> 0002) Sep 13 01:34:58.098004 kernel: mlx5_core 1673:00:02.0: firmware version: 16.31.2424 Sep 13 01:34:58.098119 kernel: mlx5_core 1673:00:02.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0) Sep 13 01:34:58.098197 kernel: hv_netvsc 000d3a06-7cd4-000d-3a06-7cd4000d3a06 eth0: VF registering: eth1 Sep 13 01:34:58.098282 kernel: mlx5_core 1673:00:02.0 eth1: joined to eth0 Sep 13 01:34:58.106486 kernel: mlx5_core 1673:00:02.0 enP5747s1: renamed from eth1 Sep 13 01:34:58.317490 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/sda6 scanned by (udev-worker) (538) Sep 13 01:34:58.328966 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Sep 13 01:34:58.345882 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 13 01:34:58.692871 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Sep 13 01:34:58.773153 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Sep 13 01:34:58.779046 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Sep 13 01:34:58.792411 systemd[1]: Starting disk-uuid.service... Sep 13 01:34:58.823491 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Sep 13 01:34:58.837536 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Sep 13 01:34:59.854349 disk-uuid[604]: The operation has completed successfully. Sep 13 01:34:59.859516 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Sep 13 01:34:59.926269 systemd[1]: disk-uuid.service: Deactivated successfully. Sep 13 01:34:59.928629 systemd[1]: Finished disk-uuid.service. Sep 13 01:34:59.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:59.935000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:59.940665 systemd[1]: Starting verity-setup.service... Sep 13 01:34:59.997499 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Sep 13 01:35:00.735011 systemd[1]: Found device dev-mapper-usr.device. Sep 13 01:35:00.740382 systemd[1]: Mounting sysusr-usr.mount... Sep 13 01:35:00.774283 kernel: kauditd_printk_skb: 9 callbacks suppressed Sep 13 01:35:00.774306 kernel: audit: type=1130 audit(1757727300.751:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:00.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:00.747691 systemd[1]: Finished verity-setup.service. Sep 13 01:35:00.838428 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Sep 13 01:35:00.834571 systemd[1]: Mounted sysusr-usr.mount. Sep 13 01:35:00.842709 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Sep 13 01:35:00.843530 systemd[1]: Starting ignition-setup.service... Sep 13 01:35:00.855709 systemd[1]: Starting parse-ip-for-networkd.service... Sep 13 01:35:00.893244 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Sep 13 01:35:00.893304 kernel: BTRFS info (device sda6): using free space tree Sep 13 01:35:00.898391 kernel: BTRFS info (device sda6): has skinny extents Sep 13 01:35:00.950393 systemd[1]: Finished parse-ip-for-networkd.service. Sep 13 01:35:00.954000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:00.982868 kernel: audit: type=1130 audit(1757727300.954:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:00.982921 kernel: audit: type=1334 audit(1757727300.976:22): prog-id=9 op=LOAD Sep 13 01:35:00.976000 audit: BPF prog-id=9 op=LOAD Sep 13 01:35:00.983118 systemd[1]: Starting systemd-networkd.service... Sep 13 01:35:01.005608 systemd-networkd[871]: lo: Link UP Sep 13 01:35:01.005619 systemd-networkd[871]: lo: Gained carrier Sep 13 01:35:01.006369 systemd-networkd[871]: Enumeration completed Sep 13 01:35:01.048893 kernel: audit: type=1130 audit(1757727301.018:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:01.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:01.009818 systemd-networkd[871]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 13 01:35:01.013784 systemd[1]: Started systemd-networkd.service. Sep 13 01:35:01.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:01.018956 systemd[1]: Reached target network.target. Sep 13 01:35:01.084640 kernel: audit: type=1130 audit(1757727301.060:24): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:01.045576 systemd[1]: Starting iscsiuio.service... Sep 13 01:35:01.050671 systemd[1]: Started iscsiuio.service. Sep 13 01:35:01.096045 iscsid[876]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Sep 13 01:35:01.096045 iscsid[876]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Sep 13 01:35:01.096045 iscsid[876]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Sep 13 01:35:01.096045 iscsid[876]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Sep 13 01:35:01.096045 iscsid[876]: If using hardware iscsi like qla4xxx this message can be ignored. Sep 13 01:35:01.096045 iscsid[876]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Sep 13 01:35:01.096045 iscsid[876]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Sep 13 01:35:01.217231 kernel: audit: type=1130 audit(1757727301.099:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:01.217261 kernel: audit: type=1130 audit(1757727301.181:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:01.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:01.181000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:01.084039 systemd[1]: Starting iscsid.service... Sep 13 01:35:01.092455 systemd[1]: Started iscsid.service. Sep 13 01:35:01.124570 systemd[1]: Starting dracut-initqueue.service... Sep 13 01:35:01.173954 systemd[1]: Finished dracut-initqueue.service. Sep 13 01:35:01.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:01.182370 systemd[1]: Reached target remote-fs-pre.target. Sep 13 01:35:01.275004 kernel: audit: type=1130 audit(1757727301.248:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:01.209476 systemd[1]: Reached target remote-cryptsetup.target. Sep 13 01:35:01.222343 systemd[1]: Reached target remote-fs.target. Sep 13 01:35:01.230857 systemd[1]: Starting dracut-pre-mount.service... Sep 13 01:35:01.243422 systemd[1]: Finished dracut-pre-mount.service. Sep 13 01:35:01.332428 kernel: mlx5_core 1673:00:02.0 enP5747s1: Link up Sep 13 01:35:01.332659 kernel: buffer_size[0]=0 is not enough for lossless buffer Sep 13 01:35:01.342390 systemd[1]: mnt-oem.mount: Deactivated successfully. Sep 13 01:35:01.423306 kernel: hv_netvsc 000d3a06-7cd4-000d-3a06-7cd4000d3a06 eth0: Data path switched to VF: enP5747s1 Sep 13 01:35:01.423504 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 01:35:01.423919 systemd-networkd[871]: enP5747s1: Link UP Sep 13 01:35:01.424121 systemd-networkd[871]: eth0: Link UP Sep 13 01:35:01.424510 systemd-networkd[871]: eth0: Gained carrier Sep 13 01:35:01.437970 systemd-networkd[871]: enP5747s1: Gained carrier Sep 13 01:35:01.454557 systemd-networkd[871]: eth0: DHCPv4 address 10.200.20.13/24, gateway 10.200.20.1 acquired from 168.63.129.16 Sep 13 01:35:01.588588 systemd[1]: Finished ignition-setup.service. Sep 13 01:35:01.616580 kernel: audit: type=1130 audit(1757727301.593:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:01.593000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:01.595083 systemd[1]: Starting ignition-fetch-offline.service... Sep 13 01:35:03.249633 systemd-networkd[871]: eth0: Gained IPv6LL Sep 13 01:35:08.290772 ignition[898]: Ignition 2.14.0 Sep 13 01:35:08.290785 ignition[898]: Stage: fetch-offline Sep 13 01:35:08.290852 ignition[898]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 01:35:08.290876 ignition[898]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 01:35:08.504973 ignition[898]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 01:35:08.505135 ignition[898]: parsed url from cmdline: "" Sep 13 01:35:08.505139 ignition[898]: no config URL provided Sep 13 01:35:08.527000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:08.505143 ignition[898]: reading system config file "/usr/lib/ignition/user.ign" Sep 13 01:35:08.556762 kernel: audit: type=1130 audit(1757727308.527:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:08.518387 systemd[1]: Finished ignition-fetch-offline.service. Sep 13 01:35:08.505152 ignition[898]: no config at "/usr/lib/ignition/user.ign" Sep 13 01:35:08.531369 systemd[1]: Starting ignition-fetch.service... Sep 13 01:35:08.505157 ignition[898]: failed to fetch config: resource requires networking Sep 13 01:35:08.505383 ignition[898]: Ignition finished successfully Sep 13 01:35:08.538891 ignition[904]: Ignition 2.14.0 Sep 13 01:35:08.538898 ignition[904]: Stage: fetch Sep 13 01:35:08.539014 ignition[904]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 01:35:08.539033 ignition[904]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 01:35:08.541731 ignition[904]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 01:35:08.541857 ignition[904]: parsed url from cmdline: "" Sep 13 01:35:08.541861 ignition[904]: no config URL provided Sep 13 01:35:08.541865 ignition[904]: reading system config file "/usr/lib/ignition/user.ign" Sep 13 01:35:08.541873 ignition[904]: no config at "/usr/lib/ignition/user.ign" Sep 13 01:35:08.541904 ignition[904]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Sep 13 01:35:08.636422 ignition[904]: GET result: OK Sep 13 01:35:08.636527 ignition[904]: config has been read from IMDS userdata Sep 13 01:35:08.638825 unknown[904]: fetched base config from "system" Sep 13 01:35:08.675237 kernel: audit: type=1130 audit(1757727308.649:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:08.649000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:08.636544 ignition[904]: parsing config with SHA512: 177594609cef0724949379ceb2b6f2d9e9faceca9cd212bbef218eadc0bbe1d2fd8a91954fd37009b6e483cd733f9028228c64e58e9c117734f0bcffd9847614 Sep 13 01:35:08.638833 unknown[904]: fetched base config from "system" Sep 13 01:35:08.639193 ignition[904]: fetch: fetch complete Sep 13 01:35:08.638838 unknown[904]: fetched user config from "azure" Sep 13 01:35:08.639198 ignition[904]: fetch: fetch passed Sep 13 01:35:08.640459 systemd[1]: Finished ignition-fetch.service. Sep 13 01:35:08.719652 kernel: audit: type=1130 audit(1757727308.696:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:08.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:08.639237 ignition[904]: Ignition finished successfully Sep 13 01:35:08.650742 systemd[1]: Starting ignition-kargs.service... Sep 13 01:35:08.752575 kernel: audit: type=1130 audit(1757727308.732:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:08.732000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:08.681332 ignition[911]: Ignition 2.14.0 Sep 13 01:35:08.692802 systemd[1]: Finished ignition-kargs.service. Sep 13 01:35:08.681339 ignition[911]: Stage: kargs Sep 13 01:35:08.698089 systemd[1]: Starting ignition-disks.service... Sep 13 01:35:08.681479 ignition[911]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 01:35:08.728335 systemd[1]: Finished ignition-disks.service. Sep 13 01:35:08.681503 ignition[911]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 01:35:08.733030 systemd[1]: Reached target initrd-root-device.target. Sep 13 01:35:08.684647 ignition[911]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 01:35:08.758796 systemd[1]: Reached target local-fs-pre.target. Sep 13 01:35:08.689564 ignition[911]: kargs: kargs passed Sep 13 01:35:08.766373 systemd[1]: Reached target local-fs.target. Sep 13 01:35:08.689635 ignition[911]: Ignition finished successfully Sep 13 01:35:08.774959 systemd[1]: Reached target sysinit.target. Sep 13 01:35:08.708036 ignition[917]: Ignition 2.14.0 Sep 13 01:35:08.781921 systemd[1]: Reached target basic.target. Sep 13 01:35:08.708043 ignition[917]: Stage: disks Sep 13 01:35:08.791800 systemd[1]: Starting systemd-fsck-root.service... Sep 13 01:35:08.708158 ignition[917]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 01:35:08.708176 ignition[917]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 01:35:08.710872 ignition[917]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 01:35:08.720747 ignition[917]: disks: disks passed Sep 13 01:35:08.720798 ignition[917]: Ignition finished successfully Sep 13 01:35:08.921946 systemd-fsck[925]: ROOT: clean, 629/7326000 files, 481083/7359488 blocks Sep 13 01:35:08.929507 systemd[1]: Finished systemd-fsck-root.service. Sep 13 01:35:08.957028 kernel: audit: type=1130 audit(1757727308.934:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:08.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:08.935433 systemd[1]: Mounting sysroot.mount... Sep 13 01:35:08.978495 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Sep 13 01:35:08.979100 systemd[1]: Mounted sysroot.mount. Sep 13 01:35:08.987134 systemd[1]: Reached target initrd-root-fs.target. Sep 13 01:35:09.057579 systemd[1]: Mounting sysroot-usr.mount... Sep 13 01:35:09.062451 systemd[1]: Starting flatcar-metadata-hostname.service... Sep 13 01:35:09.070042 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Sep 13 01:35:09.070084 systemd[1]: Reached target ignition-diskful.target. Sep 13 01:35:09.081366 systemd[1]: Mounted sysroot-usr.mount. Sep 13 01:35:09.219368 systemd[1]: Mounting sysroot-usr-share-oem.mount... Sep 13 01:35:09.224923 systemd[1]: Starting initrd-setup-root.service... Sep 13 01:35:09.250493 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/sda6 scanned by mount (936) Sep 13 01:35:09.263369 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Sep 13 01:35:09.263417 kernel: BTRFS info (device sda6): using free space tree Sep 13 01:35:09.268160 kernel: BTRFS info (device sda6): has skinny extents Sep 13 01:35:09.274971 initrd-setup-root[941]: cut: /sysroot/etc/passwd: No such file or directory Sep 13 01:35:09.284200 systemd[1]: Mounted sysroot-usr-share-oem.mount. Sep 13 01:35:09.350052 initrd-setup-root[967]: cut: /sysroot/etc/group: No such file or directory Sep 13 01:35:09.393689 initrd-setup-root[975]: cut: /sysroot/etc/shadow: No such file or directory Sep 13 01:35:09.432691 initrd-setup-root[983]: cut: /sysroot/etc/gshadow: No such file or directory Sep 13 01:35:10.814503 systemd[1]: Finished initrd-setup-root.service. Sep 13 01:35:10.842195 kernel: audit: type=1130 audit(1757727310.819:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:10.819000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:10.824589 systemd[1]: Starting ignition-mount.service... Sep 13 01:35:10.846507 systemd[1]: Starting sysroot-boot.service... Sep 13 01:35:10.859605 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Sep 13 01:35:10.859735 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Sep 13 01:35:10.887540 systemd[1]: Finished sysroot-boot.service. Sep 13 01:35:10.891000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:10.911488 kernel: audit: type=1130 audit(1757727310.891:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:11.347188 ignition[1006]: INFO : Ignition 2.14.0 Sep 13 01:35:11.347188 ignition[1006]: INFO : Stage: mount Sep 13 01:35:11.359000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:11.378267 ignition[1006]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 01:35:11.378267 ignition[1006]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 01:35:11.378267 ignition[1006]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 01:35:11.378267 ignition[1006]: INFO : mount: mount passed Sep 13 01:35:11.378267 ignition[1006]: INFO : Ignition finished successfully Sep 13 01:35:11.417079 kernel: audit: type=1130 audit(1757727311.359:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:11.355586 systemd[1]: Finished ignition-mount.service. Sep 13 01:35:12.234594 coreos-metadata[935]: Sep 13 01:35:12.234 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Sep 13 01:35:12.245859 coreos-metadata[935]: Sep 13 01:35:12.245 INFO Fetch successful Sep 13 01:35:12.279796 coreos-metadata[935]: Sep 13 01:35:12.279 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Sep 13 01:35:12.292271 coreos-metadata[935]: Sep 13 01:35:12.290 INFO Fetch successful Sep 13 01:35:12.329484 coreos-metadata[935]: Sep 13 01:35:12.329 INFO wrote hostname ci-3510.3.8-n-94f5c418a3 to /sysroot/etc/hostname Sep 13 01:35:12.340586 systemd[1]: Finished flatcar-metadata-hostname.service. Sep 13 01:35:12.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:12.346767 systemd[1]: Starting ignition-files.service... Sep 13 01:35:12.373800 kernel: audit: type=1130 audit(1757727312.345:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:12.373123 systemd[1]: Mounting sysroot-usr-share-oem.mount... Sep 13 01:35:12.400487 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by mount (1014) Sep 13 01:35:12.415120 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Sep 13 01:35:12.415174 kernel: BTRFS info (device sda6): using free space tree Sep 13 01:35:12.415186 kernel: BTRFS info (device sda6): has skinny extents Sep 13 01:35:12.429906 systemd[1]: Mounted sysroot-usr-share-oem.mount. Sep 13 01:35:12.443571 ignition[1033]: INFO : Ignition 2.14.0 Sep 13 01:35:12.443571 ignition[1033]: INFO : Stage: files Sep 13 01:35:12.452539 ignition[1033]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 01:35:12.452539 ignition[1033]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 01:35:12.452539 ignition[1033]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 01:35:12.452539 ignition[1033]: DEBUG : files: compiled without relabeling support, skipping Sep 13 01:35:12.484623 ignition[1033]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Sep 13 01:35:12.484623 ignition[1033]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Sep 13 01:35:12.645956 ignition[1033]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Sep 13 01:35:12.653989 ignition[1033]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Sep 13 01:35:12.683861 unknown[1033]: wrote ssh authorized keys file for user: core Sep 13 01:35:12.689412 ignition[1033]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Sep 13 01:35:12.713954 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Sep 13 01:35:12.723796 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Sep 13 01:35:12.749223 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Sep 13 01:35:12.758860 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Sep 13 01:35:12.758860 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-arm64.raw" Sep 13 01:35:12.758860 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-arm64.raw" Sep 13 01:35:12.796224 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Sep 13 01:35:12.796224 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(6): oem config not found in "/usr/share/oem", looking on oem partition Sep 13 01:35:12.796224 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3086674593" Sep 13 01:35:12.796224 ignition[1033]: CRITICAL : files: createFilesystemsFiles: createFiles: op(6): op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3086674593": device or resource busy Sep 13 01:35:12.796224 ignition[1033]: ERROR : files: createFilesystemsFiles: createFiles: op(6): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3086674593", trying btrfs: device or resource busy Sep 13 01:35:12.796224 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3086674593" Sep 13 01:35:12.796224 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3086674593" Sep 13 01:35:12.879865 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [started] unmounting "/mnt/oem3086674593" Sep 13 01:35:12.879865 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [finished] unmounting "/mnt/oem3086674593" Sep 13 01:35:12.879865 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Sep 13 01:35:12.879865 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Sep 13 01:35:12.879865 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Sep 13 01:35:12.879865 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2956860594" Sep 13 01:35:12.879865 ignition[1033]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2956860594": device or resource busy Sep 13 01:35:12.879865 ignition[1033]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2956860594", trying btrfs: device or resource busy Sep 13 01:35:12.879865 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2956860594" Sep 13 01:35:12.879865 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2956860594" Sep 13 01:35:12.879865 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem2956860594" Sep 13 01:35:12.879865 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem2956860594" Sep 13 01:35:12.879865 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Sep 13 01:35:12.879865 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-arm64.raw" Sep 13 01:35:12.879865 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET https://extensions.flatcar.org/extensions/kubernetes-v1.32.4-arm64.raw: attempt #1 Sep 13 01:35:12.808736 systemd[1]: mnt-oem3086674593.mount: Deactivated successfully. Sep 13 01:35:13.315801 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET result: OK Sep 13 01:35:13.583951 ignition[1033]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-arm64.raw" Sep 13 01:35:13.583951 ignition[1033]: INFO : files: op(f): [started] processing unit "waagent.service" Sep 13 01:35:13.583951 ignition[1033]: INFO : files: op(f): [finished] processing unit "waagent.service" Sep 13 01:35:13.583951 ignition[1033]: INFO : files: op(10): [started] processing unit "nvidia.service" Sep 13 01:35:13.583951 ignition[1033]: INFO : files: op(10): [finished] processing unit "nvidia.service" Sep 13 01:35:13.657421 kernel: audit: type=1130 audit(1757727313.600:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:13.600000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:13.596639 systemd[1]: Finished ignition-files.service. Sep 13 01:35:13.657000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:13.676043 ignition[1033]: INFO : files: op(11): [started] setting preset to enabled for "waagent.service" Sep 13 01:35:13.676043 ignition[1033]: INFO : files: op(11): [finished] setting preset to enabled for "waagent.service" Sep 13 01:35:13.676043 ignition[1033]: INFO : files: op(12): [started] setting preset to enabled for "nvidia.service" Sep 13 01:35:13.676043 ignition[1033]: INFO : files: op(12): [finished] setting preset to enabled for "nvidia.service" Sep 13 01:35:13.676043 ignition[1033]: INFO : files: createResultFile: createFiles: op(13): [started] writing file "/sysroot/etc/.ignition-result.json" Sep 13 01:35:13.676043 ignition[1033]: INFO : files: createResultFile: createFiles: op(13): [finished] writing file "/sysroot/etc/.ignition-result.json" Sep 13 01:35:13.676043 ignition[1033]: INFO : files: files passed Sep 13 01:35:13.676043 ignition[1033]: INFO : Ignition finished successfully Sep 13 01:35:13.811534 kernel: audit: type=1130 audit(1757727313.657:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:13.811561 kernel: audit: type=1131 audit(1757727313.657:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:13.811571 kernel: audit: type=1130 audit(1757727313.724:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:13.811581 kernel: audit: type=1130 audit(1757727313.788:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:13.811590 kernel: audit: type=1131 audit(1757727313.788:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:13.657000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:13.724000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:13.788000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:13.788000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:13.623845 systemd[1]: Starting initrd-setup-root-after-ignition.service... Sep 13 01:35:13.636123 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Sep 13 01:35:13.850832 initrd-setup-root-after-ignition[1058]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Sep 13 01:35:13.636948 systemd[1]: Starting ignition-quench.service... Sep 13 01:35:13.652934 systemd[1]: ignition-quench.service: Deactivated successfully. Sep 13 01:35:13.653259 systemd[1]: Finished ignition-quench.service. Sep 13 01:35:13.881000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:13.719180 systemd[1]: Finished initrd-setup-root-after-ignition.service. Sep 13 01:35:13.909013 kernel: audit: type=1130 audit(1757727313.881:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:13.747679 systemd[1]: Reached target ignition-complete.target. Sep 13 01:35:13.756344 systemd[1]: Starting initrd-parse-etc.service... Sep 13 01:35:13.780255 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Sep 13 01:35:13.780384 systemd[1]: Finished initrd-parse-etc.service. Sep 13 01:35:13.788762 systemd[1]: Reached target initrd-fs.target. Sep 13 01:35:13.829592 systemd[1]: Reached target initrd.target. Sep 13 01:35:13.839700 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Sep 13 01:35:13.956000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:13.850231 systemd[1]: Starting dracut-pre-pivot.service... Sep 13 01:35:13.874908 systemd[1]: Finished dracut-pre-pivot.service. Sep 13 01:35:13.908399 systemd[1]: Starting initrd-cleanup.service... Sep 13 01:35:13.925484 systemd[1]: Stopped target nss-lookup.target. Sep 13 01:35:14.008543 kernel: audit: type=1131 audit(1757727313.956:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:13.932003 systemd[1]: Stopped target remote-cryptsetup.target. Sep 13 01:35:13.940436 systemd[1]: Stopped target timers.target. Sep 13 01:35:13.948675 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Sep 13 01:35:13.948739 systemd[1]: Stopped dracut-pre-pivot.service. Sep 13 01:35:13.979939 systemd[1]: Stopped target initrd.target. Sep 13 01:35:13.987928 systemd[1]: Stopped target basic.target. Sep 13 01:35:13.995770 systemd[1]: Stopped target ignition-complete.target. Sep 13 01:35:14.004629 systemd[1]: Stopped target ignition-diskful.target. Sep 13 01:35:14.012987 systemd[1]: Stopped target initrd-root-device.target. Sep 13 01:35:14.081000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:14.022661 systemd[1]: Stopped target remote-fs.target. Sep 13 01:35:14.030802 systemd[1]: Stopped target remote-fs-pre.target. Sep 13 01:35:14.040856 systemd[1]: Stopped target sysinit.target. Sep 13 01:35:14.145556 kernel: audit: type=1131 audit(1757727314.081:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:14.145588 kernel: audit: type=1131 audit(1757727314.119:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:14.119000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:14.048941 systemd[1]: Stopped target local-fs.target. Sep 13 01:35:14.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:14.056837 systemd[1]: Stopped target local-fs-pre.target. Sep 13 01:35:14.158000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:14.064794 systemd[1]: Stopped target swap.target. Sep 13 01:35:14.167000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:14.073211 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Sep 13 01:35:14.073278 systemd[1]: Stopped dracut-pre-mount.service. Sep 13 01:35:14.102671 systemd[1]: Stopped target cryptsetup.target. Sep 13 01:35:14.195462 ignition[1071]: INFO : Ignition 2.14.0 Sep 13 01:35:14.195462 ignition[1071]: INFO : Stage: umount Sep 13 01:35:14.195462 ignition[1071]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 01:35:14.195462 ignition[1071]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 01:35:14.195462 ignition[1071]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 01:35:14.200000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:14.214000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:14.234000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:14.252000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:14.111003 systemd[1]: dracut-initqueue.service: Deactivated successfully. Sep 13 01:35:14.268000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:14.268000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:14.274804 ignition[1071]: INFO : umount: umount passed Sep 13 01:35:14.274804 ignition[1071]: INFO : Ignition finished successfully Sep 13 01:35:14.283000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:14.293000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:14.111057 systemd[1]: Stopped dracut-initqueue.service. Sep 13 01:35:14.304000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:14.138811 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Sep 13 01:35:14.312000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:14.138868 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Sep 13 01:35:14.151031 systemd[1]: ignition-files.service: Deactivated successfully. Sep 13 01:35:14.335000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:14.151079 systemd[1]: Stopped ignition-files.service. Sep 13 01:35:14.159269 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Sep 13 01:35:14.159318 systemd[1]: Stopped flatcar-metadata-hostname.service. Sep 13 01:35:14.169020 systemd[1]: Stopping ignition-mount.service... Sep 13 01:35:14.187898 systemd[1]: Stopping iscsiuio.service... Sep 13 01:35:14.191260 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Sep 13 01:35:14.191334 systemd[1]: Stopped kmod-static-nodes.service. Sep 13 01:35:14.399000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:14.204723 systemd[1]: Stopping sysroot-boot.service... Sep 13 01:35:14.209568 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Sep 13 01:35:14.209636 systemd[1]: Stopped systemd-udev-trigger.service. Sep 13 01:35:14.427000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:14.214739 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Sep 13 01:35:14.214787 systemd[1]: Stopped dracut-pre-trigger.service. Sep 13 01:35:14.453000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:14.235544 systemd[1]: iscsiuio.service: Deactivated successfully. Sep 13 01:35:14.462000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:14.235667 systemd[1]: Stopped iscsiuio.service. Sep 13 01:35:14.472000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:14.252936 systemd[1]: initrd-cleanup.service: Deactivated successfully. Sep 13 01:35:14.253031 systemd[1]: Finished initrd-cleanup.service. Sep 13 01:35:14.492000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:14.497000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:14.268642 systemd[1]: ignition-mount.service: Deactivated successfully. Sep 13 01:35:14.268732 systemd[1]: Stopped ignition-mount.service. Sep 13 01:35:14.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:14.513000 audit: BPF prog-id=6 op=UNLOAD Sep 13 01:35:14.285487 systemd[1]: sysroot-boot.mount: Deactivated successfully. Sep 13 01:35:14.285854 systemd[1]: ignition-disks.service: Deactivated successfully. Sep 13 01:35:14.285897 systemd[1]: Stopped ignition-disks.service. Sep 13 01:35:14.543000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:14.294177 systemd[1]: ignition-kargs.service: Deactivated successfully. Sep 13 01:35:14.552000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:14.294228 systemd[1]: Stopped ignition-kargs.service. Sep 13 01:35:14.562000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:14.304984 systemd[1]: ignition-fetch.service: Deactivated successfully. Sep 13 01:35:14.571000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:14.305026 systemd[1]: Stopped ignition-fetch.service. Sep 13 01:35:14.313230 systemd[1]: Stopped target network.target. Sep 13 01:35:14.325144 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Sep 13 01:35:14.325204 systemd[1]: Stopped ignition-fetch-offline.service. Sep 13 01:35:14.601000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:14.335653 systemd[1]: Stopped target paths.target. Sep 13 01:35:14.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:14.611000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:14.344827 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Sep 13 01:35:14.348491 systemd[1]: Stopped systemd-ask-password-console.path. Sep 13 01:35:14.353292 systemd[1]: Stopped target slices.target. Sep 13 01:35:14.363452 systemd[1]: Stopped target sockets.target. Sep 13 01:35:14.373369 systemd[1]: iscsid.socket: Deactivated successfully. Sep 13 01:35:14.373401 systemd[1]: Closed iscsid.socket. Sep 13 01:35:14.381863 systemd[1]: iscsiuio.socket: Deactivated successfully. Sep 13 01:35:14.381906 systemd[1]: Closed iscsiuio.socket. Sep 13 01:35:14.390015 systemd[1]: ignition-setup.service: Deactivated successfully. Sep 13 01:35:14.390066 systemd[1]: Stopped ignition-setup.service. Sep 13 01:35:14.400199 systemd[1]: Stopping systemd-networkd.service... Sep 13 01:35:14.408051 systemd[1]: Stopping systemd-resolved.service... Sep 13 01:35:14.411845 systemd-networkd[871]: eth0: DHCPv6 lease lost Sep 13 01:35:14.671000 audit: BPF prog-id=9 op=UNLOAD Sep 13 01:35:14.417100 systemd[1]: systemd-networkd.service: Deactivated successfully. Sep 13 01:35:14.417194 systemd[1]: Stopped systemd-networkd.service. Sep 13 01:35:14.428796 systemd[1]: systemd-networkd.socket: Deactivated successfully. Sep 13 01:35:14.428832 systemd[1]: Closed systemd-networkd.socket. Sep 13 01:35:14.439581 systemd[1]: Stopping network-cleanup.service... Sep 13 01:35:14.448880 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Sep 13 01:35:14.448939 systemd[1]: Stopped parse-ip-for-networkd.service. Sep 13 01:35:14.453852 systemd[1]: systemd-sysctl.service: Deactivated successfully. Sep 13 01:35:14.453902 systemd[1]: Stopped systemd-sysctl.service. Sep 13 01:35:14.468132 systemd[1]: systemd-modules-load.service: Deactivated successfully. Sep 13 01:35:14.468182 systemd[1]: Stopped systemd-modules-load.service. Sep 13 01:35:14.473359 systemd[1]: Stopping systemd-udevd.service... Sep 13 01:35:14.482484 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Sep 13 01:35:14.482972 systemd[1]: systemd-resolved.service: Deactivated successfully. Sep 13 01:35:14.483079 systemd[1]: Stopped systemd-resolved.service. Sep 13 01:35:14.493717 systemd[1]: systemd-udevd.service: Deactivated successfully. Sep 13 01:35:14.493836 systemd[1]: Stopped systemd-udevd.service. Sep 13 01:35:14.502959 systemd[1]: sysroot-boot.service: Deactivated successfully. Sep 13 01:35:14.503084 systemd[1]: Stopped sysroot-boot.service. Sep 13 01:35:14.514369 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Sep 13 01:35:14.514411 systemd[1]: Closed systemd-udevd-control.socket. Sep 13 01:35:14.523037 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Sep 13 01:35:14.523073 systemd[1]: Closed systemd-udevd-kernel.socket. Sep 13 01:35:14.533047 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Sep 13 01:35:14.533103 systemd[1]: Stopped dracut-pre-udev.service. Sep 13 01:35:14.543484 systemd[1]: dracut-cmdline.service: Deactivated successfully. Sep 13 01:35:14.543527 systemd[1]: Stopped dracut-cmdline.service. Sep 13 01:35:14.552522 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Sep 13 01:35:14.552558 systemd[1]: Stopped dracut-cmdline-ask.service. Sep 13 01:35:14.562407 systemd[1]: initrd-setup-root.service: Deactivated successfully. Sep 13 01:35:14.562499 systemd[1]: Stopped initrd-setup-root.service. Sep 13 01:35:14.576610 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Sep 13 01:35:14.590785 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Sep 13 01:35:14.590868 systemd[1]: Stopped systemd-vconsole-setup.service. Sep 13 01:35:14.601923 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Sep 13 01:35:14.602027 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Sep 13 01:35:15.007481 kernel: hv_netvsc 000d3a06-7cd4-000d-3a06-7cd4000d3a06 eth0: Data path switched from VF: enP5747s1 Sep 13 01:35:15.029371 systemd[1]: network-cleanup.service: Deactivated successfully. Sep 13 01:35:15.029516 systemd[1]: Stopped network-cleanup.service. Sep 13 01:35:15.038000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:15.039400 systemd[1]: Reached target initrd-switch-root.target. Sep 13 01:35:15.048687 systemd[1]: Starting initrd-switch-root.service... Sep 13 01:35:15.065110 systemd[1]: Switching root. Sep 13 01:35:15.093644 iscsid[876]: iscsid shutting down. Sep 13 01:35:15.097067 systemd-journald[276]: Received SIGTERM from PID 1 (systemd). Sep 13 01:35:15.097112 systemd-journald[276]: Journal stopped Sep 13 01:35:44.812531 kernel: SELinux: Class mctp_socket not defined in policy. Sep 13 01:35:44.812552 kernel: SELinux: Class anon_inode not defined in policy. Sep 13 01:35:44.812563 kernel: SELinux: the above unknown classes and permissions will be allowed Sep 13 01:35:44.812573 kernel: SELinux: policy capability network_peer_controls=1 Sep 13 01:35:44.812581 kernel: SELinux: policy capability open_perms=1 Sep 13 01:35:44.812589 kernel: SELinux: policy capability extended_socket_class=1 Sep 13 01:35:44.812598 kernel: SELinux: policy capability always_check_network=0 Sep 13 01:35:44.812606 kernel: SELinux: policy capability cgroup_seclabel=1 Sep 13 01:35:44.812614 kernel: SELinux: policy capability nnp_nosuid_transition=1 Sep 13 01:35:44.812621 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Sep 13 01:35:44.812629 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Sep 13 01:35:44.812638 kernel: kauditd_printk_skb: 32 callbacks suppressed Sep 13 01:35:44.812647 kernel: audit: type=1403 audit(1757727320.389:80): auid=4294967295 ses=4294967295 lsm=selinux res=1 Sep 13 01:35:44.812657 systemd[1]: Successfully loaded SELinux policy in 592.123ms. Sep 13 01:35:44.812668 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 46.800ms. Sep 13 01:35:44.812679 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 13 01:35:44.812689 systemd[1]: Detected virtualization microsoft. Sep 13 01:35:44.812699 systemd[1]: Detected architecture arm64. Sep 13 01:35:44.812708 systemd[1]: Detected first boot. Sep 13 01:35:44.812717 systemd[1]: Hostname set to . Sep 13 01:35:44.812726 systemd[1]: Initializing machine ID from random generator. Sep 13 01:35:44.812735 kernel: audit: type=1400 audit(1757727322.321:81): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 13 01:35:44.812746 kernel: audit: type=1400 audit(1757727322.321:82): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 13 01:35:44.812755 kernel: audit: type=1334 audit(1757727322.340:83): prog-id=10 op=LOAD Sep 13 01:35:44.812763 kernel: audit: type=1334 audit(1757727322.340:84): prog-id=10 op=UNLOAD Sep 13 01:35:44.812771 kernel: audit: type=1334 audit(1757727322.358:85): prog-id=11 op=LOAD Sep 13 01:35:44.812780 kernel: audit: type=1334 audit(1757727322.358:86): prog-id=11 op=UNLOAD Sep 13 01:35:44.812788 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Sep 13 01:35:44.812798 kernel: audit: type=1400 audit(1757727325.444:87): avc: denied { associate } for pid=1105 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Sep 13 01:35:44.812809 kernel: audit: type=1300 audit(1757727325.444:87): arch=c00000b7 syscall=5 success=yes exit=0 a0=40001453d4 a1=40000c6750 a2=40000ccc40 a3=32 items=0 ppid=1088 pid=1105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:44.812818 kernel: audit: type=1327 audit(1757727325.444:87): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 13 01:35:44.812827 kernel: audit: type=1400 audit(1757727325.458:88): avc: denied { associate } for pid=1105 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Sep 13 01:35:44.812837 kernel: audit: type=1300 audit(1757727325.458:88): arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40001454a9 a2=1ed a3=0 items=2 ppid=1088 pid=1105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:44.812846 kernel: audit: type=1307 audit(1757727325.458:88): cwd="/" Sep 13 01:35:44.812855 kernel: audit: type=1302 audit(1757727325.458:88): item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:35:44.812865 kernel: audit: type=1302 audit(1757727325.458:88): item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:35:44.812874 kernel: audit: type=1327 audit(1757727325.458:88): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 13 01:35:44.812883 systemd[1]: Populated /etc with preset unit settings. Sep 13 01:35:44.812893 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 13 01:35:44.812903 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 13 01:35:44.812915 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 13 01:35:44.812924 kernel: audit: type=1334 audit(1757727343.706:89): prog-id=12 op=LOAD Sep 13 01:35:44.812934 kernel: audit: type=1334 audit(1757727343.706:90): prog-id=3 op=UNLOAD Sep 13 01:35:44.812943 kernel: audit: type=1334 audit(1757727343.712:91): prog-id=13 op=LOAD Sep 13 01:35:44.812952 systemd[1]: iscsid.service: Deactivated successfully. Sep 13 01:35:44.812961 kernel: audit: type=1334 audit(1757727343.719:92): prog-id=14 op=LOAD Sep 13 01:35:44.812969 kernel: audit: type=1334 audit(1757727343.719:93): prog-id=4 op=UNLOAD Sep 13 01:35:44.812978 systemd[1]: Stopped iscsid.service. Sep 13 01:35:44.812989 kernel: audit: type=1334 audit(1757727343.719:94): prog-id=5 op=UNLOAD Sep 13 01:35:44.812999 kernel: audit: type=1131 audit(1757727343.720:95): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:44.813008 kernel: audit: type=1334 audit(1757727343.752:96): prog-id=12 op=UNLOAD Sep 13 01:35:44.813016 systemd[1]: initrd-switch-root.service: Deactivated successfully. Sep 13 01:35:44.813026 kernel: audit: type=1131 audit(1757727343.778:97): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:44.813035 systemd[1]: Stopped initrd-switch-root.service. Sep 13 01:35:44.813045 kernel: audit: type=1130 audit(1757727343.811:98): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:44.813054 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Sep 13 01:35:44.813063 systemd[1]: Created slice system-addon\x2dconfig.slice. Sep 13 01:35:44.813074 systemd[1]: Created slice system-addon\x2drun.slice. Sep 13 01:35:44.813084 systemd[1]: Created slice system-getty.slice. Sep 13 01:35:44.813094 systemd[1]: Created slice system-modprobe.slice. Sep 13 01:35:44.813105 systemd[1]: Created slice system-serial\x2dgetty.slice. Sep 13 01:35:44.813114 systemd[1]: Created slice system-system\x2dcloudinit.slice. Sep 13 01:35:44.813124 systemd[1]: Created slice system-systemd\x2dfsck.slice. Sep 13 01:35:44.813132 systemd[1]: Created slice user.slice. Sep 13 01:35:44.813142 systemd[1]: Started systemd-ask-password-console.path. Sep 13 01:35:44.813151 systemd[1]: Started systemd-ask-password-wall.path. Sep 13 01:35:44.813161 systemd[1]: Set up automount boot.automount. Sep 13 01:35:44.813171 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Sep 13 01:35:44.813180 systemd[1]: Stopped target initrd-switch-root.target. Sep 13 01:35:44.813189 systemd[1]: Stopped target initrd-fs.target. Sep 13 01:35:44.813198 systemd[1]: Stopped target initrd-root-fs.target. Sep 13 01:35:44.813207 systemd[1]: Reached target integritysetup.target. Sep 13 01:35:44.813216 systemd[1]: Reached target remote-cryptsetup.target. Sep 13 01:35:44.813226 systemd[1]: Reached target remote-fs.target. Sep 13 01:35:44.813236 systemd[1]: Reached target slices.target. Sep 13 01:35:44.813245 systemd[1]: Reached target swap.target. Sep 13 01:35:44.813255 systemd[1]: Reached target torcx.target. Sep 13 01:35:44.813264 systemd[1]: Reached target veritysetup.target. Sep 13 01:35:44.813273 systemd[1]: Listening on systemd-coredump.socket. Sep 13 01:35:44.813284 systemd[1]: Listening on systemd-initctl.socket. Sep 13 01:35:44.813294 systemd[1]: Listening on systemd-networkd.socket. Sep 13 01:35:44.813304 systemd[1]: Listening on systemd-udevd-control.socket. Sep 13 01:35:44.813313 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 13 01:35:44.813323 systemd[1]: Listening on systemd-userdbd.socket. Sep 13 01:35:44.813332 systemd[1]: Mounting dev-hugepages.mount... Sep 13 01:35:44.813341 systemd[1]: Mounting dev-mqueue.mount... Sep 13 01:35:44.813350 systemd[1]: Mounting media.mount... Sep 13 01:35:44.813361 systemd[1]: Mounting sys-kernel-debug.mount... Sep 13 01:35:44.813370 systemd[1]: Mounting sys-kernel-tracing.mount... Sep 13 01:35:44.813379 systemd[1]: Mounting tmp.mount... Sep 13 01:35:44.813389 systemd[1]: Starting flatcar-tmpfiles.service... Sep 13 01:35:44.813398 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 01:35:44.813407 systemd[1]: Starting kmod-static-nodes.service... Sep 13 01:35:44.813417 systemd[1]: Starting modprobe@configfs.service... Sep 13 01:35:44.813426 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 01:35:44.813436 systemd[1]: Starting modprobe@drm.service... Sep 13 01:35:44.813446 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 01:35:44.813455 systemd[1]: Starting modprobe@fuse.service... Sep 13 01:35:44.813473 systemd[1]: Starting modprobe@loop.service... Sep 13 01:35:44.813483 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Sep 13 01:35:44.813493 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Sep 13 01:35:44.813502 systemd[1]: Stopped systemd-fsck-root.service. Sep 13 01:35:44.813513 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Sep 13 01:35:44.813522 systemd[1]: Stopped systemd-fsck-usr.service. Sep 13 01:35:44.813532 systemd[1]: Stopped systemd-journald.service. Sep 13 01:35:44.813542 systemd[1]: systemd-journald.service: Consumed 3.105s CPU time. Sep 13 01:35:44.813552 systemd[1]: Starting systemd-journald.service... Sep 13 01:35:44.813561 systemd[1]: Starting systemd-modules-load.service... Sep 13 01:35:44.813570 systemd[1]: Starting systemd-network-generator.service... Sep 13 01:35:44.813580 systemd[1]: Starting systemd-remount-fs.service... Sep 13 01:35:44.813589 systemd[1]: Starting systemd-udev-trigger.service... Sep 13 01:35:44.813598 systemd[1]: verity-setup.service: Deactivated successfully. Sep 13 01:35:44.813607 systemd[1]: Stopped verity-setup.service. Sep 13 01:35:44.813617 kernel: loop: module loaded Sep 13 01:35:44.813627 systemd[1]: Mounted dev-hugepages.mount. Sep 13 01:35:44.813637 systemd[1]: Mounted dev-mqueue.mount. Sep 13 01:35:44.813646 systemd[1]: Mounted media.mount. Sep 13 01:35:44.813655 systemd[1]: Mounted sys-kernel-debug.mount. Sep 13 01:35:44.813669 systemd[1]: Mounted sys-kernel-tracing.mount. Sep 13 01:35:44.813679 systemd[1]: Mounted tmp.mount. Sep 13 01:35:44.813688 systemd[1]: Finished flatcar-tmpfiles.service. Sep 13 01:35:44.813698 systemd[1]: Finished kmod-static-nodes.service. Sep 13 01:35:44.813708 kernel: fuse: init (API version 7.34) Sep 13 01:35:44.813719 systemd[1]: modprobe@configfs.service: Deactivated successfully. Sep 13 01:35:44.813728 systemd[1]: Finished modprobe@configfs.service. Sep 13 01:35:44.813738 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 01:35:44.813747 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 01:35:44.813757 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 13 01:35:44.813766 systemd[1]: Finished modprobe@drm.service. Sep 13 01:35:44.813779 systemd-journald[1183]: Journal started Sep 13 01:35:44.813821 systemd-journald[1183]: Runtime Journal (/run/log/journal/766d6e7231144fa5aab3f6ec46e28c1d) is 8.0M, max 78.5M, 70.5M free. Sep 13 01:35:20.389000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Sep 13 01:35:22.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 13 01:35:22.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 13 01:35:22.340000 audit: BPF prog-id=10 op=LOAD Sep 13 01:35:22.340000 audit: BPF prog-id=10 op=UNLOAD Sep 13 01:35:22.358000 audit: BPF prog-id=11 op=LOAD Sep 13 01:35:22.358000 audit: BPF prog-id=11 op=UNLOAD Sep 13 01:35:25.444000 audit[1105]: AVC avc: denied { associate } for pid=1105 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Sep 13 01:35:25.444000 audit[1105]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001453d4 a1=40000c6750 a2=40000ccc40 a3=32 items=0 ppid=1088 pid=1105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:25.444000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 13 01:35:25.458000 audit[1105]: AVC avc: denied { associate } for pid=1105 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Sep 13 01:35:25.458000 audit[1105]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40001454a9 a2=1ed a3=0 items=2 ppid=1088 pid=1105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:25.458000 audit: CWD cwd="/" Sep 13 01:35:25.458000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:35:25.458000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:35:25.458000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 13 01:35:43.706000 audit: BPF prog-id=12 op=LOAD Sep 13 01:35:43.706000 audit: BPF prog-id=3 op=UNLOAD Sep 13 01:35:43.712000 audit: BPF prog-id=13 op=LOAD Sep 13 01:35:43.719000 audit: BPF prog-id=14 op=LOAD Sep 13 01:35:43.719000 audit: BPF prog-id=4 op=UNLOAD Sep 13 01:35:43.719000 audit: BPF prog-id=5 op=UNLOAD Sep 13 01:35:43.720000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:43.752000 audit: BPF prog-id=12 op=UNLOAD Sep 13 01:35:43.778000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:43.811000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:43.811000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:44.501000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:44.516000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:44.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:44.524000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:44.529000 audit: BPF prog-id=15 op=LOAD Sep 13 01:35:44.529000 audit: BPF prog-id=16 op=LOAD Sep 13 01:35:44.529000 audit: BPF prog-id=17 op=LOAD Sep 13 01:35:44.529000 audit: BPF prog-id=13 op=UNLOAD Sep 13 01:35:44.529000 audit: BPF prog-id=14 op=UNLOAD Sep 13 01:35:44.687000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:44.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:44.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:44.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:44.781000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:44.797000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:44.797000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:44.809000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Sep 13 01:35:44.809000 audit[1183]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=3 a1=fffffdb5f4d0 a2=4000 a3=1 items=0 ppid=1 pid=1183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:44.809000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Sep 13 01:35:44.814000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:44.814000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:25.244211 /usr/lib/systemd/system-generators/torcx-generator[1105]: time="2025-09-13T01:35:25Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 13 01:35:43.704723 systemd[1]: Queued start job for default target multi-user.target. Sep 13 01:35:25.311999 /usr/lib/systemd/system-generators/torcx-generator[1105]: time="2025-09-13T01:35:25Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 13 01:35:43.704736 systemd[1]: Unnecessary job was removed for dev-sda6.device. Sep 13 01:35:25.312037 /usr/lib/systemd/system-generators/torcx-generator[1105]: time="2025-09-13T01:35:25Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 13 01:35:43.720646 systemd[1]: systemd-journald.service: Deactivated successfully. Sep 13 01:35:25.312082 /usr/lib/systemd/system-generators/torcx-generator[1105]: time="2025-09-13T01:35:25Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Sep 13 01:35:43.721008 systemd[1]: systemd-journald.service: Consumed 3.105s CPU time. Sep 13 01:35:25.312095 /usr/lib/systemd/system-generators/torcx-generator[1105]: time="2025-09-13T01:35:25Z" level=debug msg="skipped missing lower profile" missing profile=oem Sep 13 01:35:25.312153 /usr/lib/systemd/system-generators/torcx-generator[1105]: time="2025-09-13T01:35:25Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Sep 13 01:35:25.312167 /usr/lib/systemd/system-generators/torcx-generator[1105]: time="2025-09-13T01:35:25Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Sep 13 01:35:25.312375 /usr/lib/systemd/system-generators/torcx-generator[1105]: time="2025-09-13T01:35:25Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Sep 13 01:35:25.312408 /usr/lib/systemd/system-generators/torcx-generator[1105]: time="2025-09-13T01:35:25Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 13 01:35:25.312420 /usr/lib/systemd/system-generators/torcx-generator[1105]: time="2025-09-13T01:35:25Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 13 01:35:25.411740 /usr/lib/systemd/system-generators/torcx-generator[1105]: time="2025-09-13T01:35:25Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Sep 13 01:35:25.411797 /usr/lib/systemd/system-generators/torcx-generator[1105]: time="2025-09-13T01:35:25Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Sep 13 01:35:25.411837 /usr/lib/systemd/system-generators/torcx-generator[1105]: time="2025-09-13T01:35:25Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Sep 13 01:35:25.411854 /usr/lib/systemd/system-generators/torcx-generator[1105]: time="2025-09-13T01:35:25Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Sep 13 01:35:25.411877 /usr/lib/systemd/system-generators/torcx-generator[1105]: time="2025-09-13T01:35:25Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Sep 13 01:35:25.411889 /usr/lib/systemd/system-generators/torcx-generator[1105]: time="2025-09-13T01:35:25Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Sep 13 01:35:36.409496 /usr/lib/systemd/system-generators/torcx-generator[1105]: time="2025-09-13T01:35:36Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 01:35:36.409755 /usr/lib/systemd/system-generators/torcx-generator[1105]: time="2025-09-13T01:35:36Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 01:35:36.409856 /usr/lib/systemd/system-generators/torcx-generator[1105]: time="2025-09-13T01:35:36Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 01:35:36.410022 /usr/lib/systemd/system-generators/torcx-generator[1105]: time="2025-09-13T01:35:36Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 01:35:36.410071 /usr/lib/systemd/system-generators/torcx-generator[1105]: time="2025-09-13T01:35:36Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Sep 13 01:35:36.410126 /usr/lib/systemd/system-generators/torcx-generator[1105]: time="2025-09-13T01:35:36Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Sep 13 01:35:44.824969 systemd[1]: Started systemd-journald.service. Sep 13 01:35:44.824000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:44.825855 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 01:35:44.825996 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 01:35:44.830000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:44.830000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:44.831006 systemd[1]: modprobe@fuse.service: Deactivated successfully. Sep 13 01:35:44.831137 systemd[1]: Finished modprobe@fuse.service. Sep 13 01:35:44.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:44.835000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:44.836294 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 01:35:44.836418 systemd[1]: Finished modprobe@loop.service. Sep 13 01:35:44.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:44.840000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:44.841386 systemd[1]: Finished systemd-network-generator.service. Sep 13 01:35:44.845000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:44.846749 systemd[1]: Finished systemd-remount-fs.service. Sep 13 01:35:44.851000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:44.852212 systemd[1]: Reached target network-pre.target. Sep 13 01:35:44.857816 systemd[1]: Mounting sys-fs-fuse-connections.mount... Sep 13 01:35:44.863123 systemd[1]: Mounting sys-kernel-config.mount... Sep 13 01:35:44.867401 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Sep 13 01:35:44.966772 systemd[1]: Starting systemd-hwdb-update.service... Sep 13 01:35:44.973073 systemd[1]: Starting systemd-journal-flush.service... Sep 13 01:35:44.978772 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 01:35:44.979924 systemd[1]: Starting systemd-random-seed.service... Sep 13 01:35:44.984043 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 01:35:44.985346 systemd[1]: Starting systemd-sysusers.service... Sep 13 01:35:44.991003 systemd[1]: Finished systemd-udev-trigger.service. Sep 13 01:35:44.995000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:44.995841 systemd[1]: Mounted sys-fs-fuse-connections.mount. Sep 13 01:35:45.000609 systemd[1]: Mounted sys-kernel-config.mount. Sep 13 01:35:45.006051 systemd[1]: Starting systemd-udev-settle.service... Sep 13 01:35:45.012326 systemd[1]: Finished systemd-modules-load.service. Sep 13 01:35:45.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:45.019746 systemd[1]: Starting systemd-sysctl.service... Sep 13 01:35:45.025733 udevadm[1223]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Sep 13 01:35:45.314494 systemd-journald[1183]: Time spent on flushing to /var/log/journal/766d6e7231144fa5aab3f6ec46e28c1d is 13.197ms for 1090 entries. Sep 13 01:35:45.314494 systemd-journald[1183]: System Journal (/var/log/journal/766d6e7231144fa5aab3f6ec46e28c1d) is 8.0M, max 2.6G, 2.6G free. Sep 13 01:35:45.458070 systemd-journald[1183]: Received client request to flush runtime journal. Sep 13 01:35:45.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:45.328023 systemd[1]: Finished systemd-random-seed.service. Sep 13 01:35:45.332674 systemd[1]: Reached target first-boot-complete.target. Sep 13 01:35:45.459179 systemd[1]: Finished systemd-journal-flush.service. Sep 13 01:35:45.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:45.640151 systemd[1]: Finished systemd-sysctl.service. Sep 13 01:35:45.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:46.981173 systemd[1]: Finished systemd-sysusers.service. Sep 13 01:35:46.985000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:48.271125 systemd[1]: Finished systemd-hwdb-update.service. Sep 13 01:35:48.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:48.275000 audit: BPF prog-id=18 op=LOAD Sep 13 01:35:48.275000 audit: BPF prog-id=19 op=LOAD Sep 13 01:35:48.275000 audit: BPF prog-id=7 op=UNLOAD Sep 13 01:35:48.275000 audit: BPF prog-id=8 op=UNLOAD Sep 13 01:35:48.277036 systemd[1]: Starting systemd-udevd.service... Sep 13 01:35:48.294616 systemd-udevd[1228]: Using default interface naming scheme 'v252'. Sep 13 01:35:50.571836 systemd[1]: Started systemd-udevd.service. Sep 13 01:35:50.581000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:50.587334 kernel: kauditd_printk_skb: 42 callbacks suppressed Sep 13 01:35:50.587443 kernel: audit: type=1130 audit(1757727350.581:139): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:50.611721 systemd[1]: Starting systemd-networkd.service... Sep 13 01:35:50.620037 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Sep 13 01:35:50.626237 kernel: audit: type=1334 audit(1757727350.610:140): prog-id=20 op=LOAD Sep 13 01:35:50.610000 audit: BPF prog-id=20 op=LOAD Sep 13 01:35:50.715500 kernel: mousedev: PS/2 mouse device common for all mice Sep 13 01:35:50.730000 audit[1232]: AVC avc: denied { confidentiality } for pid=1232 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Sep 13 01:35:50.753483 kernel: audit: type=1400 audit(1757727350.730:141): avc: denied { confidentiality } for pid=1232 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Sep 13 01:35:50.753556 kernel: hv_vmbus: registering driver hv_balloon Sep 13 01:35:50.766487 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Sep 13 01:35:50.766587 kernel: hv_balloon: Memory hot add disabled on ARM64 Sep 13 01:35:50.730000 audit[1232]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaea143130 a1=aa2c a2=ffffb02024b0 a3=aaaaea09f010 items=12 ppid=1228 pid=1232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:50.794962 kernel: audit: type=1300 audit(1757727350.730:141): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaea143130 a1=aa2c a2=ffffb02024b0 a3=aaaaea09f010 items=12 ppid=1228 pid=1232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:50.797323 systemd[1]: Starting systemd-userdbd.service... Sep 13 01:35:50.730000 audit: CWD cwd="/" Sep 13 01:35:50.810424 kernel: audit: type=1307 audit(1757727350.730:141): cwd="/" Sep 13 01:35:50.730000 audit: PATH item=0 name=(null) inode=6667 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:35:50.829868 kernel: audit: type=1302 audit(1757727350.730:141): item=0 name=(null) inode=6667 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:35:50.836127 kernel: hv_vmbus: registering driver hyperv_fb Sep 13 01:35:50.836247 kernel: audit: type=1302 audit(1757727350.730:141): item=1 name=(null) inode=10670 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:35:50.730000 audit: PATH item=1 name=(null) inode=10670 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:35:50.730000 audit: PATH item=2 name=(null) inode=10670 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:35:50.860490 kernel: audit: type=1302 audit(1757727350.730:141): item=2 name=(null) inode=10670 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:35:50.876247 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Sep 13 01:35:50.876340 kernel: audit: type=1302 audit(1757727350.730:141): item=3 name=(null) inode=10671 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:35:50.730000 audit: PATH item=3 name=(null) inode=10671 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:35:50.894956 kernel: audit: type=1302 audit(1757727350.730:141): item=4 name=(null) inode=10670 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:35:50.895071 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Sep 13 01:35:50.730000 audit: PATH item=4 name=(null) inode=10670 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:35:50.730000 audit: PATH item=5 name=(null) inode=10672 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:35:50.730000 audit: PATH item=6 name=(null) inode=10670 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:35:50.730000 audit: PATH item=7 name=(null) inode=10673 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:35:50.730000 audit: PATH item=8 name=(null) inode=10670 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:35:50.730000 audit: PATH item=9 name=(null) inode=10674 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:35:50.730000 audit: PATH item=10 name=(null) inode=10670 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:35:50.730000 audit: PATH item=11 name=(null) inode=10675 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:35:50.730000 audit: PROCTITLE proctitle="(udev-worker)" Sep 13 01:35:50.796000 audit: BPF prog-id=21 op=LOAD Sep 13 01:35:50.796000 audit: BPF prog-id=22 op=LOAD Sep 13 01:35:50.796000 audit: BPF prog-id=23 op=LOAD Sep 13 01:35:50.921574 kernel: hv_utils: Registering HyperV Utility Driver Sep 13 01:35:50.921666 kernel: hv_vmbus: registering driver hv_utils Sep 13 01:35:50.921710 kernel: hv_utils: Heartbeat IC version 3.0 Sep 13 01:35:50.921733 kernel: hv_utils: Shutdown IC version 3.2 Sep 13 01:35:50.922524 kernel: hv_utils: TimeSync IC version 4.0 Sep 13 01:35:50.805118 kernel: Console: switching to colour dummy device 80x25 Sep 13 01:35:50.885530 systemd-journald[1183]: Time jumped backwards, rotating. Sep 13 01:35:50.885610 kernel: Console: switching to colour frame buffer device 128x48 Sep 13 01:35:50.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:50.849673 systemd[1]: Started systemd-userdbd.service. Sep 13 01:35:51.681660 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 13 01:35:51.688820 systemd[1]: Finished systemd-udev-settle.service. Sep 13 01:35:51.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:51.694823 systemd[1]: Starting lvm2-activation-early.service... Sep 13 01:35:52.321825 lvm[1307]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 13 01:35:52.402364 systemd[1]: Finished lvm2-activation-early.service. Sep 13 01:35:52.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:52.407606 systemd[1]: Reached target cryptsetup.target. Sep 13 01:35:52.413372 systemd[1]: Starting lvm2-activation.service... Sep 13 01:35:52.417331 lvm[1308]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 13 01:35:52.440292 systemd[1]: Finished lvm2-activation.service. Sep 13 01:35:52.443000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:52.444854 systemd[1]: Reached target local-fs-pre.target. Sep 13 01:35:52.449460 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Sep 13 01:35:52.449489 systemd[1]: Reached target local-fs.target. Sep 13 01:35:52.454232 systemd[1]: Reached target machines.target. Sep 13 01:35:52.460396 systemd[1]: Starting ldconfig.service... Sep 13 01:35:52.525815 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 01:35:52.525888 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 01:35:52.527027 systemd[1]: Starting systemd-boot-update.service... Sep 13 01:35:52.532601 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Sep 13 01:35:52.539646 systemd[1]: Starting systemd-machine-id-commit.service... Sep 13 01:35:52.545781 systemd[1]: Starting systemd-sysext.service... Sep 13 01:35:52.599421 systemd-networkd[1249]: lo: Link UP Sep 13 01:35:52.599431 systemd-networkd[1249]: lo: Gained carrier Sep 13 01:35:52.599849 systemd-networkd[1249]: Enumeration completed Sep 13 01:35:52.599958 systemd[1]: Started systemd-networkd.service. Sep 13 01:35:52.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:52.605831 systemd[1]: Starting systemd-networkd-wait-online.service... Sep 13 01:35:52.662323 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1310 (bootctl) Sep 13 01:35:52.663692 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Sep 13 01:35:52.680580 systemd-networkd[1249]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 13 01:35:52.687681 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Sep 13 01:35:52.688253 systemd[1]: Finished systemd-machine-id-commit.service. Sep 13 01:35:52.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:52.724531 systemd[1]: Unmounting usr-share-oem.mount... Sep 13 01:35:52.744720 kernel: mlx5_core 1673:00:02.0 enP5747s1: Link up Sep 13 01:35:52.744991 kernel: buffer_size[0]=0 is not enough for lossless buffer Sep 13 01:35:52.791358 kernel: hv_netvsc 000d3a06-7cd4-000d-3a06-7cd4000d3a06 eth0: Data path switched to VF: enP5747s1 Sep 13 01:35:52.792305 systemd-networkd[1249]: enP5747s1: Link UP Sep 13 01:35:52.792530 systemd-networkd[1249]: eth0: Link UP Sep 13 01:35:52.792592 systemd-networkd[1249]: eth0: Gained carrier Sep 13 01:35:52.797445 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Sep 13 01:35:52.798597 systemd-networkd[1249]: enP5747s1: Gained carrier Sep 13 01:35:52.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:52.808449 systemd-networkd[1249]: eth0: DHCPv4 address 10.200.20.13/24, gateway 10.200.20.1 acquired from 168.63.129.16 Sep 13 01:35:52.826123 systemd[1]: usr-share-oem.mount: Deactivated successfully. Sep 13 01:35:52.826318 systemd[1]: Unmounted usr-share-oem.mount. Sep 13 01:35:52.936364 kernel: loop0: detected capacity change from 0 to 207008 Sep 13 01:35:53.049362 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Sep 13 01:35:53.077360 kernel: loop1: detected capacity change from 0 to 207008 Sep 13 01:35:53.094626 (sd-sysext)[1323]: Using extensions 'kubernetes'. Sep 13 01:35:53.094968 (sd-sysext)[1323]: Merged extensions into '/usr'. Sep 13 01:35:53.117894 systemd[1]: Mounting usr-share-oem.mount... Sep 13 01:35:53.122249 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 01:35:53.123824 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 01:35:53.129238 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 01:35:53.135407 systemd[1]: Starting modprobe@loop.service... Sep 13 01:35:53.139436 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 01:35:53.139668 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 01:35:53.141983 systemd[1]: Mounted usr-share-oem.mount. Sep 13 01:35:53.146769 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 01:35:53.147002 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 01:35:53.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:53.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:53.151885 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 01:35:53.152103 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 01:35:53.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:53.155000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:53.157295 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 01:35:53.157605 systemd[1]: Finished modprobe@loop.service. Sep 13 01:35:53.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:53.161000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:53.163275 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 01:35:53.163557 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 01:35:53.164753 systemd[1]: Finished systemd-sysext.service. Sep 13 01:35:53.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:53.170711 systemd[1]: Starting ensure-sysext.service... Sep 13 01:35:53.175737 systemd[1]: Starting systemd-tmpfiles-setup.service... Sep 13 01:35:53.184754 systemd[1]: Reloading. Sep 13 01:35:53.245138 systemd-fsck[1319]: fsck.fat 4.2 (2021-01-31) Sep 13 01:35:53.245138 systemd-fsck[1319]: /dev/sda1: 236 files, 117310/258078 clusters Sep 13 01:35:53.251095 /usr/lib/systemd/system-generators/torcx-generator[1352]: time="2025-09-13T01:35:53Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 13 01:35:53.255849 /usr/lib/systemd/system-generators/torcx-generator[1352]: time="2025-09-13T01:35:53Z" level=info msg="torcx already run" Sep 13 01:35:53.316122 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 13 01:35:53.316142 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 13 01:35:53.332853 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 13 01:35:53.396000 audit: BPF prog-id=24 op=LOAD Sep 13 01:35:53.396000 audit: BPF prog-id=25 op=LOAD Sep 13 01:35:53.396000 audit: BPF prog-id=18 op=UNLOAD Sep 13 01:35:53.396000 audit: BPF prog-id=19 op=UNLOAD Sep 13 01:35:53.396000 audit: BPF prog-id=26 op=LOAD Sep 13 01:35:53.396000 audit: BPF prog-id=15 op=UNLOAD Sep 13 01:35:53.396000 audit: BPF prog-id=27 op=LOAD Sep 13 01:35:53.396000 audit: BPF prog-id=28 op=LOAD Sep 13 01:35:53.396000 audit: BPF prog-id=16 op=UNLOAD Sep 13 01:35:53.396000 audit: BPF prog-id=17 op=UNLOAD Sep 13 01:35:53.397000 audit: BPF prog-id=29 op=LOAD Sep 13 01:35:53.397000 audit: BPF prog-id=21 op=UNLOAD Sep 13 01:35:53.397000 audit: BPF prog-id=30 op=LOAD Sep 13 01:35:53.397000 audit: BPF prog-id=31 op=LOAD Sep 13 01:35:53.397000 audit: BPF prog-id=22 op=UNLOAD Sep 13 01:35:53.397000 audit: BPF prog-id=23 op=UNLOAD Sep 13 01:35:53.398000 audit: BPF prog-id=32 op=LOAD Sep 13 01:35:53.398000 audit: BPF prog-id=20 op=UNLOAD Sep 13 01:35:53.401839 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Sep 13 01:35:53.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:53.414286 systemd[1]: Mounting boot.mount... Sep 13 01:35:53.420976 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 01:35:53.422161 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 01:35:53.428885 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 01:35:53.435801 systemd[1]: Starting modprobe@loop.service... Sep 13 01:35:53.439993 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 01:35:53.440124 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 01:35:53.442352 systemd[1]: Mounted boot.mount. Sep 13 01:35:53.447331 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 01:35:53.447477 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 01:35:53.453000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:53.453000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:53.456148 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 01:35:53.456301 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 01:35:53.460000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:53.460000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:53.461921 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 01:35:53.462051 systemd[1]: Finished modprobe@loop.service. Sep 13 01:35:53.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:53.465000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:53.468560 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 01:35:53.469910 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 01:35:53.475173 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 01:35:53.481036 systemd[1]: Starting modprobe@loop.service... Sep 13 01:35:53.484928 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 01:35:53.485061 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 01:35:53.485975 systemd[1]: Finished systemd-boot-update.service. Sep 13 01:35:53.489000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:53.490966 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 01:35:53.491086 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 01:35:53.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:53.494000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:53.496453 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 01:35:53.496567 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 01:35:53.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:53.500000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:53.501763 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 01:35:53.501883 systemd[1]: Finished modprobe@loop.service. Sep 13 01:35:53.505000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:53.505000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:53.508678 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 01:35:53.510012 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 01:35:53.515186 systemd[1]: Starting modprobe@drm.service... Sep 13 01:35:53.520059 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 01:35:53.526208 systemd[1]: Starting modprobe@loop.service... Sep 13 01:35:53.530435 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 01:35:53.530570 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 01:35:53.531444 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 01:35:53.531581 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 01:35:53.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:53.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:53.536347 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 13 01:35:53.536468 systemd[1]: Finished modprobe@drm.service. Sep 13 01:35:53.539000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:53.539000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:53.541615 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 01:35:53.541742 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 01:35:53.545000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:53.545000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:53.547228 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 01:35:53.547354 systemd[1]: Finished modprobe@loop.service. Sep 13 01:35:53.550000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:53.550000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:53.552253 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 01:35:53.552324 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 01:35:53.553310 systemd[1]: Finished ensure-sysext.service. Sep 13 01:35:53.556000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:53.904566 systemd-tmpfiles[1330]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Sep 13 01:35:53.975525 systemd-networkd[1249]: eth0: Gained IPv6LL Sep 13 01:35:53.981189 systemd[1]: Finished systemd-networkd-wait-online.service. Sep 13 01:35:53.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:54.365784 systemd-tmpfiles[1330]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Sep 13 01:35:54.939870 systemd-tmpfiles[1330]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Sep 13 01:36:01.657913 systemd[1]: Finished systemd-tmpfiles-setup.service. Sep 13 01:36:01.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:01.667762 kernel: kauditd_printk_skb: 67 callbacks suppressed Sep 13 01:36:01.667804 kernel: audit: type=1130 audit(1757727361.662:201): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:01.669017 systemd[1]: Starting audit-rules.service... Sep 13 01:36:01.690451 systemd[1]: Starting clean-ca-certificates.service... Sep 13 01:36:01.696269 systemd[1]: Starting systemd-journal-catalog-update.service... Sep 13 01:36:01.700000 audit: BPF prog-id=33 op=LOAD Sep 13 01:36:01.707291 systemd[1]: Starting systemd-resolved.service... Sep 13 01:36:01.709368 kernel: audit: type=1334 audit(1757727361.700:202): prog-id=33 op=LOAD Sep 13 01:36:01.710000 audit: BPF prog-id=34 op=LOAD Sep 13 01:36:01.713079 systemd[1]: Starting systemd-timesyncd.service... Sep 13 01:36:01.721202 kernel: audit: type=1334 audit(1757727361.710:203): prog-id=34 op=LOAD Sep 13 01:36:01.722958 systemd[1]: Starting systemd-update-utmp.service... Sep 13 01:36:01.833000 audit[1430]: SYSTEM_BOOT pid=1430 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Sep 13 01:36:01.842007 systemd[1]: Finished systemd-update-utmp.service. Sep 13 01:36:01.856456 kernel: audit: type=1127 audit(1757727361.833:204): pid=1430 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Sep 13 01:36:01.855000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:01.857477 systemd[1]: Finished clean-ca-certificates.service. Sep 13 01:36:01.877358 kernel: audit: type=1130 audit(1757727361.855:205): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:01.875000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:01.877572 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 13 01:36:01.894374 kernel: audit: type=1130 audit(1757727361.875:206): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:01.896041 systemd[1]: Started systemd-timesyncd.service. Sep 13 01:36:01.899000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:01.900654 systemd[1]: Reached target time-set.target. Sep 13 01:36:01.917367 kernel: audit: type=1130 audit(1757727361.899:207): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:02.074380 systemd-resolved[1428]: Positive Trust Anchors: Sep 13 01:36:02.074399 systemd-resolved[1428]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 13 01:36:02.074426 systemd-resolved[1428]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 13 01:36:02.242525 systemd-resolved[1428]: Using system hostname 'ci-3510.3.8-n-94f5c418a3'. Sep 13 01:36:02.243947 systemd[1]: Started systemd-resolved.service. Sep 13 01:36:02.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:02.249076 systemd[1]: Reached target network.target. Sep 13 01:36:02.271269 kernel: audit: type=1130 audit(1757727362.247:208): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:02.271798 systemd[1]: Reached target network-online.target. Sep 13 01:36:02.276893 systemd[1]: Reached target nss-lookup.target. Sep 13 01:36:02.376709 systemd-timesyncd[1429]: Contacted time server 204.197.163.71:123 (0.flatcar.pool.ntp.org). Sep 13 01:36:02.376784 systemd-timesyncd[1429]: Initial clock synchronization to Sat 2025-09-13 01:36:02.378341 UTC. Sep 13 01:36:02.539121 systemd[1]: Finished systemd-journal-catalog-update.service. Sep 13 01:36:02.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:02.565367 kernel: audit: type=1130 audit(1757727362.543:209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:36:02.726657 augenrules[1445]: No rules Sep 13 01:36:02.725000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Sep 13 01:36:02.733137 systemd[1]: Finished audit-rules.service. Sep 13 01:36:02.725000 audit[1445]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc976d110 a2=420 a3=0 items=0 ppid=1424 pid=1445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:36:02.725000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Sep 13 01:36:02.743281 kernel: audit: type=1305 audit(1757727362.725:210): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Sep 13 01:36:16.246714 ldconfig[1309]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Sep 13 01:36:16.262113 systemd[1]: Finished ldconfig.service. Sep 13 01:36:16.267981 systemd[1]: Starting systemd-update-done.service... Sep 13 01:36:16.376955 systemd[1]: Finished systemd-update-done.service. Sep 13 01:36:16.382045 systemd[1]: Reached target sysinit.target. Sep 13 01:36:16.386438 systemd[1]: Started motdgen.path. Sep 13 01:36:16.389910 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Sep 13 01:36:16.396306 systemd[1]: Started logrotate.timer. Sep 13 01:36:16.400516 systemd[1]: Started mdadm.timer. Sep 13 01:36:16.404105 systemd[1]: Started systemd-tmpfiles-clean.timer. Sep 13 01:36:16.408560 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Sep 13 01:36:16.408587 systemd[1]: Reached target paths.target. Sep 13 01:36:16.413305 systemd[1]: Reached target timers.target. Sep 13 01:36:16.418171 systemd[1]: Listening on dbus.socket. Sep 13 01:36:16.423804 systemd[1]: Starting docker.socket... Sep 13 01:36:16.504790 systemd[1]: Listening on sshd.socket. Sep 13 01:36:16.509116 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 01:36:16.509675 systemd[1]: Listening on docker.socket. Sep 13 01:36:16.514078 systemd[1]: Reached target sockets.target. Sep 13 01:36:16.518751 systemd[1]: Reached target basic.target. Sep 13 01:36:16.523412 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 13 01:36:16.523444 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 13 01:36:16.524659 systemd[1]: Starting containerd.service... Sep 13 01:36:16.529727 systemd[1]: Starting dbus.service... Sep 13 01:36:16.534295 systemd[1]: Starting enable-oem-cloudinit.service... Sep 13 01:36:16.539879 systemd[1]: Starting extend-filesystems.service... Sep 13 01:36:16.544132 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Sep 13 01:36:16.576558 systemd[1]: Starting kubelet.service... Sep 13 01:36:16.581097 systemd[1]: Starting motdgen.service... Sep 13 01:36:16.585703 systemd[1]: Started nvidia.service. Sep 13 01:36:16.590749 systemd[1]: Starting ssh-key-proc-cmdline.service... Sep 13 01:36:16.595869 systemd[1]: Starting sshd-keygen.service... Sep 13 01:36:16.601791 systemd[1]: Starting systemd-logind.service... Sep 13 01:36:16.605801 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 01:36:16.605873 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Sep 13 01:36:16.606305 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Sep 13 01:36:16.607053 systemd[1]: Starting update-engine.service... Sep 13 01:36:16.611768 systemd[1]: Starting update-ssh-keys-after-ignition.service... Sep 13 01:36:16.624545 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Sep 13 01:36:16.624745 systemd[1]: Finished ssh-key-proc-cmdline.service. Sep 13 01:36:16.710256 jq[1466]: true Sep 13 01:36:16.710778 jq[1455]: false Sep 13 01:36:16.747306 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Sep 13 01:36:16.747490 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Sep 13 01:36:16.764509 extend-filesystems[1456]: Found loop1 Sep 13 01:36:16.764509 extend-filesystems[1456]: Found sda Sep 13 01:36:16.764509 extend-filesystems[1456]: Found sda1 Sep 13 01:36:16.778437 extend-filesystems[1456]: Found sda2 Sep 13 01:36:16.778437 extend-filesystems[1456]: Found sda3 Sep 13 01:36:16.778437 extend-filesystems[1456]: Found usr Sep 13 01:36:16.778437 extend-filesystems[1456]: Found sda4 Sep 13 01:36:16.778437 extend-filesystems[1456]: Found sda6 Sep 13 01:36:16.778437 extend-filesystems[1456]: Found sda7 Sep 13 01:36:16.778437 extend-filesystems[1456]: Found sda9 Sep 13 01:36:16.778437 extend-filesystems[1456]: Checking size of /dev/sda9 Sep 13 01:36:16.785844 systemd[1]: motdgen.service: Deactivated successfully. Sep 13 01:36:16.786040 systemd[1]: Finished motdgen.service. Sep 13 01:36:16.836486 jq[1476]: true Sep 13 01:36:16.843054 systemd-logind[1464]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Sep 13 01:36:16.846504 systemd-logind[1464]: New seat seat0. Sep 13 01:36:16.916283 env[1478]: time="2025-09-13T01:36:16.916233664Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Sep 13 01:36:16.988544 env[1478]: time="2025-09-13T01:36:16.988496356Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Sep 13 01:36:16.989442 env[1478]: time="2025-09-13T01:36:16.989420560Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Sep 13 01:36:16.991024 env[1478]: time="2025-09-13T01:36:16.990995995Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.192-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Sep 13 01:36:16.991105 env[1478]: time="2025-09-13T01:36:16.991091240Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Sep 13 01:36:16.991537 env[1478]: time="2025-09-13T01:36:16.991514220Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 13 01:36:16.991614 env[1478]: time="2025-09-13T01:36:16.991599584Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Sep 13 01:36:16.991684 env[1478]: time="2025-09-13T01:36:16.991670267Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Sep 13 01:36:16.991733 env[1478]: time="2025-09-13T01:36:16.991721390Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Sep 13 01:36:16.991858 env[1478]: time="2025-09-13T01:36:16.991843356Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Sep 13 01:36:16.992514 env[1478]: time="2025-09-13T01:36:16.992493627Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Sep 13 01:36:16.992709 env[1478]: time="2025-09-13T01:36:16.992690196Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 13 01:36:16.992780 env[1478]: time="2025-09-13T01:36:16.992767080Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Sep 13 01:36:16.992891 env[1478]: time="2025-09-13T01:36:16.992875205Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Sep 13 01:36:16.992948 env[1478]: time="2025-09-13T01:36:16.992936208Z" level=info msg="metadata content store policy set" policy=shared Sep 13 01:36:17.010738 env[1478]: time="2025-09-13T01:36:17.010694388Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Sep 13 01:36:17.010902 env[1478]: time="2025-09-13T01:36:17.010887757Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Sep 13 01:36:17.010964 env[1478]: time="2025-09-13T01:36:17.010951200Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Sep 13 01:36:17.011044 env[1478]: time="2025-09-13T01:36:17.011030043Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Sep 13 01:36:17.011158 env[1478]: time="2025-09-13T01:36:17.011145808Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Sep 13 01:36:17.011222 env[1478]: time="2025-09-13T01:36:17.011209731Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Sep 13 01:36:17.011283 env[1478]: time="2025-09-13T01:36:17.011270734Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Sep 13 01:36:17.011685 env[1478]: time="2025-09-13T01:36:17.011663592Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Sep 13 01:36:17.011775 env[1478]: time="2025-09-13T01:36:17.011760716Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Sep 13 01:36:17.011833 env[1478]: time="2025-09-13T01:36:17.011820639Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Sep 13 01:36:17.011890 env[1478]: time="2025-09-13T01:36:17.011877561Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Sep 13 01:36:17.011943 env[1478]: time="2025-09-13T01:36:17.011930604Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Sep 13 01:36:17.012118 env[1478]: time="2025-09-13T01:36:17.012102251Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Sep 13 01:36:17.012272 env[1478]: time="2025-09-13T01:36:17.012255618Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Sep 13 01:36:17.012607 env[1478]: time="2025-09-13T01:36:17.012591193Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Sep 13 01:36:17.012698 env[1478]: time="2025-09-13T01:36:17.012683957Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Sep 13 01:36:17.012756 env[1478]: time="2025-09-13T01:36:17.012743160Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Sep 13 01:36:17.012849 env[1478]: time="2025-09-13T01:36:17.012836284Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Sep 13 01:36:17.012962 env[1478]: time="2025-09-13T01:36:17.012948009Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Sep 13 01:36:17.013035 env[1478]: time="2025-09-13T01:36:17.013019812Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Sep 13 01:36:17.013093 env[1478]: time="2025-09-13T01:36:17.013080495Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Sep 13 01:36:17.013150 env[1478]: time="2025-09-13T01:36:17.013136818Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Sep 13 01:36:17.013202 env[1478]: time="2025-09-13T01:36:17.013190820Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Sep 13 01:36:17.013260 env[1478]: time="2025-09-13T01:36:17.013247343Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Sep 13 01:36:17.013315 env[1478]: time="2025-09-13T01:36:17.013303185Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Sep 13 01:36:17.013405 env[1478]: time="2025-09-13T01:36:17.013391389Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Sep 13 01:36:17.013572 env[1478]: time="2025-09-13T01:36:17.013557236Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Sep 13 01:36:17.013638 env[1478]: time="2025-09-13T01:36:17.013625319Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Sep 13 01:36:17.013693 env[1478]: time="2025-09-13T01:36:17.013680722Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Sep 13 01:36:17.013746 env[1478]: time="2025-09-13T01:36:17.013734364Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Sep 13 01:36:17.013821 env[1478]: time="2025-09-13T01:36:17.013804968Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Sep 13 01:36:17.013874 env[1478]: time="2025-09-13T01:36:17.013861650Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Sep 13 01:36:17.013936 env[1478]: time="2025-09-13T01:36:17.013922693Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Sep 13 01:36:17.014011 env[1478]: time="2025-09-13T01:36:17.013998136Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Sep 13 01:36:17.014287 env[1478]: time="2025-09-13T01:36:17.014238507Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Sep 13 01:36:17.015954 systemd[1]: Started containerd.service. Sep 13 01:36:17.050687 extend-filesystems[1456]: Old size kept for /dev/sda9 Sep 13 01:36:17.050687 extend-filesystems[1456]: Found sr0 Sep 13 01:36:17.061742 env[1478]: time="2025-09-13T01:36:17.014499719Z" level=info msg="Connect containerd service" Sep 13 01:36:17.061742 env[1478]: time="2025-09-13T01:36:17.014540680Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Sep 13 01:36:17.061742 env[1478]: time="2025-09-13T01:36:17.015184109Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 13 01:36:17.061742 env[1478]: time="2025-09-13T01:36:17.015777936Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Sep 13 01:36:17.061742 env[1478]: time="2025-09-13T01:36:17.015820218Z" level=info msg=serving... address=/run/containerd/containerd.sock Sep 13 01:36:17.061742 env[1478]: time="2025-09-13T01:36:17.015871740Z" level=info msg="containerd successfully booted in 0.101898s" Sep 13 01:36:17.061742 env[1478]: time="2025-09-13T01:36:17.032185631Z" level=info msg="Start subscribing containerd event" Sep 13 01:36:17.061742 env[1478]: time="2025-09-13T01:36:17.032254594Z" level=info msg="Start recovering state" Sep 13 01:36:17.061742 env[1478]: time="2025-09-13T01:36:17.041366722Z" level=info msg="Start event monitor" Sep 13 01:36:17.061742 env[1478]: time="2025-09-13T01:36:17.042490852Z" level=info msg="Start snapshots syncer" Sep 13 01:36:17.061742 env[1478]: time="2025-09-13T01:36:17.042516493Z" level=info msg="Start cni network conf syncer for default" Sep 13 01:36:17.061742 env[1478]: time="2025-09-13T01:36:17.042532214Z" level=info msg="Start streaming server" Sep 13 01:36:17.041211 systemd[1]: extend-filesystems.service: Deactivated successfully. Sep 13 01:36:17.041410 systemd[1]: Finished extend-filesystems.service. Sep 13 01:36:17.145889 bash[1512]: Updated "/home/core/.ssh/authorized_keys" Sep 13 01:36:17.146700 systemd[1]: Finished update-ssh-keys-after-ignition.service. Sep 13 01:36:17.355391 systemd[1]: nvidia.service: Deactivated successfully. Sep 13 01:36:17.579980 systemd[1]: Started kubelet.service. Sep 13 01:36:18.045609 kubelet[1556]: E0913 01:36:18.045549 1556 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 01:36:18.047354 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 01:36:18.047489 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 01:36:18.123588 dbus-daemon[1454]: [system] SELinux support is enabled Sep 13 01:36:18.123757 systemd[1]: Started dbus.service. Sep 13 01:36:18.129693 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Sep 13 01:36:18.130200 dbus-daemon[1454]: [system] Successfully activated service 'org.freedesktop.systemd1' Sep 13 01:36:18.129721 systemd[1]: Reached target system-config.target. Sep 13 01:36:18.134638 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Sep 13 01:36:18.134659 systemd[1]: Reached target user-config.target. Sep 13 01:36:18.139734 systemd[1]: Started systemd-logind.service. Sep 13 01:36:18.381013 update_engine[1465]: I0913 01:36:18.347481 1465 main.cc:92] Flatcar Update Engine starting Sep 13 01:36:18.519065 sshd_keygen[1472]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Sep 13 01:36:18.527882 systemd[1]: Started update-engine.service. Sep 13 01:36:18.528246 update_engine[1465]: I0913 01:36:18.527928 1465 update_check_scheduler.cc:74] Next update check in 10m57s Sep 13 01:36:18.535520 systemd[1]: Started locksmithd.service. Sep 13 01:36:18.541671 systemd[1]: Finished sshd-keygen.service. Sep 13 01:36:18.548669 systemd[1]: Starting issuegen.service... Sep 13 01:36:18.554904 systemd[1]: Started waagent.service. Sep 13 01:36:18.559796 systemd[1]: issuegen.service: Deactivated successfully. Sep 13 01:36:18.559959 systemd[1]: Finished issuegen.service. Sep 13 01:36:18.565936 systemd[1]: Starting systemd-user-sessions.service... Sep 13 01:36:18.669075 systemd[1]: Finished systemd-user-sessions.service. Sep 13 01:36:18.676608 systemd[1]: Started getty@tty1.service. Sep 13 01:36:18.687581 systemd[1]: Started serial-getty@ttyAMA0.service. Sep 13 01:36:18.692607 systemd[1]: Reached target getty.target. Sep 13 01:36:18.696760 systemd[1]: Reached target multi-user.target. Sep 13 01:36:18.702592 systemd[1]: Starting systemd-update-utmp-runlevel.service... Sep 13 01:36:18.710423 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Sep 13 01:36:18.710586 systemd[1]: Finished systemd-update-utmp-runlevel.service. Sep 13 01:36:18.717233 systemd[1]: Startup finished in 744ms (kernel) + 23.598s (initrd) + 59.629s (userspace) = 1min 23.972s. Sep 13 01:36:20.936193 login[1577]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Sep 13 01:36:21.012067 login[1576]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Sep 13 01:36:21.423062 systemd[1]: Created slice user-500.slice. Sep 13 01:36:21.424188 systemd[1]: Starting user-runtime-dir@500.service... Sep 13 01:36:21.426240 systemd-logind[1464]: New session 1 of user core. Sep 13 01:36:21.532797 locksmithd[1569]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Sep 13 01:36:21.544758 systemd[1]: Finished user-runtime-dir@500.service. Sep 13 01:36:21.546234 systemd[1]: Starting user@500.service... Sep 13 01:36:21.697208 (systemd)[1585]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Sep 13 01:36:21.937645 login[1577]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Sep 13 01:36:21.941645 systemd-logind[1464]: New session 2 of user core. Sep 13 01:36:23.026851 systemd[1585]: Queued start job for default target default.target. Sep 13 01:36:23.027664 systemd[1585]: Reached target paths.target. Sep 13 01:36:23.027779 systemd[1585]: Reached target sockets.target. Sep 13 01:36:23.027853 systemd[1585]: Reached target timers.target. Sep 13 01:36:23.027939 systemd[1585]: Reached target basic.target. Sep 13 01:36:23.028090 systemd[1]: Started user@500.service. Sep 13 01:36:23.028701 systemd[1585]: Reached target default.target. Sep 13 01:36:23.028739 systemd[1585]: Startup finished in 1.325s. Sep 13 01:36:23.028900 systemd[1]: Started session-1.scope. Sep 13 01:36:23.029431 systemd[1]: Started session-2.scope. Sep 13 01:36:28.125069 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Sep 13 01:36:28.125245 systemd[1]: Stopped kubelet.service. Sep 13 01:36:28.126617 systemd[1]: Starting kubelet.service... Sep 13 01:36:28.276575 systemd[1]: Started kubelet.service. Sep 13 01:36:28.347356 kubelet[1609]: E0913 01:36:28.347297 1609 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 01:36:28.350011 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 01:36:28.350133 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 01:36:38.229419 waagent[1572]: 2025-09-13T01:36:38.229288Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Sep 13 01:36:38.304345 waagent[1572]: 2025-09-13T01:36:38.304244Z INFO Daemon Daemon OS: flatcar 3510.3.8 Sep 13 01:36:38.308881 waagent[1572]: 2025-09-13T01:36:38.308816Z INFO Daemon Daemon Python: 3.9.16 Sep 13 01:36:38.317342 waagent[1572]: 2025-09-13T01:36:38.313668Z INFO Daemon Daemon Run daemon Sep 13 01:36:38.317744 waagent[1572]: 2025-09-13T01:36:38.317688Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.8' Sep 13 01:36:38.364127 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Sep 13 01:36:38.364271 systemd[1]: Stopped kubelet.service. Sep 13 01:36:38.365591 systemd[1]: Starting kubelet.service... Sep 13 01:36:38.370968 waagent[1572]: 2025-09-13T01:36:38.368094Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Sep 13 01:36:38.383665 waagent[1572]: 2025-09-13T01:36:38.383511Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Sep 13 01:36:38.393531 waagent[1572]: 2025-09-13T01:36:38.393429Z INFO Daemon Daemon cloud-init is enabled: False Sep 13 01:36:38.398918 waagent[1572]: 2025-09-13T01:36:38.398817Z INFO Daemon Daemon Using waagent for provisioning Sep 13 01:36:38.404675 waagent[1572]: 2025-09-13T01:36:38.404585Z INFO Daemon Daemon Activate resource disk Sep 13 01:36:38.409582 waagent[1572]: 2025-09-13T01:36:38.409499Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Sep 13 01:36:38.424135 waagent[1572]: 2025-09-13T01:36:38.424018Z INFO Daemon Daemon Found device: None Sep 13 01:36:38.429171 waagent[1572]: 2025-09-13T01:36:38.429074Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Sep 13 01:36:38.437419 waagent[1572]: 2025-09-13T01:36:38.437314Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Sep 13 01:36:38.449719 waagent[1572]: 2025-09-13T01:36:38.449624Z INFO Daemon Daemon Clean protocol and wireserver endpoint Sep 13 01:36:38.456350 waagent[1572]: 2025-09-13T01:36:38.456257Z INFO Daemon Daemon Running default provisioning handler Sep 13 01:36:38.470180 waagent[1572]: 2025-09-13T01:36:38.470034Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Sep 13 01:36:38.485805 waagent[1572]: 2025-09-13T01:36:38.485590Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Sep 13 01:36:38.499113 waagent[1572]: 2025-09-13T01:36:38.497817Z INFO Daemon Daemon cloud-init is enabled: False Sep 13 01:36:38.503352 systemd[1]: Started kubelet.service. Sep 13 01:36:38.504638 waagent[1572]: 2025-09-13T01:36:38.504552Z INFO Daemon Daemon Copying ovf-env.xml Sep 13 01:36:38.611426 kubelet[1624]: E0913 01:36:38.611386 1624 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 01:36:38.613145 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 01:36:38.613274 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 01:36:38.756776 kernel: hv_balloon: Max. dynamic memory size: 4096 MB Sep 13 01:36:39.187161 waagent[1572]: 2025-09-13T01:36:39.187012Z INFO Daemon Daemon Successfully mounted dvd Sep 13 01:36:39.485664 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Sep 13 01:36:39.585578 waagent[1572]: 2025-09-13T01:36:39.585430Z INFO Daemon Daemon Detect protocol endpoint Sep 13 01:36:39.591422 waagent[1572]: 2025-09-13T01:36:39.591311Z INFO Daemon Daemon Clean protocol and wireserver endpoint Sep 13 01:36:39.597273 waagent[1572]: 2025-09-13T01:36:39.597203Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Sep 13 01:36:39.603754 waagent[1572]: 2025-09-13T01:36:39.603692Z INFO Daemon Daemon Test for route to 168.63.129.16 Sep 13 01:36:39.609376 waagent[1572]: 2025-09-13T01:36:39.609303Z INFO Daemon Daemon Route to 168.63.129.16 exists Sep 13 01:36:39.614647 waagent[1572]: 2025-09-13T01:36:39.614590Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Sep 13 01:36:39.937715 waagent[1572]: 2025-09-13T01:36:39.937647Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Sep 13 01:36:39.944959 waagent[1572]: 2025-09-13T01:36:39.944913Z INFO Daemon Daemon Wire protocol version:2012-11-30 Sep 13 01:36:39.951111 waagent[1572]: 2025-09-13T01:36:39.951035Z INFO Daemon Daemon Server preferred version:2015-04-05 Sep 13 01:36:40.633110 waagent[1572]: 2025-09-13T01:36:40.632949Z INFO Daemon Daemon Initializing goal state during protocol detection Sep 13 01:36:40.685185 waagent[1572]: 2025-09-13T01:36:40.685101Z INFO Daemon Daemon Forcing an update of the goal state.. Sep 13 01:36:40.691201 waagent[1572]: 2025-09-13T01:36:40.691132Z INFO Daemon Daemon Fetching goal state [incarnation 1] Sep 13 01:36:40.857198 waagent[1572]: 2025-09-13T01:36:40.857065Z INFO Daemon Daemon Found private key matching thumbprint 499CDC2077E44763DE5E53C940978CCE2494F896 Sep 13 01:36:40.868513 waagent[1572]: 2025-09-13T01:36:40.868415Z INFO Daemon Daemon Fetch goal state completed Sep 13 01:36:40.896523 waagent[1572]: 2025-09-13T01:36:40.896417Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: b18503ba-c7ad-4102-9bda-6d1f3d7f94b4 New eTag: 1966467243733203254] Sep 13 01:36:40.907827 waagent[1572]: 2025-09-13T01:36:40.907727Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Sep 13 01:36:40.963069 waagent[1572]: 2025-09-13T01:36:40.963003Z INFO Daemon Daemon Starting provisioning Sep 13 01:36:40.968666 waagent[1572]: 2025-09-13T01:36:40.968576Z INFO Daemon Daemon Handle ovf-env.xml. Sep 13 01:36:40.974318 waagent[1572]: 2025-09-13T01:36:40.974240Z INFO Daemon Daemon Set hostname [ci-3510.3.8-n-94f5c418a3] Sep 13 01:36:41.093689 waagent[1572]: 2025-09-13T01:36:41.093562Z INFO Daemon Daemon Publish hostname [ci-3510.3.8-n-94f5c418a3] Sep 13 01:36:41.100439 waagent[1572]: 2025-09-13T01:36:41.100357Z INFO Daemon Daemon Examine /proc/net/route for primary interface Sep 13 01:36:41.106946 waagent[1572]: 2025-09-13T01:36:41.106879Z INFO Daemon Daemon Primary interface is [eth0] Sep 13 01:36:41.123191 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Sep 13 01:36:41.123372 systemd[1]: Stopped systemd-networkd-wait-online.service. Sep 13 01:36:41.123427 systemd[1]: Stopping systemd-networkd-wait-online.service... Sep 13 01:36:41.123655 systemd[1]: Stopping systemd-networkd.service... Sep 13 01:36:41.128383 systemd-networkd[1249]: eth0: DHCPv6 lease lost Sep 13 01:36:41.130042 systemd[1]: systemd-networkd.service: Deactivated successfully. Sep 13 01:36:41.130217 systemd[1]: Stopped systemd-networkd.service. Sep 13 01:36:41.132390 systemd[1]: Starting systemd-networkd.service... Sep 13 01:36:41.161154 systemd-networkd[1645]: enP5747s1: Link UP Sep 13 01:36:41.161166 systemd-networkd[1645]: enP5747s1: Gained carrier Sep 13 01:36:41.162184 systemd-networkd[1645]: eth0: Link UP Sep 13 01:36:41.162195 systemd-networkd[1645]: eth0: Gained carrier Sep 13 01:36:41.162607 systemd-networkd[1645]: lo: Link UP Sep 13 01:36:41.162616 systemd-networkd[1645]: lo: Gained carrier Sep 13 01:36:41.162853 systemd-networkd[1645]: eth0: Gained IPv6LL Sep 13 01:36:41.163987 systemd-networkd[1645]: Enumeration completed Sep 13 01:36:41.164102 systemd[1]: Started systemd-networkd.service. Sep 13 01:36:41.165813 systemd[1]: Starting systemd-networkd-wait-online.service... Sep 13 01:36:41.171785 waagent[1572]: 2025-09-13T01:36:41.166260Z INFO Daemon Daemon Create user account if not exists Sep 13 01:36:41.173198 waagent[1572]: 2025-09-13T01:36:41.173114Z INFO Daemon Daemon User core already exists, skip useradd Sep 13 01:36:41.173400 systemd-networkd[1645]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 13 01:36:41.180316 waagent[1572]: 2025-09-13T01:36:41.180220Z INFO Daemon Daemon Configure sudoer Sep 13 01:36:41.196442 systemd-networkd[1645]: eth0: DHCPv4 address 10.200.20.13/24, gateway 10.200.20.1 acquired from 168.63.129.16 Sep 13 01:36:41.198672 systemd[1]: Finished systemd-networkd-wait-online.service. Sep 13 01:36:41.217988 waagent[1572]: 2025-09-13T01:36:41.217892Z INFO Daemon Daemon Configure sshd Sep 13 01:36:41.222241 waagent[1572]: 2025-09-13T01:36:41.222172Z INFO Daemon Daemon Deploy ssh public key. Sep 13 01:36:42.602676 waagent[1572]: 2025-09-13T01:36:42.602587Z INFO Daemon Daemon Provisioning complete Sep 13 01:36:42.620581 waagent[1572]: 2025-09-13T01:36:42.620515Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Sep 13 01:36:42.626998 waagent[1572]: 2025-09-13T01:36:42.626931Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Sep 13 01:36:42.638616 waagent[1572]: 2025-09-13T01:36:42.638537Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Sep 13 01:36:42.946504 waagent[1651]: 2025-09-13T01:36:42.946405Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Sep 13 01:36:42.947293 waagent[1651]: 2025-09-13T01:36:42.947225Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 13 01:36:42.947455 waagent[1651]: 2025-09-13T01:36:42.947406Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 13 01:36:42.960133 waagent[1651]: 2025-09-13T01:36:42.960055Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Sep 13 01:36:42.960320 waagent[1651]: 2025-09-13T01:36:42.960267Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Sep 13 01:36:43.020315 waagent[1651]: 2025-09-13T01:36:43.020170Z INFO ExtHandler ExtHandler Found private key matching thumbprint 499CDC2077E44763DE5E53C940978CCE2494F896 Sep 13 01:36:43.020649 waagent[1651]: 2025-09-13T01:36:43.020592Z INFO ExtHandler ExtHandler Fetch goal state completed Sep 13 01:36:43.035886 waagent[1651]: 2025-09-13T01:36:43.035818Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: b45612a0-3e0f-4257-8dd8-c8c8e46b58f6 New eTag: 1966467243733203254] Sep 13 01:36:43.036525 waagent[1651]: 2025-09-13T01:36:43.036460Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Sep 13 01:36:43.272423 waagent[1651]: 2025-09-13T01:36:43.271930Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.8; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Sep 13 01:36:43.342004 waagent[1651]: 2025-09-13T01:36:43.341907Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1651 Sep 13 01:36:43.345916 waagent[1651]: 2025-09-13T01:36:43.345847Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.8', '', 'Flatcar Container Linux by Kinvolk'] Sep 13 01:36:43.347248 waagent[1651]: 2025-09-13T01:36:43.347174Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Sep 13 01:36:43.672999 waagent[1651]: 2025-09-13T01:36:43.672911Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Sep 13 01:36:43.673443 waagent[1651]: 2025-09-13T01:36:43.673380Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Sep 13 01:36:43.681262 waagent[1651]: 2025-09-13T01:36:43.681211Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Sep 13 01:36:43.681932 waagent[1651]: 2025-09-13T01:36:43.681875Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Sep 13 01:36:43.683180 waagent[1651]: 2025-09-13T01:36:43.683116Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Sep 13 01:36:43.684709 waagent[1651]: 2025-09-13T01:36:43.684633Z INFO ExtHandler ExtHandler Starting env monitor service. Sep 13 01:36:43.685030 waagent[1651]: 2025-09-13T01:36:43.684951Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 13 01:36:43.685571 waagent[1651]: 2025-09-13T01:36:43.685496Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 13 01:36:43.686216 waagent[1651]: 2025-09-13T01:36:43.686146Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Sep 13 01:36:43.686583 waagent[1651]: 2025-09-13T01:36:43.686518Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Sep 13 01:36:43.686583 waagent[1651]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Sep 13 01:36:43.686583 waagent[1651]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Sep 13 01:36:43.686583 waagent[1651]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Sep 13 01:36:43.686583 waagent[1651]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Sep 13 01:36:43.686583 waagent[1651]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Sep 13 01:36:43.686583 waagent[1651]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Sep 13 01:36:43.688978 waagent[1651]: 2025-09-13T01:36:43.688805Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Sep 13 01:36:43.689331 waagent[1651]: 2025-09-13T01:36:43.689250Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 13 01:36:43.690167 waagent[1651]: 2025-09-13T01:36:43.690096Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 13 01:36:43.690790 waagent[1651]: 2025-09-13T01:36:43.690720Z INFO EnvHandler ExtHandler Configure routes Sep 13 01:36:43.690951 waagent[1651]: 2025-09-13T01:36:43.690902Z INFO EnvHandler ExtHandler Gateway:None Sep 13 01:36:43.691075 waagent[1651]: 2025-09-13T01:36:43.691029Z INFO EnvHandler ExtHandler Routes:None Sep 13 01:36:43.691996 waagent[1651]: 2025-09-13T01:36:43.691930Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Sep 13 01:36:43.692166 waagent[1651]: 2025-09-13T01:36:43.692083Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Sep 13 01:36:43.692960 waagent[1651]: 2025-09-13T01:36:43.692881Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Sep 13 01:36:43.693160 waagent[1651]: 2025-09-13T01:36:43.693077Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Sep 13 01:36:43.693455 waagent[1651]: 2025-09-13T01:36:43.693390Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Sep 13 01:36:43.703615 waagent[1651]: 2025-09-13T01:36:43.703538Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Sep 13 01:36:43.705080 waagent[1651]: 2025-09-13T01:36:43.705011Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Sep 13 01:36:43.707030 waagent[1651]: 2025-09-13T01:36:43.706962Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Sep 13 01:36:43.753815 waagent[1651]: 2025-09-13T01:36:43.753737Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Sep 13 01:36:43.815539 waagent[1651]: 2025-09-13T01:36:43.815407Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1645' Sep 13 01:36:44.064711 waagent[1651]: 2025-09-13T01:36:44.064512Z INFO MonitorHandler ExtHandler Network interfaces: Sep 13 01:36:44.064711 waagent[1651]: Executing ['ip', '-a', '-o', 'link']: Sep 13 01:36:44.064711 waagent[1651]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Sep 13 01:36:44.064711 waagent[1651]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:06:7c:d4 brd ff:ff:ff:ff:ff:ff Sep 13 01:36:44.064711 waagent[1651]: 3: enP5747s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:06:7c:d4 brd ff:ff:ff:ff:ff:ff\ altname enP5747p0s2 Sep 13 01:36:44.064711 waagent[1651]: Executing ['ip', '-4', '-a', '-o', 'address']: Sep 13 01:36:44.064711 waagent[1651]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Sep 13 01:36:44.064711 waagent[1651]: 2: eth0 inet 10.200.20.13/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Sep 13 01:36:44.064711 waagent[1651]: Executing ['ip', '-6', '-a', '-o', 'address']: Sep 13 01:36:44.064711 waagent[1651]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Sep 13 01:36:44.064711 waagent[1651]: 2: eth0 inet6 fe80::20d:3aff:fe06:7cd4/64 scope link \ valid_lft forever preferred_lft forever Sep 13 01:36:44.144421 waagent[1651]: 2025-09-13T01:36:44.144358Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.14.0.1 -- exiting Sep 13 01:36:44.642810 waagent[1572]: 2025-09-13T01:36:44.642664Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Sep 13 01:36:44.648461 waagent[1572]: 2025-09-13T01:36:44.648406Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.14.0.1 to be the latest agent Sep 13 01:36:45.998050 waagent[1681]: 2025-09-13T01:36:45.997958Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.14.0.1) Sep 13 01:36:45.999071 waagent[1681]: 2025-09-13T01:36:45.999017Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.8 Sep 13 01:36:45.999315 waagent[1681]: 2025-09-13T01:36:45.999268Z INFO ExtHandler ExtHandler Python: 3.9.16 Sep 13 01:36:45.999579 waagent[1681]: 2025-09-13T01:36:45.999530Z INFO ExtHandler ExtHandler CPU Arch: aarch64 Sep 13 01:36:46.013582 waagent[1681]: 2025-09-13T01:36:46.013467Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.8; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: aarch64; systemd: True; systemd_version: systemd 252 (252); LISDrivers: Absent; logrotate: logrotate 3.20.1; Sep 13 01:36:46.014166 waagent[1681]: 2025-09-13T01:36:46.014114Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 13 01:36:46.014453 waagent[1681]: 2025-09-13T01:36:46.014403Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 13 01:36:46.014792 waagent[1681]: 2025-09-13T01:36:46.014741Z INFO ExtHandler ExtHandler Initializing the goal state... Sep 13 01:36:46.028487 waagent[1681]: 2025-09-13T01:36:46.028420Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Sep 13 01:36:46.041079 waagent[1681]: 2025-09-13T01:36:46.041023Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.175 Sep 13 01:36:46.042287 waagent[1681]: 2025-09-13T01:36:46.042233Z INFO ExtHandler Sep 13 01:36:46.042636 waagent[1681]: 2025-09-13T01:36:46.042584Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: fd1ce48f-d8da-4e5f-bb6a-f7bdc9e9059b eTag: 1966467243733203254 source: Fabric] Sep 13 01:36:46.043520 waagent[1681]: 2025-09-13T01:36:46.043465Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Sep 13 01:36:46.044870 waagent[1681]: 2025-09-13T01:36:46.044813Z INFO ExtHandler Sep 13 01:36:46.045117 waagent[1681]: 2025-09-13T01:36:46.045070Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Sep 13 01:36:46.052117 waagent[1681]: 2025-09-13T01:36:46.052072Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Sep 13 01:36:46.052736 waagent[1681]: 2025-09-13T01:36:46.052691Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Sep 13 01:36:46.072716 waagent[1681]: 2025-09-13T01:36:46.072653Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Sep 13 01:36:46.136574 waagent[1681]: 2025-09-13T01:36:46.136440Z INFO ExtHandler Downloaded certificate {'thumbprint': '499CDC2077E44763DE5E53C940978CCE2494F896', 'hasPrivateKey': True} Sep 13 01:36:46.138148 waagent[1681]: 2025-09-13T01:36:46.138088Z INFO ExtHandler Fetch goal state from WireServer completed Sep 13 01:36:46.139183 waagent[1681]: 2025-09-13T01:36:46.139127Z INFO ExtHandler ExtHandler Goal state initialization completed. Sep 13 01:36:46.158073 waagent[1681]: 2025-09-13T01:36:46.157977Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.15 3 Sep 2024 (Library: OpenSSL 3.0.15 3 Sep 2024) Sep 13 01:36:46.166142 waagent[1681]: 2025-09-13T01:36:46.166052Z INFO ExtHandler ExtHandler Using iptables [version 1.8.8] to manage firewall rules Sep 13 01:36:46.169800 waagent[1681]: 2025-09-13T01:36:46.169710Z INFO ExtHandler ExtHandler Did not find a legacy firewall rule: ['iptables', '-w', '-t', 'security', '-C', 'OUTPUT', '-d', '168.63.129.16', '-p', 'tcp', '-m', 'conntrack', '--ctstate', 'INVALID,NEW', '-j', 'ACCEPT'] Sep 13 01:36:46.170117 waagent[1681]: 2025-09-13T01:36:46.170067Z INFO ExtHandler ExtHandler Checking state of the firewall Sep 13 01:36:46.613762 waagent[1681]: 2025-09-13T01:36:46.613636Z INFO ExtHandler ExtHandler Created firewall rules for Azure Fabric: Sep 13 01:36:46.613762 waagent[1681]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Sep 13 01:36:46.613762 waagent[1681]: pkts bytes target prot opt in out source destination Sep 13 01:36:46.613762 waagent[1681]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Sep 13 01:36:46.613762 waagent[1681]: pkts bytes target prot opt in out source destination Sep 13 01:36:46.613762 waagent[1681]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Sep 13 01:36:46.613762 waagent[1681]: pkts bytes target prot opt in out source destination Sep 13 01:36:46.613762 waagent[1681]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Sep 13 01:36:46.613762 waagent[1681]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Sep 13 01:36:46.613762 waagent[1681]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Sep 13 01:36:46.615287 waagent[1681]: 2025-09-13T01:36:46.615230Z INFO ExtHandler ExtHandler Setting up persistent firewall rules Sep 13 01:36:46.618272 waagent[1681]: 2025-09-13T01:36:46.618164Z INFO ExtHandler ExtHandler The firewalld service is not present on the system Sep 13 01:36:46.618693 waagent[1681]: 2025-09-13T01:36:46.618641Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Sep 13 01:36:46.619196 waagent[1681]: 2025-09-13T01:36:46.619142Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Sep 13 01:36:46.627031 waagent[1681]: 2025-09-13T01:36:46.626978Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Sep 13 01:36:46.627685 waagent[1681]: 2025-09-13T01:36:46.627632Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Sep 13 01:36:46.636071 waagent[1681]: 2025-09-13T01:36:46.636014Z INFO ExtHandler ExtHandler WALinuxAgent-2.14.0.1 running as process 1681 Sep 13 01:36:46.639514 waagent[1681]: 2025-09-13T01:36:46.639455Z INFO ExtHandler ExtHandler [CGI] Cgroups is not currently supported on ['flatcar', '3510.3.8', '', 'Flatcar Container Linux by Kinvolk'] Sep 13 01:36:46.640438 waagent[1681]: 2025-09-13T01:36:46.640383Z INFO ExtHandler ExtHandler [CGI] Agent will reset the quotas in case cgroup usage went from enabled to disabled Sep 13 01:36:46.641466 waagent[1681]: 2025-09-13T01:36:46.641412Z INFO ExtHandler ExtHandler [CGI] Agent cgroups enabled: False Sep 13 01:36:46.644327 waagent[1681]: 2025-09-13T01:36:46.644271Z INFO ExtHandler ExtHandler Signing certificate written to /var/lib/waagent/microsoft_root_certificate.pem Sep 13 01:36:46.644817 waagent[1681]: 2025-09-13T01:36:46.644761Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: 1. configuration enabled [True], 2. cgroups v1 enabled [False] OR cgroups v2 is in use and v2 resource limiting configuration enabled [False], 3. python supported: [True] Sep 13 01:36:46.646273 waagent[1681]: 2025-09-13T01:36:46.646208Z INFO ExtHandler ExtHandler Starting env monitor service. Sep 13 01:36:46.646584 waagent[1681]: 2025-09-13T01:36:46.646522Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 13 01:36:46.646785 waagent[1681]: 2025-09-13T01:36:46.646733Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 13 01:36:46.647792 waagent[1681]: 2025-09-13T01:36:46.647720Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Sep 13 01:36:46.648203 waagent[1681]: 2025-09-13T01:36:46.648140Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Sep 13 01:36:46.648203 waagent[1681]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Sep 13 01:36:46.648203 waagent[1681]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Sep 13 01:36:46.648203 waagent[1681]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Sep 13 01:36:46.648203 waagent[1681]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Sep 13 01:36:46.648203 waagent[1681]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Sep 13 01:36:46.648203 waagent[1681]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Sep 13 01:36:46.650991 waagent[1681]: 2025-09-13T01:36:46.650888Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Sep 13 01:36:46.651222 waagent[1681]: 2025-09-13T01:36:46.651159Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 13 01:36:46.651560 waagent[1681]: 2025-09-13T01:36:46.651480Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 13 01:36:46.652780 waagent[1681]: 2025-09-13T01:36:46.652710Z INFO EnvHandler ExtHandler Configure routes Sep 13 01:36:46.654641 waagent[1681]: 2025-09-13T01:36:46.654508Z INFO EnvHandler ExtHandler Gateway:None Sep 13 01:36:46.654963 waagent[1681]: 2025-09-13T01:36:46.654909Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Sep 13 01:36:46.655186 waagent[1681]: 2025-09-13T01:36:46.655129Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Sep 13 01:36:46.655953 waagent[1681]: 2025-09-13T01:36:46.655886Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Sep 13 01:36:46.656717 waagent[1681]: 2025-09-13T01:36:46.656653Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Sep 13 01:36:46.657159 waagent[1681]: 2025-09-13T01:36:46.657094Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Sep 13 01:36:46.657975 waagent[1681]: 2025-09-13T01:36:46.657912Z INFO EnvHandler ExtHandler Routes:None Sep 13 01:36:46.673555 waagent[1681]: 2025-09-13T01:36:46.673470Z INFO MonitorHandler ExtHandler Network interfaces: Sep 13 01:36:46.673555 waagent[1681]: Executing ['ip', '-a', '-o', 'link']: Sep 13 01:36:46.673555 waagent[1681]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Sep 13 01:36:46.673555 waagent[1681]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:06:7c:d4 brd ff:ff:ff:ff:ff:ff Sep 13 01:36:46.673555 waagent[1681]: 3: enP5747s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:06:7c:d4 brd ff:ff:ff:ff:ff:ff\ altname enP5747p0s2 Sep 13 01:36:46.673555 waagent[1681]: Executing ['ip', '-4', '-a', '-o', 'address']: Sep 13 01:36:46.673555 waagent[1681]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Sep 13 01:36:46.673555 waagent[1681]: 2: eth0 inet 10.200.20.13/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Sep 13 01:36:46.673555 waagent[1681]: Executing ['ip', '-6', '-a', '-o', 'address']: Sep 13 01:36:46.673555 waagent[1681]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Sep 13 01:36:46.673555 waagent[1681]: 2: eth0 inet6 fe80::20d:3aff:fe06:7cd4/64 scope link \ valid_lft forever preferred_lft forever Sep 13 01:36:46.697555 waagent[1681]: 2025-09-13T01:36:46.697474Z INFO ExtHandler ExtHandler Downloading agent manifest Sep 13 01:36:46.711377 waagent[1681]: 2025-09-13T01:36:46.711296Z INFO ExtHandler ExtHandler Sep 13 01:36:46.711696 waagent[1681]: 2025-09-13T01:36:46.711645Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: e21d0903-54b8-4b4b-a110-0dabe433c1cf correlation 1825b45e-edee-4cc6-a2d7-220a3ed9d90c created: 2025-09-13T01:33:21.478683Z] Sep 13 01:36:46.712834 waagent[1681]: 2025-09-13T01:36:46.712766Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Sep 13 01:36:46.714974 waagent[1681]: 2025-09-13T01:36:46.714913Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 3 ms] Sep 13 01:36:46.734783 waagent[1681]: 2025-09-13T01:36:46.734722Z INFO ExtHandler ExtHandler Looking for existing remote access users. Sep 13 01:36:46.737325 waagent[1681]: 2025-09-13T01:36:46.737265Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.14.0.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: F3F00A92-D06F-48E7-B26C-A80D3DF7A599;UpdateGSErrors: 0;AutoUpdate: 1;UpdateMode: SelfUpdate;] Sep 13 01:36:46.787635 waagent[1681]: 2025-09-13T01:36:46.787528Z INFO EnvHandler ExtHandler Using iptables [version 1.8.8] to manage firewall rules Sep 13 01:36:46.798602 waagent[1681]: 2025-09-13T01:36:46.798537Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Sep 13 01:36:48.625166 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Sep 13 01:36:48.625358 systemd[1]: Stopped kubelet.service. Sep 13 01:36:48.626733 systemd[1]: Starting kubelet.service... Sep 13 01:36:48.715316 systemd[1]: Started kubelet.service. Sep 13 01:36:48.861313 kubelet[1726]: E0913 01:36:48.861271 1726 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 01:36:48.863318 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 01:36:48.863456 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 01:36:58.875172 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Sep 13 01:36:58.875371 systemd[1]: Stopped kubelet.service. Sep 13 01:36:58.876677 systemd[1]: Starting kubelet.service... Sep 13 01:36:59.108601 systemd[1]: Started kubelet.service. Sep 13 01:36:59.141194 kubelet[1738]: E0913 01:36:59.141105 1738 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 01:36:59.143232 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 01:36:59.143375 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 01:37:03.767939 update_engine[1465]: I0913 01:37:03.767895 1465 update_attempter.cc:509] Updating boot flags... Sep 13 01:37:08.759571 systemd[1]: Created slice system-sshd.slice. Sep 13 01:37:08.760988 systemd[1]: Started sshd@0-10.200.20.13:22-10.200.16.10:38728.service. Sep 13 01:37:09.375182 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 5. Sep 13 01:37:09.375378 systemd[1]: Stopped kubelet.service. Sep 13 01:37:09.376717 systemd[1]: Starting kubelet.service... Sep 13 01:37:09.901560 systemd[1]: Started kubelet.service. Sep 13 01:37:09.933046 kubelet[1789]: E0913 01:37:09.932983 1789 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 01:37:09.934690 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 01:37:09.934806 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 01:37:09.937827 sshd[1783]: Accepted publickey for core from 10.200.16.10 port 38728 ssh2: RSA SHA256:2vdFvqmv97G7XTFyIQCFZZcqRFoIpW6ty3nYdUf/oyk Sep 13 01:37:09.977330 sshd[1783]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 01:37:09.981091 systemd-logind[1464]: New session 3 of user core. Sep 13 01:37:09.981506 systemd[1]: Started session-3.scope. Sep 13 01:37:10.306143 systemd[1]: Started sshd@1-10.200.20.13:22-10.200.16.10:52726.service. Sep 13 01:37:10.719711 sshd[1797]: Accepted publickey for core from 10.200.16.10 port 52726 ssh2: RSA SHA256:2vdFvqmv97G7XTFyIQCFZZcqRFoIpW6ty3nYdUf/oyk Sep 13 01:37:10.721279 sshd[1797]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 01:37:10.725324 systemd[1]: Started session-4.scope. Sep 13 01:37:10.725845 systemd-logind[1464]: New session 4 of user core. Sep 13 01:37:11.056212 sshd[1797]: pam_unix(sshd:session): session closed for user core Sep 13 01:37:11.058787 systemd[1]: sshd@1-10.200.20.13:22-10.200.16.10:52726.service: Deactivated successfully. Sep 13 01:37:11.059490 systemd[1]: session-4.scope: Deactivated successfully. Sep 13 01:37:11.059986 systemd-logind[1464]: Session 4 logged out. Waiting for processes to exit. Sep 13 01:37:11.060704 systemd-logind[1464]: Removed session 4. Sep 13 01:37:11.124301 systemd[1]: Started sshd@2-10.200.20.13:22-10.200.16.10:52728.service. Sep 13 01:37:11.538143 sshd[1803]: Accepted publickey for core from 10.200.16.10 port 52728 ssh2: RSA SHA256:2vdFvqmv97G7XTFyIQCFZZcqRFoIpW6ty3nYdUf/oyk Sep 13 01:37:11.539716 sshd[1803]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 01:37:11.543331 systemd-logind[1464]: New session 5 of user core. Sep 13 01:37:11.543766 systemd[1]: Started session-5.scope. Sep 13 01:37:11.859283 sshd[1803]: pam_unix(sshd:session): session closed for user core Sep 13 01:37:11.861816 systemd[1]: sshd@2-10.200.20.13:22-10.200.16.10:52728.service: Deactivated successfully. Sep 13 01:37:11.862487 systemd[1]: session-5.scope: Deactivated successfully. Sep 13 01:37:11.863012 systemd-logind[1464]: Session 5 logged out. Waiting for processes to exit. Sep 13 01:37:11.863836 systemd-logind[1464]: Removed session 5. Sep 13 01:37:11.932621 systemd[1]: Started sshd@3-10.200.20.13:22-10.200.16.10:52736.service. Sep 13 01:37:12.349459 sshd[1809]: Accepted publickey for core from 10.200.16.10 port 52736 ssh2: RSA SHA256:2vdFvqmv97G7XTFyIQCFZZcqRFoIpW6ty3nYdUf/oyk Sep 13 01:37:12.350749 sshd[1809]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 01:37:12.354653 systemd-logind[1464]: New session 6 of user core. Sep 13 01:37:12.355029 systemd[1]: Started session-6.scope. Sep 13 01:37:12.657651 sshd[1809]: pam_unix(sshd:session): session closed for user core Sep 13 01:37:12.660078 systemd[1]: sshd@3-10.200.20.13:22-10.200.16.10:52736.service: Deactivated successfully. Sep 13 01:37:12.660763 systemd[1]: session-6.scope: Deactivated successfully. Sep 13 01:37:12.661217 systemd-logind[1464]: Session 6 logged out. Waiting for processes to exit. Sep 13 01:37:12.662096 systemd-logind[1464]: Removed session 6. Sep 13 01:37:12.726529 systemd[1]: Started sshd@4-10.200.20.13:22-10.200.16.10:52752.service. Sep 13 01:37:13.143417 sshd[1815]: Accepted publickey for core from 10.200.16.10 port 52752 ssh2: RSA SHA256:2vdFvqmv97G7XTFyIQCFZZcqRFoIpW6ty3nYdUf/oyk Sep 13 01:37:13.144700 sshd[1815]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 01:37:13.148473 systemd-logind[1464]: New session 7 of user core. Sep 13 01:37:13.148894 systemd[1]: Started session-7.scope. Sep 13 01:37:14.219616 sudo[1818]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Sep 13 01:37:14.220159 sudo[1818]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 01:37:14.329528 dbus-daemon[1454]: avc: received setenforce notice (enforcing=1) Sep 13 01:37:14.331281 sudo[1818]: pam_unix(sudo:session): session closed for user root Sep 13 01:37:14.458051 sshd[1815]: pam_unix(sshd:session): session closed for user core Sep 13 01:37:14.461272 systemd-logind[1464]: Session 7 logged out. Waiting for processes to exit. Sep 13 01:37:14.461573 systemd[1]: sshd@4-10.200.20.13:22-10.200.16.10:52752.service: Deactivated successfully. Sep 13 01:37:14.462237 systemd[1]: session-7.scope: Deactivated successfully. Sep 13 01:37:14.462915 systemd-logind[1464]: Removed session 7. Sep 13 01:37:14.528177 systemd[1]: Started sshd@5-10.200.20.13:22-10.200.16.10:52754.service. Sep 13 01:37:14.942814 sshd[1822]: Accepted publickey for core from 10.200.16.10 port 52754 ssh2: RSA SHA256:2vdFvqmv97G7XTFyIQCFZZcqRFoIpW6ty3nYdUf/oyk Sep 13 01:37:14.944561 sshd[1822]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 01:37:14.948730 systemd[1]: Started session-8.scope. Sep 13 01:37:14.949156 systemd-logind[1464]: New session 8 of user core. Sep 13 01:37:15.179239 sudo[1826]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Sep 13 01:37:15.179873 sudo[1826]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 01:37:15.182868 sudo[1826]: pam_unix(sudo:session): session closed for user root Sep 13 01:37:15.187655 sudo[1825]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Sep 13 01:37:15.187873 sudo[1825]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 01:37:15.196704 systemd[1]: Stopping audit-rules.service... Sep 13 01:37:15.196000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 13 01:37:15.198682 auditctl[1829]: No rules Sep 13 01:37:15.203430 kernel: kauditd_printk_skb: 2 callbacks suppressed Sep 13 01:37:15.203575 kernel: audit: type=1305 audit(1757727435.196:211): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 13 01:37:15.199090 systemd[1]: audit-rules.service: Deactivated successfully. Sep 13 01:37:15.199351 systemd[1]: Stopped audit-rules.service. Sep 13 01:37:15.200822 systemd[1]: Starting audit-rules.service... Sep 13 01:37:15.196000 audit[1829]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffdf4b9930 a2=420 a3=0 items=0 ppid=1 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:15.223767 augenrules[1846]: No rules Sep 13 01:37:15.224718 systemd[1]: Finished audit-rules.service. Sep 13 01:37:15.238013 kernel: audit: type=1300 audit(1757727435.196:211): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffdf4b9930 a2=420 a3=0 items=0 ppid=1 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:15.238232 sudo[1825]: pam_unix(sudo:session): session closed for user root Sep 13 01:37:15.196000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Sep 13 01:37:15.246458 kernel: audit: type=1327 audit(1757727435.196:211): proctitle=2F7362696E2F617564697463746C002D44 Sep 13 01:37:15.246528 kernel: audit: type=1131 audit(1757727435.198:212): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:37:15.198000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:37:15.223000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:37:15.281344 kernel: audit: type=1130 audit(1757727435.223:213): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:37:15.281471 kernel: audit: type=1106 audit(1757727435.236:214): pid=1825 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 01:37:15.236000 audit[1825]: USER_END pid=1825 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 01:37:15.237000 audit[1825]: CRED_DISP pid=1825 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 01:37:15.318495 kernel: audit: type=1104 audit(1757727435.237:215): pid=1825 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 01:37:15.319021 sshd[1822]: pam_unix(sshd:session): session closed for user core Sep 13 01:37:15.318000 audit[1822]: USER_END pid=1822 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:37:15.345656 systemd[1]: sshd@5-10.200.20.13:22-10.200.16.10:52754.service: Deactivated successfully. Sep 13 01:37:15.318000 audit[1822]: CRED_DISP pid=1822 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:37:15.366323 kernel: audit: type=1106 audit(1757727435.318:216): pid=1822 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:37:15.366436 kernel: audit: type=1104 audit(1757727435.318:217): pid=1822 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:37:15.346389 systemd[1]: session-8.scope: Deactivated successfully. Sep 13 01:37:15.344000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.13:22-10.200.16.10:52754 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:37:15.367100 systemd-logind[1464]: Session 8 logged out. Waiting for processes to exit. Sep 13 01:37:15.386208 kernel: audit: type=1131 audit(1757727435.344:218): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.13:22-10.200.16.10:52754 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:37:15.389427 systemd-logind[1464]: Removed session 8. Sep 13 01:37:15.390087 systemd[1]: Started sshd@6-10.200.20.13:22-10.200.16.10:52764.service. Sep 13 01:37:15.388000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.13:22-10.200.16.10:52764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:37:15.809000 audit[1852]: USER_ACCT pid=1852 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:37:15.811586 sshd[1852]: Accepted publickey for core from 10.200.16.10 port 52764 ssh2: RSA SHA256:2vdFvqmv97G7XTFyIQCFZZcqRFoIpW6ty3nYdUf/oyk Sep 13 01:37:15.811000 audit[1852]: CRED_ACQ pid=1852 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:37:15.811000 audit[1852]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd6e820a0 a2=3 a3=1 items=0 ppid=1 pid=1852 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:15.811000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 01:37:15.813171 sshd[1852]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 01:37:15.816999 systemd-logind[1464]: New session 9 of user core. Sep 13 01:37:15.817454 systemd[1]: Started session-9.scope. Sep 13 01:37:15.819000 audit[1852]: USER_START pid=1852 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:37:15.821000 audit[1854]: CRED_ACQ pid=1854 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:37:16.045000 audit[1855]: USER_ACCT pid=1855 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 01:37:16.046000 audit[1855]: CRED_REFR pid=1855 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 01:37:16.047288 sudo[1855]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Sep 13 01:37:16.047518 sudo[1855]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 01:37:16.047000 audit[1855]: USER_START pid=1855 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 01:37:16.111745 systemd[1]: Starting coreos-metadata.service... Sep 13 01:37:16.262269 coreos-metadata[1859]: Sep 13 01:37:16.262 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Sep 13 01:37:16.265646 coreos-metadata[1859]: Sep 13 01:37:16.265 INFO Fetch successful Sep 13 01:37:16.265804 coreos-metadata[1859]: Sep 13 01:37:16.265 INFO Fetching http://168.63.129.16/machine/?comp=goalstate: Attempt #1 Sep 13 01:37:16.267631 coreos-metadata[1859]: Sep 13 01:37:16.267 INFO Fetch successful Sep 13 01:37:16.267956 coreos-metadata[1859]: Sep 13 01:37:16.267 INFO Fetching http://168.63.129.16/machine/87d719a5-ce17-4c41-812b-e66833cf6b96/9034d0e2%2D1dc0%2D48e5%2Db301%2D7008eed64f88.%5Fci%2D3510.3.8%2Dn%2D94f5c418a3?comp=config&type=sharedConfig&incarnation=1: Attempt #1 Sep 13 01:37:16.269803 coreos-metadata[1859]: Sep 13 01:37:16.269 INFO Fetch successful Sep 13 01:37:16.303748 coreos-metadata[1859]: Sep 13 01:37:16.303 INFO Fetching http://169.254.169.254/metadata/instance/compute/vmSize?api-version=2017-08-01&format=text: Attempt #1 Sep 13 01:37:16.314516 coreos-metadata[1859]: Sep 13 01:37:16.314 INFO Fetch successful Sep 13 01:37:16.323074 systemd[1]: Finished coreos-metadata.service. Sep 13 01:37:16.321000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:37:16.834610 systemd[1]: Stopped kubelet.service. Sep 13 01:37:16.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:37:16.833000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:37:16.837775 systemd[1]: Starting kubelet.service... Sep 13 01:37:16.880525 systemd[1]: Reloading. Sep 13 01:37:16.944565 /usr/lib/systemd/system-generators/torcx-generator[1912]: time="2025-09-13T01:37:16Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 13 01:37:16.947006 /usr/lib/systemd/system-generators/torcx-generator[1912]: time="2025-09-13T01:37:16Z" level=info msg="torcx already run" Sep 13 01:37:17.043450 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 13 01:37:17.043468 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 13 01:37:17.058576 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 13 01:37:17.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.127000 audit: BPF prog-id=41 op=LOAD Sep 13 01:37:17.127000 audit: BPF prog-id=34 op=UNLOAD Sep 13 01:37:17.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.127000 audit: BPF prog-id=42 op=LOAD Sep 13 01:37:17.127000 audit: BPF prog-id=38 op=UNLOAD Sep 13 01:37:17.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.130000 audit: BPF prog-id=43 op=LOAD Sep 13 01:37:17.130000 audit: BPF prog-id=35 op=UNLOAD Sep 13 01:37:17.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.130000 audit: BPF prog-id=44 op=LOAD Sep 13 01:37:17.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.130000 audit: BPF prog-id=45 op=LOAD Sep 13 01:37:17.130000 audit: BPF prog-id=36 op=UNLOAD Sep 13 01:37:17.130000 audit: BPF prog-id=37 op=UNLOAD Sep 13 01:37:17.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.131000 audit: BPF prog-id=46 op=LOAD Sep 13 01:37:17.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.131000 audit: BPF prog-id=47 op=LOAD Sep 13 01:37:17.131000 audit: BPF prog-id=24 op=UNLOAD Sep 13 01:37:17.131000 audit: BPF prog-id=25 op=UNLOAD Sep 13 01:37:17.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.131000 audit: BPF prog-id=48 op=LOAD Sep 13 01:37:17.131000 audit: BPF prog-id=26 op=UNLOAD Sep 13 01:37:17.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.131000 audit: BPF prog-id=49 op=LOAD Sep 13 01:37:17.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.131000 audit: BPF prog-id=50 op=LOAD Sep 13 01:37:17.131000 audit: BPF prog-id=27 op=UNLOAD Sep 13 01:37:17.131000 audit: BPF prog-id=28 op=UNLOAD Sep 13 01:37:17.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.133000 audit: BPF prog-id=51 op=LOAD Sep 13 01:37:17.133000 audit: BPF prog-id=33 op=UNLOAD Sep 13 01:37:17.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.134000 audit: BPF prog-id=52 op=LOAD Sep 13 01:37:17.134000 audit: BPF prog-id=29 op=UNLOAD Sep 13 01:37:17.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.134000 audit: BPF prog-id=53 op=LOAD Sep 13 01:37:17.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.134000 audit: BPF prog-id=54 op=LOAD Sep 13 01:37:17.134000 audit: BPF prog-id=30 op=UNLOAD Sep 13 01:37:17.134000 audit: BPF prog-id=31 op=UNLOAD Sep 13 01:37:17.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:17.135000 audit: BPF prog-id=55 op=LOAD Sep 13 01:37:17.135000 audit: BPF prog-id=40 op=UNLOAD Sep 13 01:37:17.154152 systemd[1]: Started kubelet.service. Sep 13 01:37:17.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:37:17.157216 systemd[1]: Stopping kubelet.service... Sep 13 01:37:17.158209 systemd[1]: kubelet.service: Deactivated successfully. Sep 13 01:37:17.158426 systemd[1]: Stopped kubelet.service. Sep 13 01:37:17.157000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:37:17.159909 systemd[1]: Starting kubelet.service... Sep 13 01:37:17.344634 systemd[1]: Started kubelet.service. Sep 13 01:37:17.343000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:37:17.501467 kubelet[1979]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 13 01:37:17.501467 kubelet[1979]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Sep 13 01:37:17.501467 kubelet[1979]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 13 01:37:17.501467 kubelet[1979]: I0913 01:37:17.498837 1979 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Sep 13 01:37:18.230088 kubelet[1979]: I0913 01:37:18.230046 1979 server.go:520] "Kubelet version" kubeletVersion="v1.32.4" Sep 13 01:37:18.230088 kubelet[1979]: I0913 01:37:18.230080 1979 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Sep 13 01:37:18.230373 kubelet[1979]: I0913 01:37:18.230359 1979 server.go:954] "Client rotation is on, will bootstrap in background" Sep 13 01:37:18.257459 kubelet[1979]: I0913 01:37:18.257420 1979 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Sep 13 01:37:18.265489 kubelet[1979]: E0913 01:37:18.265457 1979 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Sep 13 01:37:18.265687 kubelet[1979]: I0913 01:37:18.265673 1979 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Sep 13 01:37:18.268876 kubelet[1979]: I0913 01:37:18.268857 1979 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Sep 13 01:37:18.269860 kubelet[1979]: I0913 01:37:18.269827 1979 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Sep 13 01:37:18.270117 kubelet[1979]: I0913 01:37:18.269948 1979 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.200.20.13","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Sep 13 01:37:18.270248 kubelet[1979]: I0913 01:37:18.270237 1979 topology_manager.go:138] "Creating topology manager with none policy" Sep 13 01:37:18.270307 kubelet[1979]: I0913 01:37:18.270298 1979 container_manager_linux.go:304] "Creating device plugin manager" Sep 13 01:37:18.270500 kubelet[1979]: I0913 01:37:18.270489 1979 state_mem.go:36] "Initialized new in-memory state store" Sep 13 01:37:18.274249 kubelet[1979]: I0913 01:37:18.274232 1979 kubelet.go:446] "Attempting to sync node with API server" Sep 13 01:37:18.274400 kubelet[1979]: I0913 01:37:18.274388 1979 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" Sep 13 01:37:18.274482 kubelet[1979]: I0913 01:37:18.274472 1979 kubelet.go:352] "Adding apiserver pod source" Sep 13 01:37:18.274542 kubelet[1979]: I0913 01:37:18.274533 1979 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Sep 13 01:37:18.279534 kubelet[1979]: E0913 01:37:18.279507 1979 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:18.279669 kubelet[1979]: E0913 01:37:18.279657 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:18.285910 kubelet[1979]: I0913 01:37:18.285886 1979 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Sep 13 01:37:18.286499 kubelet[1979]: I0913 01:37:18.286472 1979 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Sep 13 01:37:18.286558 kubelet[1979]: W0913 01:37:18.286529 1979 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Sep 13 01:37:18.287094 kubelet[1979]: I0913 01:37:18.287060 1979 watchdog_linux.go:99] "Systemd watchdog is not enabled" Sep 13 01:37:18.287163 kubelet[1979]: I0913 01:37:18.287100 1979 server.go:1287] "Started kubelet" Sep 13 01:37:18.288320 kubelet[1979]: I0913 01:37:18.288258 1979 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 Sep 13 01:37:18.289353 kubelet[1979]: I0913 01:37:18.289323 1979 server.go:479] "Adding debug handlers to kubelet server" Sep 13 01:37:18.290000 audit[1979]: AVC avc: denied { mac_admin } for pid=1979 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:18.290000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 01:37:18.290000 audit[1979]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40007f2750 a1=40004c5110 a2=40007f2720 a3=25 items=0 ppid=1 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:18.291919 kubelet[1979]: I0913 01:37:18.291861 1979 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Sep 13 01:37:18.290000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 01:37:18.292057 kubelet[1979]: I0913 01:37:18.292038 1979 kubelet.go:1507] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Sep 13 01:37:18.292116 kubelet[1979]: I0913 01:37:18.292098 1979 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Sep 13 01:37:18.290000 audit[1979]: AVC avc: denied { mac_admin } for pid=1979 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:18.290000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 01:37:18.290000 audit[1979]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40005fef40 a1=40004c5128 a2=40007f27e0 a3=25 items=0 ppid=1 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:18.290000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 01:37:18.292886 kubelet[1979]: I0913 01:37:18.292856 1979 kubelet.go:1511] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Sep 13 01:37:18.293065 kubelet[1979]: I0913 01:37:18.293053 1979 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Sep 13 01:37:18.293774 kubelet[1979]: I0913 01:37:18.293584 1979 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Sep 13 01:37:18.295362 kubelet[1979]: E0913 01:37:18.295321 1979 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Sep 13 01:37:18.295438 kubelet[1979]: I0913 01:37:18.295375 1979 volume_manager.go:297] "Starting Kubelet Volume Manager" Sep 13 01:37:18.295767 kubelet[1979]: I0913 01:37:18.295599 1979 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Sep 13 01:37:18.295767 kubelet[1979]: I0913 01:37:18.295661 1979 reconciler.go:26] "Reconciler: start to sync state" Sep 13 01:37:18.296000 audit[1991]: NETFILTER_CFG table=mangle:5 family=2 entries=2 op=nft_register_chain pid=1991 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:18.296000 audit[1991]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffea7cac30 a2=0 a3=1 items=0 ppid=1979 pid=1991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:18.296000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 13 01:37:18.298148 kubelet[1979]: I0913 01:37:18.298107 1979 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Sep 13 01:37:18.297000 audit[1992]: NETFILTER_CFG table=filter:6 family=2 entries=2 op=nft_register_chain pid=1992 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:18.297000 audit[1992]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffd0413550 a2=0 a3=1 items=0 ppid=1979 pid=1992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:18.297000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 13 01:37:18.299306 kubelet[1979]: I0913 01:37:18.299278 1979 factory.go:221] Registration of the containerd container factory successfully Sep 13 01:37:18.299306 kubelet[1979]: I0913 01:37:18.299301 1979 factory.go:221] Registration of the systemd container factory successfully Sep 13 01:37:18.300000 audit[1994]: NETFILTER_CFG table=filter:7 family=2 entries=2 op=nft_register_chain pid=1994 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:18.300000 audit[1994]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd7be9f30 a2=0 a3=1 items=0 ppid=1979 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:18.300000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 01:37:18.302000 audit[1996]: NETFILTER_CFG table=filter:8 family=2 entries=2 op=nft_register_chain pid=1996 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:18.302000 audit[1996]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffde4a1ab0 a2=0 a3=1 items=0 ppid=1979 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:18.302000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 01:37:18.305492 kubelet[1979]: E0913 01:37:18.305466 1979 kubelet.go:1555] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Sep 13 01:37:18.317951 kubelet[1979]: E0913 01:37:18.317922 1979 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.200.20.13\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Sep 13 01:37:18.319306 kubelet[1979]: W0913 01:37:18.318164 1979 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Sep 13 01:37:18.319469 kubelet[1979]: E0913 01:37:18.319449 1979 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User \"system:anonymous\" cannot list resource \"csidrivers\" in API group \"storage.k8s.io\" at the cluster scope" logger="UnhandledError" Sep 13 01:37:18.319540 kubelet[1979]: W0913 01:37:18.318193 1979 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "10.200.20.13" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Sep 13 01:37:18.319601 kubelet[1979]: E0913 01:37:18.319590 1979 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes \"10.200.20.13\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" Sep 13 01:37:18.319653 kubelet[1979]: W0913 01:37:18.318213 1979 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Sep 13 01:37:18.319713 kubelet[1979]: E0913 01:37:18.319700 1979 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" Sep 13 01:37:18.319757 kubelet[1979]: E0913 01:37:18.318351 1979 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.200.20.13.1864b3cad30f0dd9 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.200.20.13,UID:10.200.20.13,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:10.200.20.13,},FirstTimestamp:2025-09-13 01:37:18.287080921 +0000 UTC m=+0.936420558,LastTimestamp:2025-09-13 01:37:18.287080921 +0000 UTC m=+0.936420558,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.200.20.13,}" Sep 13 01:37:18.320910 kubelet[1979]: E0913 01:37:18.320840 1979 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.200.20.13.1864b3cad427558d default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.200.20.13,UID:10.200.20.13,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:10.200.20.13,},FirstTimestamp:2025-09-13 01:37:18.305449357 +0000 UTC m=+0.954788954,LastTimestamp:2025-09-13 01:37:18.305449357 +0000 UTC m=+0.954788954,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.200.20.13,}" Sep 13 01:37:18.321551 kubelet[1979]: I0913 01:37:18.321532 1979 cpu_manager.go:221] "Starting CPU manager" policy="none" Sep 13 01:37:18.321650 kubelet[1979]: I0913 01:37:18.321637 1979 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Sep 13 01:37:18.321731 kubelet[1979]: I0913 01:37:18.321722 1979 state_mem.go:36] "Initialized new in-memory state store" Sep 13 01:37:18.328246 kubelet[1979]: I0913 01:37:18.328226 1979 policy_none.go:49] "None policy: Start" Sep 13 01:37:18.328398 kubelet[1979]: I0913 01:37:18.328387 1979 memory_manager.go:186] "Starting memorymanager" policy="None" Sep 13 01:37:18.328465 kubelet[1979]: I0913 01:37:18.328457 1979 state_mem.go:35] "Initializing new in-memory state store" Sep 13 01:37:18.339610 systemd[1]: Created slice kubepods.slice. Sep 13 01:37:18.344666 systemd[1]: Created slice kubepods-burstable.slice. Sep 13 01:37:18.348029 systemd[1]: Created slice kubepods-besteffort.slice. Sep 13 01:37:18.357000 audit[1979]: AVC avc: denied { mac_admin } for pid=1979 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:18.357000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 01:37:18.357000 audit[1979]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40004fb920 a1=40004c44b0 a2=40004fb8f0 a3=25 items=0 ppid=1 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:18.357000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 01:37:18.359766 kubelet[1979]: I0913 01:37:18.358939 1979 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Sep 13 01:37:18.359766 kubelet[1979]: I0913 01:37:18.359033 1979 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" Sep 13 01:37:18.359766 kubelet[1979]: I0913 01:37:18.359173 1979 eviction_manager.go:189] "Eviction manager: starting control loop" Sep 13 01:37:18.359766 kubelet[1979]: I0913 01:37:18.359186 1979 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Sep 13 01:37:18.359868 kubelet[1979]: I0913 01:37:18.359800 1979 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Sep 13 01:37:18.361206 kubelet[1979]: E0913 01:37:18.361123 1979 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Sep 13 01:37:18.361206 kubelet[1979]: E0913 01:37:18.361171 1979 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.200.20.13\" not found" Sep 13 01:37:18.454000 audit[2004]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=2004 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:18.454000 audit[2004]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffc50aa770 a2=0 a3=1 items=0 ppid=1979 pid=2004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:18.454000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Sep 13 01:37:18.456422 kubelet[1979]: I0913 01:37:18.456375 1979 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Sep 13 01:37:18.455000 audit[2006]: NETFILTER_CFG table=mangle:10 family=10 entries=2 op=nft_register_chain pid=2006 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:18.455000 audit[2006]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffce171bc0 a2=0 a3=1 items=0 ppid=1979 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:18.456000 audit[2007]: NETFILTER_CFG table=mangle:11 family=2 entries=1 op=nft_register_chain pid=2007 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:18.456000 audit[2007]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcddebc50 a2=0 a3=1 items=0 ppid=1979 pid=2007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:18.456000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 13 01:37:18.455000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 13 01:37:18.458073 kubelet[1979]: I0913 01:37:18.458043 1979 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Sep 13 01:37:18.458073 kubelet[1979]: I0913 01:37:18.458072 1979 status_manager.go:227] "Starting to sync pod status with apiserver" Sep 13 01:37:18.458163 kubelet[1979]: I0913 01:37:18.458092 1979 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Sep 13 01:37:18.458163 kubelet[1979]: I0913 01:37:18.458098 1979 kubelet.go:2382] "Starting kubelet main sync loop" Sep 13 01:37:18.458207 kubelet[1979]: E0913 01:37:18.458191 1979 kubelet.go:2406] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Sep 13 01:37:18.459732 kubelet[1979]: I0913 01:37:18.459703 1979 kubelet_node_status.go:75] "Attempting to register node" node="10.200.20.13" Sep 13 01:37:18.459000 audit[2008]: NETFILTER_CFG table=nat:12 family=2 entries=2 op=nft_register_chain pid=2008 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:18.459000 audit[2008]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffc54501d0 a2=0 a3=1 items=0 ppid=1979 pid=2008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:18.459000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 13 01:37:18.460000 audit[2009]: NETFILTER_CFG table=mangle:13 family=10 entries=1 op=nft_register_chain pid=2009 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:18.460000 audit[2009]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff72dd090 a2=0 a3=1 items=0 ppid=1979 pid=2009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:18.460000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 13 01:37:18.461000 audit[2011]: NETFILTER_CFG table=nat:14 family=10 entries=2 op=nft_register_chain pid=2011 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:18.461000 audit[2011]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffd95d1540 a2=0 a3=1 items=0 ppid=1979 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:18.461000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 13 01:37:18.461000 audit[2010]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_chain pid=2010 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:18.461000 audit[2010]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffeff9aba0 a2=0 a3=1 items=0 ppid=1979 pid=2010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:18.461000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 13 01:37:18.462000 audit[2012]: NETFILTER_CFG table=filter:16 family=10 entries=2 op=nft_register_chain pid=2012 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:18.462000 audit[2012]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffe5c98dc0 a2=0 a3=1 items=0 ppid=1979 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:18.462000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 13 01:37:18.466929 kubelet[1979]: I0913 01:37:18.466905 1979 kubelet_node_status.go:78] "Successfully registered node" node="10.200.20.13" Sep 13 01:37:18.467000 kubelet[1979]: E0913 01:37:18.466933 1979 kubelet_node_status.go:548] "Error updating node status, will retry" err="error getting node \"10.200.20.13\": node \"10.200.20.13\" not found" Sep 13 01:37:18.496589 kubelet[1979]: E0913 01:37:18.495347 1979 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Sep 13 01:37:18.595991 kubelet[1979]: E0913 01:37:18.595958 1979 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Sep 13 01:37:18.696392 kubelet[1979]: E0913 01:37:18.696364 1979 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Sep 13 01:37:18.797326 kubelet[1979]: E0913 01:37:18.797229 1979 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Sep 13 01:37:18.873297 sudo[1855]: pam_unix(sudo:session): session closed for user root Sep 13 01:37:18.872000 audit[1855]: USER_END pid=1855 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 01:37:18.872000 audit[1855]: CRED_DISP pid=1855 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 01:37:18.898138 kubelet[1979]: E0913 01:37:18.898101 1979 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Sep 13 01:37:18.943547 sshd[1852]: pam_unix(sshd:session): session closed for user core Sep 13 01:37:18.942000 audit[1852]: USER_END pid=1852 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:37:18.943000 audit[1852]: CRED_DISP pid=1852 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:37:18.945676 systemd[1]: sshd@6-10.200.20.13:22-10.200.16.10:52764.service: Deactivated successfully. Sep 13 01:37:18.944000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.13:22-10.200.16.10:52764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:37:18.946351 systemd[1]: session-9.scope: Deactivated successfully. Sep 13 01:37:18.946860 systemd-logind[1464]: Session 9 logged out. Waiting for processes to exit. Sep 13 01:37:18.947652 systemd-logind[1464]: Removed session 9. Sep 13 01:37:18.998749 kubelet[1979]: E0913 01:37:18.998712 1979 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Sep 13 01:37:19.099317 kubelet[1979]: E0913 01:37:19.099219 1979 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Sep 13 01:37:19.200058 kubelet[1979]: E0913 01:37:19.200024 1979 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Sep 13 01:37:19.232306 kubelet[1979]: I0913 01:37:19.232286 1979 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Sep 13 01:37:19.232483 kubelet[1979]: W0913 01:37:19.232460 1979 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Sep 13 01:37:19.232554 kubelet[1979]: W0913 01:37:19.232462 1979 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Sep 13 01:37:19.280647 kubelet[1979]: E0913 01:37:19.280589 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:19.300232 kubelet[1979]: E0913 01:37:19.300199 1979 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Sep 13 01:37:19.400775 kubelet[1979]: E0913 01:37:19.400742 1979 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Sep 13 01:37:19.501516 kubelet[1979]: E0913 01:37:19.501482 1979 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Sep 13 01:37:19.601877 kubelet[1979]: E0913 01:37:19.601853 1979 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Sep 13 01:37:19.702474 kubelet[1979]: E0913 01:37:19.702391 1979 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Sep 13 01:37:19.803413 kubelet[1979]: E0913 01:37:19.803374 1979 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Sep 13 01:37:19.904275 kubelet[1979]: I0913 01:37:19.904242 1979 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Sep 13 01:37:19.904617 env[1478]: time="2025-09-13T01:37:19.904573576Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Sep 13 01:37:19.905067 kubelet[1979]: I0913 01:37:19.905050 1979 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Sep 13 01:37:20.281119 kubelet[1979]: E0913 01:37:20.281087 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:20.286567 kubelet[1979]: I0913 01:37:20.286550 1979 apiserver.go:52] "Watching apiserver" Sep 13 01:37:20.291436 kubelet[1979]: E0913 01:37:20.291395 1979 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9xghd" podUID="0f333ef7-95f8-4a9d-8f0e-3b7b944508da" Sep 13 01:37:20.295413 systemd[1]: Created slice kubepods-besteffort-pod5a1f57f0_1124_4893_af41_879f34392ddf.slice. Sep 13 01:37:20.296203 kubelet[1979]: I0913 01:37:20.296171 1979 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Sep 13 01:37:20.306659 kubelet[1979]: I0913 01:37:20.306629 1979 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/5a1f57f0-1124-4893-af41-879f34392ddf-cni-log-dir\") pod \"calico-node-dhfjv\" (UID: \"5a1f57f0-1124-4893-af41-879f34392ddf\") " pod="calico-system/calico-node-dhfjv" Sep 13 01:37:20.306936 kubelet[1979]: I0913 01:37:20.306917 1979 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/5a1f57f0-1124-4893-af41-879f34392ddf-lib-modules\") pod \"calico-node-dhfjv\" (UID: \"5a1f57f0-1124-4893-af41-879f34392ddf\") " pod="calico-system/calico-node-dhfjv" Sep 13 01:37:20.307039 kubelet[1979]: I0913 01:37:20.307024 1979 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/5a1f57f0-1124-4893-af41-879f34392ddf-var-run-calico\") pod \"calico-node-dhfjv\" (UID: \"5a1f57f0-1124-4893-af41-879f34392ddf\") " pod="calico-system/calico-node-dhfjv" Sep 13 01:37:20.307111 kubelet[1979]: I0913 01:37:20.307099 1979 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/0f333ef7-95f8-4a9d-8f0e-3b7b944508da-kubelet-dir\") pod \"csi-node-driver-9xghd\" (UID: \"0f333ef7-95f8-4a9d-8f0e-3b7b944508da\") " pod="calico-system/csi-node-driver-9xghd" Sep 13 01:37:20.307185 kubelet[1979]: I0913 01:37:20.307173 1979 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/5a1f57f0-1124-4893-af41-879f34392ddf-cni-bin-dir\") pod \"calico-node-dhfjv\" (UID: \"5a1f57f0-1124-4893-af41-879f34392ddf\") " pod="calico-system/calico-node-dhfjv" Sep 13 01:37:20.307352 kubelet[1979]: I0913 01:37:20.307322 1979 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/5a1f57f0-1124-4893-af41-879f34392ddf-policysync\") pod \"calico-node-dhfjv\" (UID: \"5a1f57f0-1124-4893-af41-879f34392ddf\") " pod="calico-system/calico-node-dhfjv" Sep 13 01:37:20.307460 kubelet[1979]: I0913 01:37:20.307446 1979 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/5a1f57f0-1124-4893-af41-879f34392ddf-tigera-ca-bundle\") pod \"calico-node-dhfjv\" (UID: \"5a1f57f0-1124-4893-af41-879f34392ddf\") " pod="calico-system/calico-node-dhfjv" Sep 13 01:37:20.307532 kubelet[1979]: I0913 01:37:20.307520 1979 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/0f333ef7-95f8-4a9d-8f0e-3b7b944508da-socket-dir\") pod \"csi-node-driver-9xghd\" (UID: \"0f333ef7-95f8-4a9d-8f0e-3b7b944508da\") " pod="calico-system/csi-node-driver-9xghd" Sep 13 01:37:20.307603 kubelet[1979]: I0913 01:37:20.307591 1979 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/1e3d48ce-56d5-4d8b-8f80-0b756f22ef07-lib-modules\") pod \"kube-proxy-8qwpq\" (UID: \"1e3d48ce-56d5-4d8b-8f80-0b756f22ef07\") " pod="kube-system/kube-proxy-8qwpq" Sep 13 01:37:20.307680 kubelet[1979]: I0913 01:37:20.307666 1979 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-x2qn2\" (UniqueName: \"kubernetes.io/projected/1e3d48ce-56d5-4d8b-8f80-0b756f22ef07-kube-api-access-x2qn2\") pod \"kube-proxy-8qwpq\" (UID: \"1e3d48ce-56d5-4d8b-8f80-0b756f22ef07\") " pod="kube-system/kube-proxy-8qwpq" Sep 13 01:37:20.307755 kubelet[1979]: I0913 01:37:20.307741 1979 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/5a1f57f0-1124-4893-af41-879f34392ddf-flexvol-driver-host\") pod \"calico-node-dhfjv\" (UID: \"5a1f57f0-1124-4893-af41-879f34392ddf\") " pod="calico-system/calico-node-dhfjv" Sep 13 01:37:20.307833 kubelet[1979]: I0913 01:37:20.307819 1979 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/5a1f57f0-1124-4893-af41-879f34392ddf-xtables-lock\") pod \"calico-node-dhfjv\" (UID: \"5a1f57f0-1124-4893-af41-879f34392ddf\") " pod="calico-system/calico-node-dhfjv" Sep 13 01:37:20.308013 kubelet[1979]: I0913 01:37:20.307897 1979 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/0f333ef7-95f8-4a9d-8f0e-3b7b944508da-varrun\") pod \"csi-node-driver-9xghd\" (UID: \"0f333ef7-95f8-4a9d-8f0e-3b7b944508da\") " pod="calico-system/csi-node-driver-9xghd" Sep 13 01:37:20.308196 kubelet[1979]: I0913 01:37:20.308179 1979 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cxpd4\" (UniqueName: \"kubernetes.io/projected/0f333ef7-95f8-4a9d-8f0e-3b7b944508da-kube-api-access-cxpd4\") pod \"csi-node-driver-9xghd\" (UID: \"0f333ef7-95f8-4a9d-8f0e-3b7b944508da\") " pod="calico-system/csi-node-driver-9xghd" Sep 13 01:37:20.308297 kubelet[1979]: I0913 01:37:20.308282 1979 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/1e3d48ce-56d5-4d8b-8f80-0b756f22ef07-kube-proxy\") pod \"kube-proxy-8qwpq\" (UID: \"1e3d48ce-56d5-4d8b-8f80-0b756f22ef07\") " pod="kube-system/kube-proxy-8qwpq" Sep 13 01:37:20.308396 kubelet[1979]: I0913 01:37:20.308381 1979 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/5a1f57f0-1124-4893-af41-879f34392ddf-cni-net-dir\") pod \"calico-node-dhfjv\" (UID: \"5a1f57f0-1124-4893-af41-879f34392ddf\") " pod="calico-system/calico-node-dhfjv" Sep 13 01:37:20.308480 kubelet[1979]: I0913 01:37:20.308467 1979 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/5a1f57f0-1124-4893-af41-879f34392ddf-node-certs\") pod \"calico-node-dhfjv\" (UID: \"5a1f57f0-1124-4893-af41-879f34392ddf\") " pod="calico-system/calico-node-dhfjv" Sep 13 01:37:20.308552 kubelet[1979]: I0913 01:37:20.308541 1979 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/5a1f57f0-1124-4893-af41-879f34392ddf-var-lib-calico\") pod \"calico-node-dhfjv\" (UID: \"5a1f57f0-1124-4893-af41-879f34392ddf\") " pod="calico-system/calico-node-dhfjv" Sep 13 01:37:20.308714 kubelet[1979]: I0913 01:37:20.308697 1979 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nsknp\" (UniqueName: \"kubernetes.io/projected/5a1f57f0-1124-4893-af41-879f34392ddf-kube-api-access-nsknp\") pod \"calico-node-dhfjv\" (UID: \"5a1f57f0-1124-4893-af41-879f34392ddf\") " pod="calico-system/calico-node-dhfjv" Sep 13 01:37:20.309148 kubelet[1979]: I0913 01:37:20.309129 1979 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/0f333ef7-95f8-4a9d-8f0e-3b7b944508da-registration-dir\") pod \"csi-node-driver-9xghd\" (UID: \"0f333ef7-95f8-4a9d-8f0e-3b7b944508da\") " pod="calico-system/csi-node-driver-9xghd" Sep 13 01:37:20.309262 kubelet[1979]: I0913 01:37:20.309248 1979 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/1e3d48ce-56d5-4d8b-8f80-0b756f22ef07-xtables-lock\") pod \"kube-proxy-8qwpq\" (UID: \"1e3d48ce-56d5-4d8b-8f80-0b756f22ef07\") " pod="kube-system/kube-proxy-8qwpq" Sep 13 01:37:20.309569 systemd[1]: Created slice kubepods-besteffort-pod1e3d48ce_56d5_4d8b_8f80_0b756f22ef07.slice. Sep 13 01:37:20.411161 kubelet[1979]: I0913 01:37:20.411106 1979 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Sep 13 01:37:20.411866 kubelet[1979]: E0913 01:37:20.411841 1979 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 01:37:20.411866 kubelet[1979]: W0913 01:37:20.411862 1979 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 01:37:20.411985 kubelet[1979]: E0913 01:37:20.411883 1979 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 01:37:20.419469 kubelet[1979]: E0913 01:37:20.418992 1979 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 01:37:20.419469 kubelet[1979]: W0913 01:37:20.419026 1979 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 01:37:20.419469 kubelet[1979]: E0913 01:37:20.419045 1979 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 01:37:20.419469 kubelet[1979]: E0913 01:37:20.419235 1979 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 01:37:20.419469 kubelet[1979]: W0913 01:37:20.419256 1979 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 01:37:20.419469 kubelet[1979]: E0913 01:37:20.419266 1979 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 01:37:20.424397 kubelet[1979]: E0913 01:37:20.424373 1979 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 01:37:20.424506 kubelet[1979]: W0913 01:37:20.424490 1979 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 01:37:20.424584 kubelet[1979]: E0913 01:37:20.424573 1979 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 01:37:20.425122 kubelet[1979]: E0913 01:37:20.425109 1979 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 01:37:20.425202 kubelet[1979]: W0913 01:37:20.425191 1979 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 01:37:20.425259 kubelet[1979]: E0913 01:37:20.425248 1979 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 01:37:20.425790 kubelet[1979]: E0913 01:37:20.425776 1979 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 01:37:20.425877 kubelet[1979]: W0913 01:37:20.425864 1979 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 01:37:20.425932 kubelet[1979]: E0913 01:37:20.425922 1979 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 01:37:20.428793 kubelet[1979]: E0913 01:37:20.428779 1979 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 01:37:20.428883 kubelet[1979]: W0913 01:37:20.428870 1979 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 01:37:20.428940 kubelet[1979]: E0913 01:37:20.428929 1979 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 01:37:20.429155 kubelet[1979]: E0913 01:37:20.429144 1979 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 01:37:20.429227 kubelet[1979]: W0913 01:37:20.429215 1979 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 01:37:20.429287 kubelet[1979]: E0913 01:37:20.429275 1979 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 01:37:20.429492 kubelet[1979]: E0913 01:37:20.429482 1979 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 01:37:20.429569 kubelet[1979]: W0913 01:37:20.429557 1979 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 01:37:20.429623 kubelet[1979]: E0913 01:37:20.429613 1979 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 01:37:20.429814 kubelet[1979]: E0913 01:37:20.429804 1979 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 01:37:20.429882 kubelet[1979]: W0913 01:37:20.429871 1979 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 01:37:20.429940 kubelet[1979]: E0913 01:37:20.429929 1979 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 01:37:20.430161 kubelet[1979]: E0913 01:37:20.430151 1979 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 01:37:20.430230 kubelet[1979]: W0913 01:37:20.430218 1979 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 01:37:20.430289 kubelet[1979]: E0913 01:37:20.430278 1979 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 01:37:20.433213 kubelet[1979]: E0913 01:37:20.433199 1979 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 01:37:20.433312 kubelet[1979]: W0913 01:37:20.433301 1979 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 01:37:20.433389 kubelet[1979]: E0913 01:37:20.433378 1979 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 01:37:20.608798 env[1478]: time="2025-09-13T01:37:20.608658306Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-dhfjv,Uid:5a1f57f0-1124-4893-af41-879f34392ddf,Namespace:calico-system,Attempt:0,}" Sep 13 01:37:20.614817 env[1478]: time="2025-09-13T01:37:20.614653701Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-8qwpq,Uid:1e3d48ce-56d5-4d8b-8f80-0b756f22ef07,Namespace:kube-system,Attempt:0,}" Sep 13 01:37:21.282408 kubelet[1979]: E0913 01:37:21.282369 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:22.283016 kubelet[1979]: E0913 01:37:22.282990 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:22.459678 kubelet[1979]: E0913 01:37:22.459628 1979 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9xghd" podUID="0f333ef7-95f8-4a9d-8f0e-3b7b944508da" Sep 13 01:37:23.284167 kubelet[1979]: E0913 01:37:23.284137 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:24.285281 kubelet[1979]: E0913 01:37:24.285231 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:24.459718 kubelet[1979]: E0913 01:37:24.459528 1979 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9xghd" podUID="0f333ef7-95f8-4a9d-8f0e-3b7b944508da" Sep 13 01:37:25.285855 kubelet[1979]: E0913 01:37:25.285810 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:26.286936 kubelet[1979]: E0913 01:37:26.286897 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:26.460168 kubelet[1979]: E0913 01:37:26.460119 1979 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9xghd" podUID="0f333ef7-95f8-4a9d-8f0e-3b7b944508da" Sep 13 01:37:27.287968 kubelet[1979]: E0913 01:37:27.287918 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:27.921975 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount288925336.mount: Deactivated successfully. Sep 13 01:37:27.953067 env[1478]: time="2025-09-13T01:37:27.953028742Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:27.956613 env[1478]: time="2025-09-13T01:37:27.956569440Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:27.967074 env[1478]: time="2025-09-13T01:37:27.967014532Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:27.971188 env[1478]: time="2025-09-13T01:37:27.971144032Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:27.975249 env[1478]: time="2025-09-13T01:37:27.975209132Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:27.978482 env[1478]: time="2025-09-13T01:37:27.978451068Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:27.981889 env[1478]: time="2025-09-13T01:37:27.981852925Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:27.985519 env[1478]: time="2025-09-13T01:37:27.985488183Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:28.086019 env[1478]: time="2025-09-13T01:37:28.085945032Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 01:37:28.086244 env[1478]: time="2025-09-13T01:37:28.085985273Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 01:37:28.086244 env[1478]: time="2025-09-13T01:37:28.086009473Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 01:37:28.087494 env[1478]: time="2025-09-13T01:37:28.086287554Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4672f2121a49c696e47eb47a096e1f177b0f58905f12bcdfe735fa40ec5c6239 pid=2040 runtime=io.containerd.runc.v2 Sep 13 01:37:28.094273 env[1478]: time="2025-09-13T01:37:28.094055672Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 01:37:28.094273 env[1478]: time="2025-09-13T01:37:28.094106072Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 01:37:28.094273 env[1478]: time="2025-09-13T01:37:28.094116232Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 01:37:28.094475 env[1478]: time="2025-09-13T01:37:28.094283473Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/38f6c908609b69afd8d895a1eb7a05343479b881989a77e65cc4036efded3c7c pid=2053 runtime=io.containerd.runc.v2 Sep 13 01:37:28.100823 systemd[1]: Started cri-containerd-4672f2121a49c696e47eb47a096e1f177b0f58905f12bcdfe735fa40ec5c6239.scope. Sep 13 01:37:28.112988 systemd[1]: Started cri-containerd-38f6c908609b69afd8d895a1eb7a05343479b881989a77e65cc4036efded3c7c.scope. Sep 13 01:37:28.123682 kernel: kauditd_printk_skb: 242 callbacks suppressed Sep 13 01:37:28.123794 kernel: audit: type=1400 audit(1757727448.117:426): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.142402 kernel: audit: type=1400 audit(1757727448.117:427): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.182193 kernel: audit: type=1400 audit(1757727448.117:428): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.182316 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Sep 13 01:37:28.182362 kernel: audit: type=1400 audit(1757727448.117:429): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.206557 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Sep 13 01:37:28.206691 kernel: audit: type=1400 audit(1757727448.117:430): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.228318 kernel: audit: backlog limit exceeded Sep 13 01:37:28.228453 kernel: audit: type=1400 audit(1757727448.117:431): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.251465 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Sep 13 01:37:28.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.122000 audit: BPF prog-id=56 op=LOAD Sep 13 01:37:28.122000 audit[2061]: AVC avc: denied { bpf } for pid=2061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.122000 audit[2061]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2040 pid=2061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:28.122000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436373266323132316134396336393665343765623437613039366531 Sep 13 01:37:28.122000 audit[2061]: AVC avc: denied { perfmon } for pid=2061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.122000 audit[2061]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2040 pid=2061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:28.122000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436373266323132316134396336393665343765623437613039366531 Sep 13 01:37:28.122000 audit[2061]: AVC avc: denied { bpf } for pid=2061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.122000 audit[2061]: AVC avc: denied { bpf } for pid=2061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.122000 audit[2061]: AVC avc: denied { bpf } for pid=2061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.122000 audit[2061]: AVC avc: denied { perfmon } for pid=2061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.122000 audit[2061]: AVC avc: denied { perfmon } for pid=2061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.122000 audit[2061]: AVC avc: denied { perfmon } for pid=2061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.122000 audit[2061]: AVC avc: denied { perfmon } for pid=2061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.122000 audit[2061]: AVC avc: denied { perfmon } for pid=2061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.122000 audit[2061]: AVC avc: denied { bpf } for pid=2061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.122000 audit[2061]: AVC avc: denied { bpf } for pid=2061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.122000 audit: BPF prog-id=57 op=LOAD Sep 13 01:37:28.122000 audit[2061]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2040 pid=2061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:28.122000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436373266323132316134396336393665343765623437613039366531 Sep 13 01:37:28.139000 audit[2061]: AVC avc: denied { bpf } for pid=2061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.139000 audit[2061]: AVC avc: denied { bpf } for pid=2061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.139000 audit[2061]: AVC avc: denied { perfmon } for pid=2061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.139000 audit[2061]: AVC avc: denied { perfmon } for pid=2061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.139000 audit[2061]: AVC avc: denied { perfmon } for pid=2061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.139000 audit[2061]: AVC avc: denied { perfmon } for pid=2061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.139000 audit[2061]: AVC avc: denied { perfmon } for pid=2061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.139000 audit[2061]: AVC avc: denied { bpf } for pid=2061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.139000 audit[2061]: AVC avc: denied { bpf } for pid=2061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.139000 audit: BPF prog-id=58 op=LOAD Sep 13 01:37:28.139000 audit[2061]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2040 pid=2061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:28.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436373266323132316134396336393665343765623437613039366531 Sep 13 01:37:28.139000 audit: BPF prog-id=58 op=UNLOAD Sep 13 01:37:28.139000 audit: BPF prog-id=57 op=UNLOAD Sep 13 01:37:28.139000 audit[2061]: AVC avc: denied { bpf } for pid=2061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.139000 audit[2061]: AVC avc: denied { bpf } for pid=2061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.139000 audit[2061]: AVC avc: denied { bpf } for pid=2061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.139000 audit[2061]: AVC avc: denied { perfmon } for pid=2061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.139000 audit[2061]: AVC avc: denied { perfmon } for pid=2061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.139000 audit[2061]: AVC avc: denied { perfmon } for pid=2061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.139000 audit[2061]: AVC avc: denied { perfmon } for pid=2061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.139000 audit[2061]: AVC avc: denied { perfmon } for pid=2061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.139000 audit[2061]: AVC avc: denied { bpf } for pid=2061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.139000 audit[2061]: AVC avc: denied { bpf } for pid=2061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.139000 audit: BPF prog-id=59 op=LOAD Sep 13 01:37:28.139000 audit[2061]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2040 pid=2061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:28.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436373266323132316134396336393665343765623437613039366531 Sep 13 01:37:28.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.253000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.253000 audit[2076]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2053 pid=2076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:28.253000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338663663393038363039623639616664386438393561316562376130 Sep 13 01:37:28.253000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.253000 audit[2076]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2053 pid=2076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:28.253000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338663663393038363039623639616664386438393561316562376130 Sep 13 01:37:28.253000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.253000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.253000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.253000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.253000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.253000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.253000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.253000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.253000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.255220 env[1478]: time="2025-09-13T01:37:28.255183810Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-dhfjv,Uid:5a1f57f0-1124-4893-af41-879f34392ddf,Namespace:calico-system,Attempt:0,} returns sandbox id \"4672f2121a49c696e47eb47a096e1f177b0f58905f12bcdfe735fa40ec5c6239\"" Sep 13 01:37:28.253000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.253000 audit: BPF prog-id=61 op=LOAD Sep 13 01:37:28.253000 audit[2076]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2053 pid=2076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:28.253000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338663663393038363039623639616664386438393561316562376130 Sep 13 01:37:28.254000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.254000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.254000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.254000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.254000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.254000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.254000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.254000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.254000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.254000 audit: BPF prog-id=62 op=LOAD Sep 13 01:37:28.254000 audit[2076]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2053 pid=2076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:28.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338663663393038363039623639616664386438393561316562376130 Sep 13 01:37:28.254000 audit: BPF prog-id=62 op=UNLOAD Sep 13 01:37:28.254000 audit: BPF prog-id=61 op=UNLOAD Sep 13 01:37:28.254000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.254000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.254000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.254000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.254000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.254000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.254000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.254000 audit[2076]: AVC avc: denied { perfmon } for pid=2076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.254000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.254000 audit[2076]: AVC avc: denied { bpf } for pid=2076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:28.254000 audit: BPF prog-id=63 op=LOAD Sep 13 01:37:28.254000 audit[2076]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2053 pid=2076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:28.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338663663393038363039623639616664386438393561316562376130 Sep 13 01:37:28.261308 env[1478]: time="2025-09-13T01:37:28.261271280Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\"" Sep 13 01:37:28.270548 env[1478]: time="2025-09-13T01:37:28.270512444Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-8qwpq,Uid:1e3d48ce-56d5-4d8b-8f80-0b756f22ef07,Namespace:kube-system,Attempt:0,} returns sandbox id \"38f6c908609b69afd8d895a1eb7a05343479b881989a77e65cc4036efded3c7c\"" Sep 13 01:37:28.288484 kubelet[1979]: E0913 01:37:28.288446 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:28.461287 kubelet[1979]: E0913 01:37:28.460897 1979 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9xghd" podUID="0f333ef7-95f8-4a9d-8f0e-3b7b944508da" Sep 13 01:37:29.289213 kubelet[1979]: E0913 01:37:29.289168 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:29.759331 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3269014298.mount: Deactivated successfully. Sep 13 01:37:29.893264 env[1478]: time="2025-09-13T01:37:29.893191858Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:29.901590 env[1478]: time="2025-09-13T01:37:29.901543138Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:29e6f31ad72882b1b817dd257df6b7981e4d7d31d872b7fe2cf102c6e2af27a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:29.905860 env[1478]: time="2025-09-13T01:37:29.905833038Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:29.910206 env[1478]: time="2025-09-13T01:37:29.910180098Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:81bdfcd9dbd36624dc35354e8c181c75631ba40e6c7df5820f5f56cea36f0ef9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:29.910731 env[1478]: time="2025-09-13T01:37:29.910681181Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\" returns image reference \"sha256:29e6f31ad72882b1b817dd257df6b7981e4d7d31d872b7fe2cf102c6e2af27a5\"" Sep 13 01:37:29.913067 env[1478]: time="2025-09-13T01:37:29.912616790Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.9\"" Sep 13 01:37:29.913432 env[1478]: time="2025-09-13T01:37:29.913406994Z" level=info msg="CreateContainer within sandbox \"4672f2121a49c696e47eb47a096e1f177b0f58905f12bcdfe735fa40ec5c6239\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Sep 13 01:37:29.940060 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount576275551.mount: Deactivated successfully. Sep 13 01:37:29.956691 env[1478]: time="2025-09-13T01:37:29.956641917Z" level=info msg="CreateContainer within sandbox \"4672f2121a49c696e47eb47a096e1f177b0f58905f12bcdfe735fa40ec5c6239\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"280679ff519d9f30148308c667e70c08722f83404db2698b5593048005cf5866\"" Sep 13 01:37:29.957523 env[1478]: time="2025-09-13T01:37:29.957491841Z" level=info msg="StartContainer for \"280679ff519d9f30148308c667e70c08722f83404db2698b5593048005cf5866\"" Sep 13 01:37:29.984975 systemd[1]: Started cri-containerd-280679ff519d9f30148308c667e70c08722f83404db2698b5593048005cf5866.scope. Sep 13 01:37:29.996000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:29.996000 audit[2121]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2040 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:29.996000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238303637396666353139643966333031343833303863363637653730 Sep 13 01:37:29.997000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:29.997000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:29.997000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:29.997000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:29.997000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:29.997000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:29.997000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:29.997000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:29.997000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:29.997000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:29.997000 audit: BPF prog-id=64 op=LOAD Sep 13 01:37:29.997000 audit[2121]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2040 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:29.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238303637396666353139643966333031343833303863363637653730 Sep 13 01:37:29.997000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:29.997000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:29.997000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:29.997000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:29.997000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:29.997000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:29.997000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:29.997000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:29.997000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:29.997000 audit: BPF prog-id=65 op=LOAD Sep 13 01:37:29.997000 audit[2121]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2040 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:29.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238303637396666353139643966333031343833303863363637653730 Sep 13 01:37:29.997000 audit: BPF prog-id=65 op=UNLOAD Sep 13 01:37:29.997000 audit: BPF prog-id=64 op=UNLOAD Sep 13 01:37:29.997000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:29.997000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:29.997000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:29.997000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:29.997000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:29.997000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:29.997000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:29.997000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:29.997000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:29.997000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:29.997000 audit: BPF prog-id=66 op=LOAD Sep 13 01:37:29.997000 audit[2121]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2040 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:29.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238303637396666353139643966333031343833303863363637653730 Sep 13 01:37:30.019740 systemd[1]: cri-containerd-280679ff519d9f30148308c667e70c08722f83404db2698b5593048005cf5866.scope: Deactivated successfully. Sep 13 01:37:30.021000 audit: BPF prog-id=66 op=UNLOAD Sep 13 01:37:30.023308 env[1478]: time="2025-09-13T01:37:30.023238708Z" level=info msg="StartContainer for \"280679ff519d9f30148308c667e70c08722f83404db2698b5593048005cf5866\" returns successfully" Sep 13 01:37:30.164412 env[1478]: time="2025-09-13T01:37:30.164369077Z" level=info msg="shim disconnected" id=280679ff519d9f30148308c667e70c08722f83404db2698b5593048005cf5866 Sep 13 01:37:30.164684 env[1478]: time="2025-09-13T01:37:30.164665038Z" level=warning msg="cleaning up after shim disconnected" id=280679ff519d9f30148308c667e70c08722f83404db2698b5593048005cf5866 namespace=k8s.io Sep 13 01:37:30.164795 env[1478]: time="2025-09-13T01:37:30.164780079Z" level=info msg="cleaning up dead shim" Sep 13 01:37:30.171708 env[1478]: time="2025-09-13T01:37:30.171674110Z" level=warning msg="cleanup warnings time=\"2025-09-13T01:37:30Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2161 runtime=io.containerd.runc.v2\n" Sep 13 01:37:30.289831 kubelet[1979]: E0913 01:37:30.289518 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:30.458856 kubelet[1979]: E0913 01:37:30.458811 1979 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9xghd" podUID="0f333ef7-95f8-4a9d-8f0e-3b7b944508da" Sep 13 01:37:30.939086 systemd[1]: run-containerd-runc-k8s.io-280679ff519d9f30148308c667e70c08722f83404db2698b5593048005cf5866-runc.oShMHV.mount: Deactivated successfully. Sep 13 01:37:30.939172 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-280679ff519d9f30148308c667e70c08722f83404db2698b5593048005cf5866-rootfs.mount: Deactivated successfully. Sep 13 01:37:31.148164 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount909533909.mount: Deactivated successfully. Sep 13 01:37:31.290636 kubelet[1979]: E0913 01:37:31.290379 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:31.668754 env[1478]: time="2025-09-13T01:37:31.668711831Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:31.677871 env[1478]: time="2025-09-13T01:37:31.677833191Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:72b57ec14d31e8422925ef4c3eff44822cdc04a11fd30d13824f1897d83a16d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:31.682388 env[1478]: time="2025-09-13T01:37:31.682355052Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:31.687068 env[1478]: time="2025-09-13T01:37:31.687037193Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:886af02535dc34886e4618b902f8c140d89af57233a245621d29642224516064,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:31.687636 env[1478]: time="2025-09-13T01:37:31.687606355Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.9\" returns image reference \"sha256:72b57ec14d31e8422925ef4c3eff44822cdc04a11fd30d13824f1897d83a16d4\"" Sep 13 01:37:31.689552 env[1478]: time="2025-09-13T01:37:31.689524964Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\"" Sep 13 01:37:31.690357 env[1478]: time="2025-09-13T01:37:31.690304847Z" level=info msg="CreateContainer within sandbox \"38f6c908609b69afd8d895a1eb7a05343479b881989a77e65cc4036efded3c7c\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Sep 13 01:37:31.717032 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1122018843.mount: Deactivated successfully. Sep 13 01:37:31.737222 env[1478]: time="2025-09-13T01:37:31.737171377Z" level=info msg="CreateContainer within sandbox \"38f6c908609b69afd8d895a1eb7a05343479b881989a77e65cc4036efded3c7c\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"df23af820e7edc9f633f052469b53a3f77fcff606667b82bc27f6c1ba9034d71\"" Sep 13 01:37:31.737887 env[1478]: time="2025-09-13T01:37:31.737858340Z" level=info msg="StartContainer for \"df23af820e7edc9f633f052469b53a3f77fcff606667b82bc27f6c1ba9034d71\"" Sep 13 01:37:31.751655 systemd[1]: Started cri-containerd-df23af820e7edc9f633f052469b53a3f77fcff606667b82bc27f6c1ba9034d71.scope. Sep 13 01:37:31.766000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:31.766000 audit[2186]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001495a0 a2=3c a3=0 items=0 ppid=2053 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:31.766000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466323361663832306537656463396636333366303532343639623533 Sep 13 01:37:31.766000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:31.766000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:31.766000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:31.766000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:31.766000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:31.766000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:31.766000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:31.766000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:31.766000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:31.766000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:31.766000 audit: BPF prog-id=67 op=LOAD Sep 13 01:37:31.766000 audit[2186]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001498e0 a2=78 a3=0 items=0 ppid=2053 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:31.766000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466323361663832306537656463396636333366303532343639623533 Sep 13 01:37:31.767000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:31.767000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:31.767000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:31.767000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:31.767000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:31.767000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:31.767000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:31.767000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:31.767000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:31.767000 audit: BPF prog-id=68 op=LOAD Sep 13 01:37:31.767000 audit[2186]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000149670 a2=78 a3=0 items=0 ppid=2053 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:31.767000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466323361663832306537656463396636333366303532343639623533 Sep 13 01:37:31.767000 audit: BPF prog-id=68 op=UNLOAD Sep 13 01:37:31.767000 audit: BPF prog-id=67 op=UNLOAD Sep 13 01:37:31.767000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:31.767000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:31.767000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:31.767000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:31.767000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:31.767000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:31.767000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:31.767000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:31.767000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:31.767000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:31.767000 audit: BPF prog-id=69 op=LOAD Sep 13 01:37:31.767000 audit[2186]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000149b40 a2=78 a3=0 items=0 ppid=2053 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:31.767000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466323361663832306537656463396636333366303532343639623533 Sep 13 01:37:31.788027 env[1478]: time="2025-09-13T01:37:31.787968285Z" level=info msg="StartContainer for \"df23af820e7edc9f633f052469b53a3f77fcff606667b82bc27f6c1ba9034d71\" returns successfully" Sep 13 01:37:31.939021 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2855563720.mount: Deactivated successfully. Sep 13 01:37:31.960000 audit[2245]: NETFILTER_CFG table=mangle:17 family=2 entries=1 op=nft_register_chain pid=2245 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:31.960000 audit[2245]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdb9553f0 a2=0 a3=1 items=0 ppid=2196 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:31.960000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 13 01:37:31.963000 audit[2246]: NETFILTER_CFG table=mangle:18 family=10 entries=1 op=nft_register_chain pid=2246 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:31.963000 audit[2246]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd2ea25d0 a2=0 a3=1 items=0 ppid=2196 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:31.963000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 13 01:37:31.964000 audit[2247]: NETFILTER_CFG table=nat:19 family=2 entries=1 op=nft_register_chain pid=2247 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:31.964000 audit[2247]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc014d6c0 a2=0 a3=1 items=0 ppid=2196 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:31.964000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 13 01:37:31.964000 audit[2249]: NETFILTER_CFG table=nat:20 family=10 entries=1 op=nft_register_chain pid=2249 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:31.964000 audit[2249]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe718a3a0 a2=0 a3=1 items=0 ppid=2196 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:31.964000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 13 01:37:31.965000 audit[2250]: NETFILTER_CFG table=filter:21 family=10 entries=1 op=nft_register_chain pid=2250 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:31.965000 audit[2250]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc0392480 a2=0 a3=1 items=0 ppid=2196 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:31.965000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 13 01:37:31.965000 audit[2251]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_chain pid=2251 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:31.965000 audit[2251]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd946b170 a2=0 a3=1 items=0 ppid=2196 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:31.965000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 13 01:37:32.062000 audit[2252]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2252 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:32.062000 audit[2252]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffc352ed60 a2=0 a3=1 items=0 ppid=2196 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:32.062000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 13 01:37:32.066000 audit[2254]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2254 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:32.066000 audit[2254]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffdbdd3690 a2=0 a3=1 items=0 ppid=2196 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:32.066000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Sep 13 01:37:32.069000 audit[2257]: NETFILTER_CFG table=filter:25 family=2 entries=2 op=nft_register_chain pid=2257 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:32.069000 audit[2257]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffec888060 a2=0 a3=1 items=0 ppid=2196 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:32.069000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Sep 13 01:37:32.071000 audit[2258]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_chain pid=2258 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:32.071000 audit[2258]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe581c590 a2=0 a3=1 items=0 ppid=2196 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:32.071000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 13 01:37:32.073000 audit[2260]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2260 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:32.073000 audit[2260]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff98a1080 a2=0 a3=1 items=0 ppid=2196 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:32.073000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 13 01:37:32.074000 audit[2261]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2261 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:32.074000 audit[2261]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffdb6c470 a2=0 a3=1 items=0 ppid=2196 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:32.074000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 13 01:37:32.076000 audit[2263]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2263 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:32.076000 audit[2263]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff4fda3f0 a2=0 a3=1 items=0 ppid=2196 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:32.076000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 13 01:37:32.079000 audit[2266]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2266 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:32.079000 audit[2266]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd60ae0c0 a2=0 a3=1 items=0 ppid=2196 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:32.079000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Sep 13 01:37:32.080000 audit[2267]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_chain pid=2267 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:32.080000 audit[2267]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe1763f90 a2=0 a3=1 items=0 ppid=2196 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:32.080000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 13 01:37:32.082000 audit[2269]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2269 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:32.082000 audit[2269]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffffa1fd1a0 a2=0 a3=1 items=0 ppid=2196 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:32.082000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 13 01:37:32.084000 audit[2270]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_chain pid=2270 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:32.084000 audit[2270]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd4212fc0 a2=0 a3=1 items=0 ppid=2196 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:32.084000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 13 01:37:32.086000 audit[2272]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_rule pid=2272 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:32.086000 audit[2272]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe2ed0640 a2=0 a3=1 items=0 ppid=2196 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:32.086000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 13 01:37:32.089000 audit[2275]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_rule pid=2275 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:32.089000 audit[2275]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd6b7f8c0 a2=0 a3=1 items=0 ppid=2196 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:32.089000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 13 01:37:32.092000 audit[2278]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_rule pid=2278 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:32.092000 audit[2278]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffca49fc20 a2=0 a3=1 items=0 ppid=2196 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:32.092000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 13 01:37:32.093000 audit[2279]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2279 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:32.093000 audit[2279]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc5bfe1c0 a2=0 a3=1 items=0 ppid=2196 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:32.093000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 13 01:37:32.095000 audit[2281]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2281 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:32.095000 audit[2281]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffefe6b160 a2=0 a3=1 items=0 ppid=2196 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:32.095000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 01:37:32.283000 audit[2285]: NETFILTER_CFG table=nat:39 family=2 entries=2 op=nft_register_chain pid=2285 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:32.283000 audit[2285]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffc7eaa610 a2=0 a3=1 items=0 ppid=2196 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:32.283000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 01:37:32.284000 audit[2286]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2286 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:32.284000 audit[2286]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd68afa70 a2=0 a3=1 items=0 ppid=2196 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:32.284000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 13 01:37:32.286000 audit[2288]: NETFILTER_CFG table=nat:41 family=2 entries=2 op=nft_register_chain pid=2288 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:37:32.286000 audit[2288]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffd9404bb0 a2=0 a3=1 items=0 ppid=2196 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:32.286000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 13 01:37:32.290779 kubelet[1979]: E0913 01:37:32.290737 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:32.365000 audit[2294]: NETFILTER_CFG table=filter:42 family=2 entries=5 op=nft_register_rule pid=2294 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:37:32.365000 audit[2294]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffd193a4c0 a2=0 a3=1 items=0 ppid=2196 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:32.365000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:37:32.459937 kubelet[1979]: E0913 01:37:32.459015 1979 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9xghd" podUID="0f333ef7-95f8-4a9d-8f0e-3b7b944508da" Sep 13 01:37:32.498188 kubelet[1979]: I0913 01:37:32.498097 1979 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-8qwpq" podStartSLOduration=11.082014667 podStartE2EDuration="14.498083612s" podCreationTimestamp="2025-09-13 01:37:18 +0000 UTC" firstStartedPulling="2025-09-13 01:37:28.272670695 +0000 UTC m=+10.922010332" lastFinishedPulling="2025-09-13 01:37:31.68873964 +0000 UTC m=+14.338079277" observedRunningTime="2025-09-13 01:37:32.497836091 +0000 UTC m=+15.147175728" watchObservedRunningTime="2025-09-13 01:37:32.498083612 +0000 UTC m=+15.147423249" Sep 13 01:37:32.628000 audit[2294]: NETFILTER_CFG table=nat:43 family=2 entries=79 op=nft_register_chain pid=2294 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:37:32.628000 audit[2294]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=38092 a0=3 a1=ffffd193a4c0 a2=0 a3=1 items=0 ppid=2196 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:32.628000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:37:32.716000 audit[2302]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2302 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:32.716000 audit[2302]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffff2cd0e60 a2=0 a3=1 items=0 ppid=2196 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:32.716000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 13 01:37:32.718000 audit[2304]: NETFILTER_CFG table=filter:45 family=10 entries=2 op=nft_register_chain pid=2304 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:32.718000 audit[2304]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffffb878630 a2=0 a3=1 items=0 ppid=2196 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:32.718000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Sep 13 01:37:32.721000 audit[2307]: NETFILTER_CFG table=filter:46 family=10 entries=2 op=nft_register_chain pid=2307 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:32.721000 audit[2307]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffe714b540 a2=0 a3=1 items=0 ppid=2196 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:32.721000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Sep 13 01:37:32.722000 audit[2308]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_chain pid=2308 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:32.722000 audit[2308]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffde60bd80 a2=0 a3=1 items=0 ppid=2196 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:32.722000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 13 01:37:32.724000 audit[2310]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_rule pid=2310 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:32.724000 audit[2310]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffce96b4c0 a2=0 a3=1 items=0 ppid=2196 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:32.724000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 13 01:37:32.725000 audit[2311]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2311 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:32.725000 audit[2311]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe0852dc0 a2=0 a3=1 items=0 ppid=2196 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:32.725000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 13 01:37:32.727000 audit[2313]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2313 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:32.727000 audit[2313]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffffe786cf0 a2=0 a3=1 items=0 ppid=2196 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:32.727000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Sep 13 01:37:32.730000 audit[2316]: NETFILTER_CFG table=filter:51 family=10 entries=2 op=nft_register_chain pid=2316 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:32.730000 audit[2316]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=fffff2e3f9e0 a2=0 a3=1 items=0 ppid=2196 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:32.730000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 13 01:37:32.731000 audit[2317]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_chain pid=2317 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:32.731000 audit[2317]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdf5c1170 a2=0 a3=1 items=0 ppid=2196 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:32.731000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 13 01:37:32.733000 audit[2319]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2319 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:32.733000 audit[2319]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff691fcc0 a2=0 a3=1 items=0 ppid=2196 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:32.733000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 13 01:37:32.734000 audit[2320]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_chain pid=2320 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:32.734000 audit[2320]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff8f3ea80 a2=0 a3=1 items=0 ppid=2196 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:32.734000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 13 01:37:32.737000 audit[2322]: NETFILTER_CFG table=filter:55 family=10 entries=1 op=nft_register_rule pid=2322 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:32.737000 audit[2322]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc78bbee0 a2=0 a3=1 items=0 ppid=2196 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:32.737000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 13 01:37:32.740000 audit[2325]: NETFILTER_CFG table=filter:56 family=10 entries=1 op=nft_register_rule pid=2325 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:32.740000 audit[2325]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc60556f0 a2=0 a3=1 items=0 ppid=2196 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:32.740000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 13 01:37:32.743000 audit[2328]: NETFILTER_CFG table=filter:57 family=10 entries=1 op=nft_register_rule pid=2328 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:32.743000 audit[2328]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc76e3d50 a2=0 a3=1 items=0 ppid=2196 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:32.743000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Sep 13 01:37:32.744000 audit[2329]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2329 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:32.744000 audit[2329]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffdc6d47c0 a2=0 a3=1 items=0 ppid=2196 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:32.744000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 13 01:37:32.746000 audit[2331]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2331 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:32.746000 audit[2331]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffc3eae5c0 a2=0 a3=1 items=0 ppid=2196 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:32.746000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 01:37:32.749000 audit[2334]: NETFILTER_CFG table=nat:60 family=10 entries=2 op=nft_register_chain pid=2334 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:32.749000 audit[2334]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffcb003ee0 a2=0 a3=1 items=0 ppid=2196 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:32.749000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 01:37:32.750000 audit[2335]: NETFILTER_CFG table=nat:61 family=10 entries=1 op=nft_register_chain pid=2335 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:32.750000 audit[2335]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc1ff2fa0 a2=0 a3=1 items=0 ppid=2196 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:32.750000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 13 01:37:32.752000 audit[2337]: NETFILTER_CFG table=nat:62 family=10 entries=2 op=nft_register_chain pid=2337 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:32.752000 audit[2337]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffddde1a10 a2=0 a3=1 items=0 ppid=2196 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:32.752000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 13 01:37:32.753000 audit[2338]: NETFILTER_CFG table=filter:63 family=10 entries=1 op=nft_register_chain pid=2338 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:32.753000 audit[2338]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe4397bd0 a2=0 a3=1 items=0 ppid=2196 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:32.753000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 13 01:37:32.755000 audit[2340]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_rule pid=2340 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:32.755000 audit[2340]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff92b2380 a2=0 a3=1 items=0 ppid=2196 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:32.755000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 01:37:32.758000 audit[2343]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_rule pid=2343 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:37:32.758000 audit[2343]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff2bb9550 a2=0 a3=1 items=0 ppid=2196 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:32.758000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 01:37:32.760000 audit[2345]: NETFILTER_CFG table=filter:66 family=10 entries=3 op=nft_register_rule pid=2345 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 13 01:37:32.760000 audit[2345]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2088 a0=3 a1=ffffc999fa40 a2=0 a3=1 items=0 ppid=2196 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:32.760000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:37:32.761000 audit[2345]: NETFILTER_CFG table=nat:67 family=10 entries=7 op=nft_register_chain pid=2345 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 13 01:37:32.761000 audit[2345]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffc999fa40 a2=0 a3=1 items=0 ppid=2196 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:32.761000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:37:33.291610 kubelet[1979]: E0913 01:37:33.291552 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:34.292490 kubelet[1979]: E0913 01:37:34.292443 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:34.375608 env[1478]: time="2025-09-13T01:37:34.375552553Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:34.382022 env[1478]: time="2025-09-13T01:37:34.381994459Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7077a1dc632ee598cbfa626f9e3c9bca5b20c0d1e1e557995890125b2e8d2e23,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:34.385934 env[1478]: time="2025-09-13T01:37:34.385898236Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:34.389840 env[1478]: time="2025-09-13T01:37:34.389814772Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:73d1e391050490d54e5bee8ff2b1a50a8be1746c98dc530361b00e8c0ab63f87,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:34.390224 env[1478]: time="2025-09-13T01:37:34.390196374Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\" returns image reference \"sha256:7077a1dc632ee598cbfa626f9e3c9bca5b20c0d1e1e557995890125b2e8d2e23\"" Sep 13 01:37:34.392321 env[1478]: time="2025-09-13T01:37:34.392286502Z" level=info msg="CreateContainer within sandbox \"4672f2121a49c696e47eb47a096e1f177b0f58905f12bcdfe735fa40ec5c6239\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Sep 13 01:37:34.434202 env[1478]: time="2025-09-13T01:37:34.434156676Z" level=info msg="CreateContainer within sandbox \"4672f2121a49c696e47eb47a096e1f177b0f58905f12bcdfe735fa40ec5c6239\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"de498765969c9effbe43033fcb1d193062940c07d42d28996b50399aaf8fe88d\"" Sep 13 01:37:34.434837 env[1478]: time="2025-09-13T01:37:34.434810279Z" level=info msg="StartContainer for \"de498765969c9effbe43033fcb1d193062940c07d42d28996b50399aaf8fe88d\"" Sep 13 01:37:34.455052 systemd[1]: run-containerd-runc-k8s.io-de498765969c9effbe43033fcb1d193062940c07d42d28996b50399aaf8fe88d-runc.BfM4qL.mount: Deactivated successfully. Sep 13 01:37:34.460217 kubelet[1979]: E0913 01:37:34.459887 1979 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9xghd" podUID="0f333ef7-95f8-4a9d-8f0e-3b7b944508da" Sep 13 01:37:34.462918 systemd[1]: Started cri-containerd-de498765969c9effbe43033fcb1d193062940c07d42d28996b50399aaf8fe88d.scope. Sep 13 01:37:34.474000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:34.480904 kernel: kauditd_printk_skb: 348 callbacks suppressed Sep 13 01:37:34.480968 kernel: audit: type=1400 audit(1757727454.474:524): avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:34.500414 kernel: audit: type=1300 audit(1757727454.474:524): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2040 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:34.474000 audit[2354]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2040 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:34.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465343938373635393639633965666662653433303333666362316431 Sep 13 01:37:34.554379 kernel: audit: type=1327 audit(1757727454.474:524): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465343938373635393639633965666662653433303333666362316431 Sep 13 01:37:34.554501 kernel: audit: type=1400 audit(1757727454.474:525): avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:34.474000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:34.474000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:34.590322 kernel: audit: type=1400 audit(1757727454.474:525): avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:34.474000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:34.601132 env[1478]: time="2025-09-13T01:37:34.601092131Z" level=info msg="StartContainer for \"de498765969c9effbe43033fcb1d193062940c07d42d28996b50399aaf8fe88d\" returns successfully" Sep 13 01:37:34.615084 kernel: audit: type=1400 audit(1757727454.474:525): avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:34.615194 kernel: audit: type=1400 audit(1757727454.474:525): avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:34.474000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:34.474000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:34.649327 kernel: audit: type=1400 audit(1757727454.474:525): avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:34.474000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:34.667249 kernel: audit: type=1400 audit(1757727454.474:525): avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:34.667386 kernel: audit: type=1400 audit(1757727454.474:525): avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:34.474000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:34.474000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:34.474000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:34.474000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:34.474000 audit: BPF prog-id=70 op=LOAD Sep 13 01:37:34.474000 audit[2354]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2040 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:34.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465343938373635393639633965666662653433303333666362316431 Sep 13 01:37:34.479000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:34.479000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:34.479000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:34.479000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:34.479000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:34.479000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:34.479000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:34.479000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:34.479000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:34.479000 audit: BPF prog-id=71 op=LOAD Sep 13 01:37:34.479000 audit[2354]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2040 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:34.479000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465343938373635393639633965666662653433303333666362316431 Sep 13 01:37:34.499000 audit: BPF prog-id=71 op=UNLOAD Sep 13 01:37:34.499000 audit: BPF prog-id=70 op=UNLOAD Sep 13 01:37:34.499000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:34.499000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:34.499000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:34.499000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:34.499000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:34.499000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:34.499000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:34.499000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:34.499000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:34.499000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:34.499000 audit: BPF prog-id=72 op=LOAD Sep 13 01:37:34.499000 audit[2354]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2040 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:34.499000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465343938373635393639633965666662653433303333666362316431 Sep 13 01:37:35.293556 kubelet[1979]: E0913 01:37:35.293521 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:36.294210 kubelet[1979]: E0913 01:37:36.294179 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:36.459567 kubelet[1979]: E0913 01:37:36.459527 1979 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9xghd" podUID="0f333ef7-95f8-4a9d-8f0e-3b7b944508da" Sep 13 01:37:36.863600 env[1478]: time="2025-09-13T01:37:36.863536151Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 13 01:37:36.865853 systemd[1]: cri-containerd-de498765969c9effbe43033fcb1d193062940c07d42d28996b50399aaf8fe88d.scope: Deactivated successfully. Sep 13 01:37:36.867000 audit: BPF prog-id=72 op=UNLOAD Sep 13 01:37:36.882894 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-de498765969c9effbe43033fcb1d193062940c07d42d28996b50399aaf8fe88d-rootfs.mount: Deactivated successfully. Sep 13 01:37:36.887066 kubelet[1979]: I0913 01:37:36.887046 1979 kubelet_node_status.go:501] "Fast updating node status as it just became ready" Sep 13 01:37:37.295023 kubelet[1979]: E0913 01:37:37.294960 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:37.305125 env[1478]: time="2025-09-13T01:37:37.305086792Z" level=info msg="shim disconnected" id=de498765969c9effbe43033fcb1d193062940c07d42d28996b50399aaf8fe88d Sep 13 01:37:37.305275 env[1478]: time="2025-09-13T01:37:37.305258672Z" level=warning msg="cleaning up after shim disconnected" id=de498765969c9effbe43033fcb1d193062940c07d42d28996b50399aaf8fe88d namespace=k8s.io Sep 13 01:37:37.305360 env[1478]: time="2025-09-13T01:37:37.305324672Z" level=info msg="cleaning up dead shim" Sep 13 01:37:37.311888 env[1478]: time="2025-09-13T01:37:37.311850378Z" level=warning msg="cleanup warnings time=\"2025-09-13T01:37:37Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2392 runtime=io.containerd.runc.v2\n" Sep 13 01:37:37.510500 env[1478]: time="2025-09-13T01:37:37.510458786Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\"" Sep 13 01:37:38.274604 kubelet[1979]: E0913 01:37:38.274551 1979 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:38.296172 kubelet[1979]: E0913 01:37:38.296115 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:38.463520 systemd[1]: Created slice kubepods-besteffort-pod0f333ef7_95f8_4a9d_8f0e_3b7b944508da.slice. Sep 13 01:37:38.465858 env[1478]: time="2025-09-13T01:37:38.465820438Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9xghd,Uid:0f333ef7-95f8-4a9d-8f0e-3b7b944508da,Namespace:calico-system,Attempt:0,}" Sep 13 01:37:38.484283 systemd[1]: Created slice kubepods-besteffort-podac1461c5_c97e_45ca_a77d_336ba3ca9941.slice. Sep 13 01:37:38.536547 kubelet[1979]: I0913 01:37:38.536076 1979 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bhv6v\" (UniqueName: \"kubernetes.io/projected/ac1461c5-c97e-45ca-a77d-336ba3ca9941-kube-api-access-bhv6v\") pod \"nginx-deployment-7fcdb87857-5tmnx\" (UID: \"ac1461c5-c97e-45ca-a77d-336ba3ca9941\") " pod="default/nginx-deployment-7fcdb87857-5tmnx" Sep 13 01:37:38.560773 env[1478]: time="2025-09-13T01:37:38.560699476Z" level=error msg="Failed to destroy network for sandbox \"6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 01:37:38.563194 env[1478]: time="2025-09-13T01:37:38.562865924Z" level=error msg="encountered an error cleaning up failed sandbox \"6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 01:37:38.563194 env[1478]: time="2025-09-13T01:37:38.562934284Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9xghd,Uid:0f333ef7-95f8-4a9d-8f0e-3b7b944508da,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 01:37:38.562226 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9-shm.mount: Deactivated successfully. Sep 13 01:37:38.563572 kubelet[1979]: E0913 01:37:38.563507 1979 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 01:37:38.563635 kubelet[1979]: E0913 01:37:38.563594 1979 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-9xghd" Sep 13 01:37:38.563714 kubelet[1979]: E0913 01:37:38.563616 1979 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-9xghd" Sep 13 01:37:38.563714 kubelet[1979]: E0913 01:37:38.563682 1979 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-9xghd_calico-system(0f333ef7-95f8-4a9d-8f0e-3b7b944508da)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-9xghd_calico-system(0f333ef7-95f8-4a9d-8f0e-3b7b944508da)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-9xghd" podUID="0f333ef7-95f8-4a9d-8f0e-3b7b944508da" Sep 13 01:37:38.789091 env[1478]: time="2025-09-13T01:37:38.788175415Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-5tmnx,Uid:ac1461c5-c97e-45ca-a77d-336ba3ca9941,Namespace:default,Attempt:0,}" Sep 13 01:37:38.913356 env[1478]: time="2025-09-13T01:37:38.913270447Z" level=error msg="Failed to destroy network for sandbox \"fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 01:37:38.913673 env[1478]: time="2025-09-13T01:37:38.913631288Z" level=error msg="encountered an error cleaning up failed sandbox \"fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 01:37:38.913732 env[1478]: time="2025-09-13T01:37:38.913688129Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-5tmnx,Uid:ac1461c5-c97e-45ca-a77d-336ba3ca9941,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 01:37:38.913932 kubelet[1979]: E0913 01:37:38.913893 1979 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 01:37:38.914000 kubelet[1979]: E0913 01:37:38.913951 1979 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-5tmnx" Sep 13 01:37:38.914000 kubelet[1979]: E0913 01:37:38.913971 1979 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-5tmnx" Sep 13 01:37:38.914123 kubelet[1979]: E0913 01:37:38.914012 1979 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-7fcdb87857-5tmnx_default(ac1461c5-c97e-45ca-a77d-336ba3ca9941)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-7fcdb87857-5tmnx_default(ac1461c5-c97e-45ca-a77d-336ba3ca9941)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-5tmnx" podUID="ac1461c5-c97e-45ca-a77d-336ba3ca9941" Sep 13 01:37:39.296794 kubelet[1979]: E0913 01:37:39.296728 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:39.494737 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175-shm.mount: Deactivated successfully. Sep 13 01:37:39.516905 kubelet[1979]: I0913 01:37:39.516872 1979 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9" Sep 13 01:37:39.517797 env[1478]: time="2025-09-13T01:37:39.517757725Z" level=info msg="StopPodSandbox for \"6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9\"" Sep 13 01:37:39.518977 kubelet[1979]: I0913 01:37:39.518939 1979 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175" Sep 13 01:37:39.523861 env[1478]: time="2025-09-13T01:37:39.523812987Z" level=info msg="StopPodSandbox for \"fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175\"" Sep 13 01:37:39.549022 env[1478]: time="2025-09-13T01:37:39.548517878Z" level=error msg="StopPodSandbox for \"6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9\" failed" error="failed to destroy network for sandbox \"6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 01:37:39.549124 kubelet[1979]: E0913 01:37:39.548758 1979 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9" Sep 13 01:37:39.549124 kubelet[1979]: E0913 01:37:39.548818 1979 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9"} Sep 13 01:37:39.549124 kubelet[1979]: E0913 01:37:39.548874 1979 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0f333ef7-95f8-4a9d-8f0e-3b7b944508da\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 01:37:39.549124 kubelet[1979]: E0913 01:37:39.548894 1979 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0f333ef7-95f8-4a9d-8f0e-3b7b944508da\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-9xghd" podUID="0f333ef7-95f8-4a9d-8f0e-3b7b944508da" Sep 13 01:37:39.562947 env[1478]: time="2025-09-13T01:37:39.562893571Z" level=error msg="StopPodSandbox for \"fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175\" failed" error="failed to destroy network for sandbox \"fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 01:37:39.563325 kubelet[1979]: E0913 01:37:39.563279 1979 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175" Sep 13 01:37:39.563413 kubelet[1979]: E0913 01:37:39.563349 1979 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175"} Sep 13 01:37:39.563413 kubelet[1979]: E0913 01:37:39.563385 1979 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ac1461c5-c97e-45ca-a77d-336ba3ca9941\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 01:37:39.563499 kubelet[1979]: E0913 01:37:39.563407 1979 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ac1461c5-c97e-45ca-a77d-336ba3ca9941\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-5tmnx" podUID="ac1461c5-c97e-45ca-a77d-336ba3ca9941" Sep 13 01:37:40.297481 kubelet[1979]: E0913 01:37:40.297428 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:41.298293 kubelet[1979]: E0913 01:37:41.298237 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:42.298577 kubelet[1979]: E0913 01:37:42.298523 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:42.756729 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3481215730.mount: Deactivated successfully. Sep 13 01:37:42.802353 env[1478]: time="2025-09-13T01:37:42.802276261Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:42.808890 env[1478]: time="2025-09-13T01:37:42.808848324Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b8abd2140fc4464ed664d225fe38e5b90bbfcf62996b484b0fc0e0537b6a4a9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:42.813647 env[1478]: time="2025-09-13T01:37:42.813606140Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:42.817114 env[1478]: time="2025-09-13T01:37:42.817090032Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:bcb8146fcaeced1e1c88fad3eaa697f1680746bd23c3e7e8d4535bc484c6f2a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:42.817430 env[1478]: time="2025-09-13T01:37:42.817402073Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\" returns image reference \"sha256:2b8abd2140fc4464ed664d225fe38e5b90bbfcf62996b484b0fc0e0537b6a4a9\"" Sep 13 01:37:42.829556 env[1478]: time="2025-09-13T01:37:42.829520995Z" level=info msg="CreateContainer within sandbox \"4672f2121a49c696e47eb47a096e1f177b0f58905f12bcdfe735fa40ec5c6239\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Sep 13 01:37:42.853964 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1591514379.mount: Deactivated successfully. Sep 13 01:37:42.872432 env[1478]: time="2025-09-13T01:37:42.872370822Z" level=info msg="CreateContainer within sandbox \"4672f2121a49c696e47eb47a096e1f177b0f58905f12bcdfe735fa40ec5c6239\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"1dff9a187ce82f59bbe29e41335aed17899c68c59f7272e931e003d36926858e\"" Sep 13 01:37:42.873260 env[1478]: time="2025-09-13T01:37:42.873232905Z" level=info msg="StartContainer for \"1dff9a187ce82f59bbe29e41335aed17899c68c59f7272e931e003d36926858e\"" Sep 13 01:37:42.886930 systemd[1]: Started cri-containerd-1dff9a187ce82f59bbe29e41335aed17899c68c59f7272e931e003d36926858e.scope. Sep 13 01:37:42.903000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:42.909781 kernel: kauditd_printk_skb: 34 callbacks suppressed Sep 13 01:37:42.909838 kernel: audit: type=1400 audit(1757727462.903:531): avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:42.903000 audit[2496]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001495a0 a2=3c a3=0 items=0 ppid=2040 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:42.950311 kernel: audit: type=1300 audit(1757727462.903:531): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001495a0 a2=3c a3=0 items=0 ppid=2040 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:42.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164666639613138376365383266353962626532396534313333356165 Sep 13 01:37:42.973757 kernel: audit: type=1327 audit(1757727462.903:531): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164666639613138376365383266353962626532396534313333356165 Sep 13 01:37:42.997014 kernel: audit: type=1400 audit(1757727462.903:532): avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:42.997093 kernel: audit: type=1400 audit(1757727462.903:532): avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:42.903000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:42.903000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:42.903000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.007219 env[1478]: time="2025-09-13T01:37:43.007177765Z" level=info msg="StartContainer for \"1dff9a187ce82f59bbe29e41335aed17899c68c59f7272e931e003d36926858e\" returns successfully" Sep 13 01:37:43.023749 kernel: audit: type=1400 audit(1757727462.903:532): avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.023891 kernel: audit: type=1400 audit(1757727462.903:532): avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:42.903000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:42.903000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.058580 kernel: audit: type=1400 audit(1757727462.903:532): avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.058709 kernel: audit: type=1400 audit(1757727462.903:532): avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:42.903000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:42.903000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:43.095525 kernel: audit: type=1400 audit(1757727462.903:532): avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:42.903000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:42.903000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:42.903000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:42.903000 audit: BPF prog-id=73 op=LOAD Sep 13 01:37:42.903000 audit[2496]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001498e0 a2=78 a3=0 items=0 ppid=2040 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:42.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164666639613138376365383266353962626532396534313333356165 Sep 13 01:37:42.903000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:42.903000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:42.903000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:42.903000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:42.903000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:42.903000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:42.903000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:42.903000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:42.903000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:42.903000 audit: BPF prog-id=74 op=LOAD Sep 13 01:37:42.903000 audit[2496]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000149670 a2=78 a3=0 items=0 ppid=2040 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:42.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164666639613138376365383266353962626532396534313333356165 Sep 13 01:37:42.903000 audit: BPF prog-id=74 op=UNLOAD Sep 13 01:37:42.903000 audit: BPF prog-id=73 op=UNLOAD Sep 13 01:37:42.903000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:42.903000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:42.903000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:42.903000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:42.903000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:42.903000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:42.903000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:42.903000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:42.903000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:42.903000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:42.903000 audit: BPF prog-id=75 op=LOAD Sep 13 01:37:42.903000 audit[2496]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000149b40 a2=78 a3=0 items=0 ppid=2040 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:42.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164666639613138376365383266353962626532396534313333356165 Sep 13 01:37:43.299474 kubelet[1979]: E0913 01:37:43.299367 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:43.545373 kubelet[1979]: I0913 01:37:43.545272 1979 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-dhfjv" podStartSLOduration=10.985383482 podStartE2EDuration="25.545243973s" podCreationTimestamp="2025-09-13 01:37:18 +0000 UTC" firstStartedPulling="2025-09-13 01:37:28.258301785 +0000 UTC m=+10.907641422" lastFinishedPulling="2025-09-13 01:37:42.818162276 +0000 UTC m=+25.467501913" observedRunningTime="2025-09-13 01:37:43.544923292 +0000 UTC m=+26.194262929" watchObservedRunningTime="2025-09-13 01:37:43.545243973 +0000 UTC m=+26.194583610" Sep 13 01:37:43.867279 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Sep 13 01:37:43.867518 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Sep 13 01:37:44.300002 kubelet[1979]: E0913 01:37:44.299965 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:44.542077 systemd[1]: run-containerd-runc-k8s.io-1dff9a187ce82f59bbe29e41335aed17899c68c59f7272e931e003d36926858e-runc.hv8Nxh.mount: Deactivated successfully. Sep 13 01:37:45.149000 audit[2633]: AVC avc: denied { write } for pid=2633 comm="tee" name="fd" dev="proc" ino=18818 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 01:37:45.149000 audit[2633]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffeac457d3 a2=241 a3=1b6 items=1 ppid=2601 pid=2633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.149000 audit: CWD cwd="/etc/service/enabled/bird6/log" Sep 13 01:37:45.149000 audit: PATH item=0 name="/dev/fd/63" inode=17713 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:37:45.149000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 01:37:45.160000 audit[2631]: AVC avc: denied { write } for pid=2631 comm="tee" name="fd" dev="proc" ino=17727 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 01:37:45.160000 audit[2631]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff62377d4 a2=241 a3=1b6 items=1 ppid=2602 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.160000 audit: CWD cwd="/etc/service/enabled/bird/log" Sep 13 01:37:45.160000 audit: PATH item=0 name="/dev/fd/63" inode=17712 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:37:45.160000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 01:37:45.168000 audit[2655]: AVC avc: denied { write } for pid=2655 comm="tee" name="fd" dev="proc" ino=17737 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 01:37:45.168000 audit[2655]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd4c877c3 a2=241 a3=1b6 items=1 ppid=2612 pid=2655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.168000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Sep 13 01:37:45.168000 audit: PATH item=0 name="/dev/fd/63" inode=17719 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:37:45.168000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 01:37:45.170000 audit[2662]: AVC avc: denied { write } for pid=2662 comm="tee" name="fd" dev="proc" ino=18833 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 01:37:45.170000 audit[2662]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd6bcf7d5 a2=241 a3=1b6 items=1 ppid=2616 pid=2662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.170000 audit: CWD cwd="/etc/service/enabled/cni/log" Sep 13 01:37:45.170000 audit: PATH item=0 name="/dev/fd/63" inode=18828 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:37:45.170000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 01:37:45.178000 audit[2669]: AVC avc: denied { write } for pid=2669 comm="tee" name="fd" dev="proc" ino=18838 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 01:37:45.178000 audit[2669]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdee927d3 a2=241 a3=1b6 items=1 ppid=2611 pid=2669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.178000 audit[2671]: AVC avc: denied { write } for pid=2671 comm="tee" name="fd" dev="proc" ino=18842 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 01:37:45.178000 audit: CWD cwd="/etc/service/enabled/confd/log" Sep 13 01:37:45.178000 audit: PATH item=0 name="/dev/fd/63" inode=17741 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:37:45.178000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 01:37:45.178000 audit[2671]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc346f7c4 a2=241 a3=1b6 items=1 ppid=2615 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.178000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Sep 13 01:37:45.178000 audit: PATH item=0 name="/dev/fd/63" inode=18835 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:37:45.178000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 01:37:45.204000 audit[2674]: AVC avc: denied { write } for pid=2674 comm="tee" name="fd" dev="proc" ino=18847 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 01:37:45.204000 audit[2674]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffde307d3 a2=241 a3=1b6 items=1 ppid=2607 pid=2674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.204000 audit: CWD cwd="/etc/service/enabled/felix/log" Sep 13 01:37:45.204000 audit: PATH item=0 name="/dev/fd/63" inode=18844 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:37:45.204000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 01:37:45.300126 kubelet[1979]: E0913 01:37:45.300082 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:45.404000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.404000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.404000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.404000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.404000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.404000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.404000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.404000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.404000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.404000 audit: BPF prog-id=76 op=LOAD Sep 13 01:37:45.404000 audit[2695]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff9de3df8 a2=98 a3=fffff9de3de8 items=0 ppid=2609 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.404000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 01:37:45.405000 audit: BPF prog-id=76 op=UNLOAD Sep 13 01:37:45.405000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.405000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.405000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.405000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.405000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.405000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.405000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.405000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.405000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.405000 audit: BPF prog-id=77 op=LOAD Sep 13 01:37:45.405000 audit[2695]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff9de3ca8 a2=74 a3=95 items=0 ppid=2609 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.405000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 01:37:45.406000 audit: BPF prog-id=77 op=UNLOAD Sep 13 01:37:45.406000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.406000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.406000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.406000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.406000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.406000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.406000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.406000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.406000 audit[2695]: AVC avc: denied { bpf } for pid=2695 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.406000 audit: BPF prog-id=78 op=LOAD Sep 13 01:37:45.406000 audit[2695]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff9de3cd8 a2=40 a3=fffff9de3d08 items=0 ppid=2609 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.406000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 01:37:45.406000 audit: BPF prog-id=78 op=UNLOAD Sep 13 01:37:45.406000 audit[2695]: AVC avc: denied { perfmon } for pid=2695 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.406000 audit[2695]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=fffff9de3df0 a2=50 a3=0 items=0 ppid=2609 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.406000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 01:37:45.409000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.409000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.409000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.409000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.409000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.409000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.409000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.409000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.409000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.409000 audit: BPF prog-id=79 op=LOAD Sep 13 01:37:45.409000 audit[2703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcdad2ec8 a2=98 a3=ffffcdad2eb8 items=0 ppid=2609 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.409000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:37:45.409000 audit: BPF prog-id=79 op=UNLOAD Sep 13 01:37:45.410000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.410000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.410000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.410000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.410000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.410000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.410000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.410000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.410000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.410000 audit: BPF prog-id=80 op=LOAD Sep 13 01:37:45.410000 audit[2703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffcdad2b58 a2=74 a3=95 items=0 ppid=2609 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.410000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:37:45.410000 audit: BPF prog-id=80 op=UNLOAD Sep 13 01:37:45.410000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.410000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.410000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.410000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.410000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.410000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.410000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.410000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.410000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.410000 audit: BPF prog-id=81 op=LOAD Sep 13 01:37:45.410000 audit[2703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffcdad2bb8 a2=94 a3=2 items=0 ppid=2609 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.410000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:37:45.411000 audit: BPF prog-id=81 op=UNLOAD Sep 13 01:37:45.504000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.504000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.504000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.504000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.504000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.504000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.504000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.504000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.504000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.504000 audit: BPF prog-id=82 op=LOAD Sep 13 01:37:45.504000 audit[2703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffcdad2b78 a2=40 a3=ffffcdad2ba8 items=0 ppid=2609 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.504000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:37:45.505000 audit: BPF prog-id=82 op=UNLOAD Sep 13 01:37:45.505000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.505000 audit[2703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffcdad2c90 a2=50 a3=0 items=0 ppid=2609 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.505000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:37:45.513000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.513000 audit[2703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcdad2be8 a2=28 a3=ffffcdad2d18 items=0 ppid=2609 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.513000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:37:45.514000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.514000 audit[2703]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcdad2c18 a2=28 a3=ffffcdad2d48 items=0 ppid=2609 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.514000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:37:45.514000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.514000 audit[2703]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcdad2ac8 a2=28 a3=ffffcdad2bf8 items=0 ppid=2609 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.514000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:37:45.514000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.514000 audit[2703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcdad2c38 a2=28 a3=ffffcdad2d68 items=0 ppid=2609 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.514000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:37:45.514000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.514000 audit[2703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcdad2c18 a2=28 a3=ffffcdad2d48 items=0 ppid=2609 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.514000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:37:45.514000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.514000 audit[2703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcdad2c08 a2=28 a3=ffffcdad2d38 items=0 ppid=2609 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.514000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:37:45.514000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.514000 audit[2703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcdad2c38 a2=28 a3=ffffcdad2d68 items=0 ppid=2609 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.514000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:37:45.515000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.515000 audit[2703]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcdad2c18 a2=28 a3=ffffcdad2d48 items=0 ppid=2609 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.515000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:37:45.515000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.515000 audit[2703]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcdad2c38 a2=28 a3=ffffcdad2d68 items=0 ppid=2609 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.515000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:37:45.515000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.515000 audit[2703]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcdad2c08 a2=28 a3=ffffcdad2d38 items=0 ppid=2609 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.515000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:37:45.515000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.515000 audit[2703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcdad2c88 a2=28 a3=ffffcdad2dc8 items=0 ppid=2609 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.515000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:37:45.515000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.515000 audit[2703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffcdad29c0 a2=50 a3=0 items=0 ppid=2609 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.515000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:37:45.515000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.515000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.515000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.515000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.515000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.515000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.515000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.515000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.515000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.515000 audit: BPF prog-id=83 op=LOAD Sep 13 01:37:45.515000 audit[2703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffcdad29c8 a2=94 a3=5 items=0 ppid=2609 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.515000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:37:45.516000 audit: BPF prog-id=83 op=UNLOAD Sep 13 01:37:45.516000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.516000 audit[2703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffcdad2ad0 a2=50 a3=0 items=0 ppid=2609 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.516000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:37:45.516000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.516000 audit[2703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffcdad2c18 a2=4 a3=3 items=0 ppid=2609 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.516000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:37:45.516000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.516000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.516000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.516000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.516000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.516000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.516000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.516000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.516000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.516000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.516000 audit[2703]: AVC avc: denied { confidentiality } for pid=2703 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:37:45.516000 audit[2703]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffcdad2bf8 a2=94 a3=6 items=0 ppid=2609 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.516000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:37:45.517000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.517000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.517000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.517000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.517000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.517000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.517000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.517000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.517000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.517000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.517000 audit[2703]: AVC avc: denied { confidentiality } for pid=2703 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:37:45.517000 audit[2703]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffcdad23c8 a2=94 a3=83 items=0 ppid=2609 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.517000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:37:45.518000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.518000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.518000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.518000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.518000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.518000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.518000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.518000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.518000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.518000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.518000 audit[2703]: AVC avc: denied { confidentiality } for pid=2703 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:37:45.518000 audit[2703]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffcdad23c8 a2=94 a3=83 items=0 ppid=2609 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.518000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:37:45.526000 audit[2708]: AVC avc: denied { bpf } for pid=2708 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.526000 audit[2708]: AVC avc: denied { bpf } for pid=2708 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.526000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.526000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.526000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.526000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.526000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.526000 audit[2708]: AVC avc: denied { bpf } for pid=2708 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.526000 audit[2708]: AVC avc: denied { bpf } for pid=2708 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.526000 audit: BPF prog-id=84 op=LOAD Sep 13 01:37:45.526000 audit[2708]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc4dba008 a2=98 a3=ffffc4db9ff8 items=0 ppid=2609 pid=2708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.526000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 13 01:37:45.526000 audit: BPF prog-id=84 op=UNLOAD Sep 13 01:37:45.526000 audit[2708]: AVC avc: denied { bpf } for pid=2708 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.526000 audit[2708]: AVC avc: denied { bpf } for pid=2708 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.526000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.526000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.526000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.526000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.526000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.526000 audit[2708]: AVC avc: denied { bpf } for pid=2708 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.526000 audit[2708]: AVC avc: denied { bpf } for pid=2708 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.526000 audit: BPF prog-id=85 op=LOAD Sep 13 01:37:45.526000 audit[2708]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc4db9eb8 a2=74 a3=95 items=0 ppid=2609 pid=2708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.526000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 13 01:37:45.526000 audit: BPF prog-id=85 op=UNLOAD Sep 13 01:37:45.526000 audit[2708]: AVC avc: denied { bpf } for pid=2708 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.526000 audit[2708]: AVC avc: denied { bpf } for pid=2708 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.526000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.526000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.526000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.526000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.526000 audit[2708]: AVC avc: denied { perfmon } for pid=2708 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.526000 audit[2708]: AVC avc: denied { bpf } for pid=2708 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.526000 audit[2708]: AVC avc: denied { bpf } for pid=2708 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.526000 audit: BPF prog-id=86 op=LOAD Sep 13 01:37:45.526000 audit[2708]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc4db9ee8 a2=40 a3=ffffc4db9f18 items=0 ppid=2609 pid=2708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.526000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 13 01:37:45.527000 audit: BPF prog-id=86 op=UNLOAD Sep 13 01:37:45.753000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.753000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.753000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.753000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.753000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.753000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.753000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.753000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.753000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.753000 audit: BPF prog-id=87 op=LOAD Sep 13 01:37:45.753000 audit[2737]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffd6938e8 a2=98 a3=fffffd6938d8 items=0 ppid=2609 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.753000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:37:45.753000 audit: BPF prog-id=87 op=UNLOAD Sep 13 01:37:45.753000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.753000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.753000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.753000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.753000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.753000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.753000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.753000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.753000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.753000 audit: BPF prog-id=88 op=LOAD Sep 13 01:37:45.753000 audit[2737]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffd6935c8 a2=74 a3=95 items=0 ppid=2609 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.753000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:37:45.753000 audit: BPF prog-id=88 op=UNLOAD Sep 13 01:37:45.753000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.753000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.753000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.753000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.753000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.753000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.753000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.753000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.753000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.753000 audit: BPF prog-id=89 op=LOAD Sep 13 01:37:45.753000 audit[2737]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffd693628 a2=94 a3=2 items=0 ppid=2609 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.753000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:37:45.753000 audit: BPF prog-id=89 op=UNLOAD Sep 13 01:37:45.753000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.753000 audit[2737]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffffd693658 a2=28 a3=fffffd693788 items=0 ppid=2609 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.753000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:37:45.753000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.753000 audit[2737]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffd693688 a2=28 a3=fffffd6937b8 items=0 ppid=2609 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.753000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:37:45.753000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.753000 audit[2737]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffd693538 a2=28 a3=fffffd693668 items=0 ppid=2609 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.753000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:37:45.753000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.753000 audit[2737]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffffd6936a8 a2=28 a3=fffffd6937d8 items=0 ppid=2609 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.753000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:37:45.753000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.753000 audit[2737]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffffd693688 a2=28 a3=fffffd6937b8 items=0 ppid=2609 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.753000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:37:45.753000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.753000 audit[2737]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffffd693678 a2=28 a3=fffffd6937a8 items=0 ppid=2609 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.753000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:37:45.753000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.753000 audit[2737]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffffd6936a8 a2=28 a3=fffffd6937d8 items=0 ppid=2609 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.753000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:37:45.753000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.753000 audit[2737]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffd693688 a2=28 a3=fffffd6937b8 items=0 ppid=2609 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.753000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:37:45.753000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.753000 audit[2737]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffd6936a8 a2=28 a3=fffffd6937d8 items=0 ppid=2609 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.753000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:37:45.753000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.753000 audit[2737]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffd693678 a2=28 a3=fffffd6937a8 items=0 ppid=2609 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.753000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:37:45.753000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.753000 audit[2737]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffffd6936f8 a2=28 a3=fffffd693838 items=0 ppid=2609 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.753000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:37:45.753000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.753000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.753000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.753000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.753000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.753000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.753000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.753000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.753000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.753000 audit: BPF prog-id=90 op=LOAD Sep 13 01:37:45.753000 audit[2737]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffffd693518 a2=40 a3=fffffd693548 items=0 ppid=2609 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.753000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:37:45.754000 audit: BPF prog-id=90 op=UNLOAD Sep 13 01:37:45.754000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.754000 audit[2737]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=fffffd693540 a2=50 a3=0 items=0 ppid=2609 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.754000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:37:45.754000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.754000 audit[2737]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=fffffd693540 a2=50 a3=0 items=0 ppid=2609 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.754000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:37:45.754000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.754000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.754000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.754000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.754000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.754000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.754000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.754000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.754000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.754000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.754000 audit: BPF prog-id=91 op=LOAD Sep 13 01:37:45.754000 audit[2737]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffffd692ca8 a2=94 a3=2 items=0 ppid=2609 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.754000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:37:45.754000 audit: BPF prog-id=91 op=UNLOAD Sep 13 01:37:45.754000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.754000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.754000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.754000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.754000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.754000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.754000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.754000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.754000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.754000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.754000 audit: BPF prog-id=92 op=LOAD Sep 13 01:37:45.754000 audit[2737]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffffd692e38 a2=94 a3=30 items=0 ppid=2609 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.754000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:37:45.759000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.759000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.759000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.759000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.759000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.759000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.759000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.759000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.759000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.759000 audit: BPF prog-id=93 op=LOAD Sep 13 01:37:45.759000 audit[2739]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff79f1508 a2=98 a3=fffff79f14f8 items=0 ppid=2609 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.759000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:37:45.759000 audit: BPF prog-id=93 op=UNLOAD Sep 13 01:37:45.760000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.760000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.760000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.760000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.760000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.760000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.760000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.760000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.760000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.760000 audit: BPF prog-id=94 op=LOAD Sep 13 01:37:45.760000 audit[2739]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff79f1198 a2=74 a3=95 items=0 ppid=2609 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.760000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:37:45.760000 audit: BPF prog-id=94 op=UNLOAD Sep 13 01:37:45.760000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.760000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.760000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.760000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.760000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.760000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.760000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.760000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.760000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.760000 audit: BPF prog-id=95 op=LOAD Sep 13 01:37:45.760000 audit[2739]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff79f11f8 a2=94 a3=2 items=0 ppid=2609 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.760000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:37:45.760000 audit: BPF prog-id=95 op=UNLOAD Sep 13 01:37:45.818166 systemd-networkd[1645]: vxlan.calico: Link UP Sep 13 01:37:45.818177 systemd-networkd[1645]: vxlan.calico: Gained carrier Sep 13 01:37:45.867000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.867000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.867000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.867000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.867000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.867000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.867000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.867000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.867000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.867000 audit: BPF prog-id=96 op=LOAD Sep 13 01:37:45.867000 audit[2739]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff79f11b8 a2=40 a3=fffff79f11e8 items=0 ppid=2609 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.867000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:37:45.867000 audit: BPF prog-id=96 op=UNLOAD Sep 13 01:37:45.867000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.867000 audit[2739]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=fffff79f12d0 a2=50 a3=0 items=0 ppid=2609 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.867000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:37:45.875000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.875000 audit[2739]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff79f1228 a2=28 a3=fffff79f1358 items=0 ppid=2609 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.875000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.876000 audit[2739]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff79f1258 a2=28 a3=fffff79f1388 items=0 ppid=2609 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.876000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.876000 audit[2739]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff79f1108 a2=28 a3=fffff79f1238 items=0 ppid=2609 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.876000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.876000 audit[2739]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff79f1278 a2=28 a3=fffff79f13a8 items=0 ppid=2609 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.876000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.876000 audit[2739]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff79f1258 a2=28 a3=fffff79f1388 items=0 ppid=2609 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.876000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.876000 audit[2739]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff79f1248 a2=28 a3=fffff79f1378 items=0 ppid=2609 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.876000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.876000 audit[2739]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff79f1278 a2=28 a3=fffff79f13a8 items=0 ppid=2609 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.876000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.876000 audit[2739]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff79f1258 a2=28 a3=fffff79f1388 items=0 ppid=2609 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.876000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.876000 audit[2739]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff79f1278 a2=28 a3=fffff79f13a8 items=0 ppid=2609 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.876000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.876000 audit[2739]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff79f1248 a2=28 a3=fffff79f1378 items=0 ppid=2609 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.876000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.876000 audit[2739]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff79f12c8 a2=28 a3=fffff79f1408 items=0 ppid=2609 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.876000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.876000 audit[2739]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffff79f1000 a2=50 a3=0 items=0 ppid=2609 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.876000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.876000 audit: BPF prog-id=97 op=LOAD Sep 13 01:37:45.876000 audit[2739]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffff79f1008 a2=94 a3=5 items=0 ppid=2609 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.876000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:37:45.876000 audit: BPF prog-id=97 op=UNLOAD Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.876000 audit[2739]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffff79f1110 a2=50 a3=0 items=0 ppid=2609 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.876000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.876000 audit[2739]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=fffff79f1258 a2=4 a3=3 items=0 ppid=2609 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.876000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { confidentiality } for pid=2739 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:37:45.876000 audit[2739]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff79f1238 a2=94 a3=6 items=0 ppid=2609 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.876000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { confidentiality } for pid=2739 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:37:45.876000 audit[2739]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff79f0a08 a2=94 a3=83 items=0 ppid=2609 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.876000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.876000 audit[2739]: AVC avc: denied { confidentiality } for pid=2739 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:37:45.876000 audit[2739]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff79f0a08 a2=94 a3=83 items=0 ppid=2609 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.876000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:37:45.877000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.877000 audit[2739]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff79f2448 a2=10 a3=fffff79f2538 items=0 ppid=2609 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.877000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:37:45.877000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.877000 audit[2739]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff79f2308 a2=10 a3=fffff79f23f8 items=0 ppid=2609 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.877000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:37:45.877000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.877000 audit[2739]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff79f2278 a2=10 a3=fffff79f23f8 items=0 ppid=2609 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.877000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:37:45.877000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:45.877000 audit[2739]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff79f2278 a2=10 a3=fffff79f23f8 items=0 ppid=2609 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:45.877000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:37:45.883000 audit: BPF prog-id=92 op=UNLOAD Sep 13 01:37:46.248000 audit[2767]: NETFILTER_CFG table=mangle:68 family=2 entries=16 op=nft_register_chain pid=2767 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 01:37:46.248000 audit[2767]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffc17ba040 a2=0 a3=ffff80e63fa8 items=0 ppid=2609 pid=2767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:46.248000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 01:37:46.300985 kubelet[1979]: E0913 01:37:46.300938 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:46.329000 audit[2770]: NETFILTER_CFG table=nat:69 family=2 entries=15 op=nft_register_chain pid=2770 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 01:37:46.329000 audit[2770]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffe914f320 a2=0 a3=ffffb4cb0fa8 items=0 ppid=2609 pid=2770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:46.329000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 01:37:46.329000 audit[2768]: NETFILTER_CFG table=filter:70 family=2 entries=39 op=nft_register_chain pid=2768 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 01:37:46.329000 audit[2768]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=ffffe9b00750 a2=0 a3=ffffa1608fa8 items=0 ppid=2609 pid=2768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:46.329000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 01:37:46.392000 audit[2766]: NETFILTER_CFG table=raw:71 family=2 entries=21 op=nft_register_chain pid=2766 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 01:37:46.392000 audit[2766]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=ffffc0315cf0 a2=0 a3=ffffbb90bfa8 items=0 ppid=2609 pid=2766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:46.392000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 01:37:46.935468 systemd-networkd[1645]: vxlan.calico: Gained IPv6LL Sep 13 01:37:47.302021 kubelet[1979]: E0913 01:37:47.301923 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:48.302175 kubelet[1979]: E0913 01:37:48.302137 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:49.303088 kubelet[1979]: E0913 01:37:49.303050 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:50.303928 kubelet[1979]: E0913 01:37:50.303883 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:51.305428 kubelet[1979]: E0913 01:37:51.305377 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:51.460086 env[1478]: time="2025-09-13T01:37:51.460037535Z" level=info msg="StopPodSandbox for \"6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9\"" Sep 13 01:37:51.553728 env[1478]: 2025-09-13 01:37:51.514 [INFO][2796] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9" Sep 13 01:37:51.553728 env[1478]: 2025-09-13 01:37:51.514 [INFO][2796] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9" iface="eth0" netns="/var/run/netns/cni-d2cba5c2-b01d-8650-cea2-987c83f60093" Sep 13 01:37:51.553728 env[1478]: 2025-09-13 01:37:51.514 [INFO][2796] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9" iface="eth0" netns="/var/run/netns/cni-d2cba5c2-b01d-8650-cea2-987c83f60093" Sep 13 01:37:51.553728 env[1478]: 2025-09-13 01:37:51.514 [INFO][2796] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9" iface="eth0" netns="/var/run/netns/cni-d2cba5c2-b01d-8650-cea2-987c83f60093" Sep 13 01:37:51.553728 env[1478]: 2025-09-13 01:37:51.514 [INFO][2796] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9" Sep 13 01:37:51.553728 env[1478]: 2025-09-13 01:37:51.514 [INFO][2796] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9" Sep 13 01:37:51.553728 env[1478]: 2025-09-13 01:37:51.533 [INFO][2804] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9" HandleID="k8s-pod-network.6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9" Workload="10.200.20.13-k8s-csi--node--driver--9xghd-eth0" Sep 13 01:37:51.553728 env[1478]: 2025-09-13 01:37:51.533 [INFO][2804] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 01:37:51.553728 env[1478]: 2025-09-13 01:37:51.533 [INFO][2804] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 01:37:51.553728 env[1478]: 2025-09-13 01:37:51.543 [WARNING][2804] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9" HandleID="k8s-pod-network.6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9" Workload="10.200.20.13-k8s-csi--node--driver--9xghd-eth0" Sep 13 01:37:51.553728 env[1478]: 2025-09-13 01:37:51.543 [INFO][2804] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9" HandleID="k8s-pod-network.6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9" Workload="10.200.20.13-k8s-csi--node--driver--9xghd-eth0" Sep 13 01:37:51.553728 env[1478]: 2025-09-13 01:37:51.550 [INFO][2804] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 01:37:51.553728 env[1478]: 2025-09-13 01:37:51.552 [INFO][2796] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9" Sep 13 01:37:51.555379 systemd[1]: run-netns-cni\x2dd2cba5c2\x2db01d\x2d8650\x2dcea2\x2d987c83f60093.mount: Deactivated successfully. Sep 13 01:37:51.557270 env[1478]: time="2025-09-13T01:37:51.557223849Z" level=info msg="TearDown network for sandbox \"6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9\" successfully" Sep 13 01:37:51.557371 env[1478]: time="2025-09-13T01:37:51.557354130Z" level=info msg="StopPodSandbox for \"6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9\" returns successfully" Sep 13 01:37:51.558159 env[1478]: time="2025-09-13T01:37:51.558121452Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9xghd,Uid:0f333ef7-95f8-4a9d-8f0e-3b7b944508da,Namespace:calico-system,Attempt:1,}" Sep 13 01:37:51.702622 systemd-networkd[1645]: cali5adeb78240f: Link UP Sep 13 01:37:51.709414 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 01:37:51.709538 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5adeb78240f: link becomes ready Sep 13 01:37:51.717158 systemd-networkd[1645]: cali5adeb78240f: Gained carrier Sep 13 01:37:51.734655 env[1478]: 2025-09-13 01:37:51.639 [INFO][2812] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.13-k8s-csi--node--driver--9xghd-eth0 csi-node-driver- calico-system 0f333ef7-95f8-4a9d-8f0e-3b7b944508da 1743 0 2025-09-13 01:37:18 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:6c96d95cc7 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.200.20.13 csi-node-driver-9xghd eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali5adeb78240f [] [] }} ContainerID="75742efeef4ada9471487ae43a2ee1c1a7388ac5461b3ed23babce748315733a" Namespace="calico-system" Pod="csi-node-driver-9xghd" WorkloadEndpoint="10.200.20.13-k8s-csi--node--driver--9xghd-" Sep 13 01:37:51.734655 env[1478]: 2025-09-13 01:37:51.639 [INFO][2812] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="75742efeef4ada9471487ae43a2ee1c1a7388ac5461b3ed23babce748315733a" Namespace="calico-system" Pod="csi-node-driver-9xghd" WorkloadEndpoint="10.200.20.13-k8s-csi--node--driver--9xghd-eth0" Sep 13 01:37:51.734655 env[1478]: 2025-09-13 01:37:51.662 [INFO][2825] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="75742efeef4ada9471487ae43a2ee1c1a7388ac5461b3ed23babce748315733a" HandleID="k8s-pod-network.75742efeef4ada9471487ae43a2ee1c1a7388ac5461b3ed23babce748315733a" Workload="10.200.20.13-k8s-csi--node--driver--9xghd-eth0" Sep 13 01:37:51.734655 env[1478]: 2025-09-13 01:37:51.663 [INFO][2825] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="75742efeef4ada9471487ae43a2ee1c1a7388ac5461b3ed23babce748315733a" HandleID="k8s-pod-network.75742efeef4ada9471487ae43a2ee1c1a7388ac5461b3ed23babce748315733a" Workload="10.200.20.13-k8s-csi--node--driver--9xghd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d3920), Attrs:map[string]string{"namespace":"calico-system", "node":"10.200.20.13", "pod":"csi-node-driver-9xghd", "timestamp":"2025-09-13 01:37:51.662880187 +0000 UTC"}, Hostname:"10.200.20.13", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 01:37:51.734655 env[1478]: 2025-09-13 01:37:51.663 [INFO][2825] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 01:37:51.734655 env[1478]: 2025-09-13 01:37:51.663 [INFO][2825] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 01:37:51.734655 env[1478]: 2025-09-13 01:37:51.663 [INFO][2825] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.13' Sep 13 01:37:51.734655 env[1478]: 2025-09-13 01:37:51.673 [INFO][2825] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.75742efeef4ada9471487ae43a2ee1c1a7388ac5461b3ed23babce748315733a" host="10.200.20.13" Sep 13 01:37:51.734655 env[1478]: 2025-09-13 01:37:51.677 [INFO][2825] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.20.13" Sep 13 01:37:51.734655 env[1478]: 2025-09-13 01:37:51.680 [INFO][2825] ipam/ipam.go 511: Trying affinity for 192.168.98.64/26 host="10.200.20.13" Sep 13 01:37:51.734655 env[1478]: 2025-09-13 01:37:51.682 [INFO][2825] ipam/ipam.go 158: Attempting to load block cidr=192.168.98.64/26 host="10.200.20.13" Sep 13 01:37:51.734655 env[1478]: 2025-09-13 01:37:51.683 [INFO][2825] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.98.64/26 host="10.200.20.13" Sep 13 01:37:51.734655 env[1478]: 2025-09-13 01:37:51.683 [INFO][2825] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.98.64/26 handle="k8s-pod-network.75742efeef4ada9471487ae43a2ee1c1a7388ac5461b3ed23babce748315733a" host="10.200.20.13" Sep 13 01:37:51.734655 env[1478]: 2025-09-13 01:37:51.685 [INFO][2825] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.75742efeef4ada9471487ae43a2ee1c1a7388ac5461b3ed23babce748315733a Sep 13 01:37:51.734655 env[1478]: 2025-09-13 01:37:51.692 [INFO][2825] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.98.64/26 handle="k8s-pod-network.75742efeef4ada9471487ae43a2ee1c1a7388ac5461b3ed23babce748315733a" host="10.200.20.13" Sep 13 01:37:51.734655 env[1478]: 2025-09-13 01:37:51.698 [INFO][2825] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.98.65/26] block=192.168.98.64/26 handle="k8s-pod-network.75742efeef4ada9471487ae43a2ee1c1a7388ac5461b3ed23babce748315733a" host="10.200.20.13" Sep 13 01:37:51.734655 env[1478]: 2025-09-13 01:37:51.698 [INFO][2825] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.98.65/26] handle="k8s-pod-network.75742efeef4ada9471487ae43a2ee1c1a7388ac5461b3ed23babce748315733a" host="10.200.20.13" Sep 13 01:37:51.734655 env[1478]: 2025-09-13 01:37:51.698 [INFO][2825] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 01:37:51.734655 env[1478]: 2025-09-13 01:37:51.698 [INFO][2825] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.98.65/26] IPv6=[] ContainerID="75742efeef4ada9471487ae43a2ee1c1a7388ac5461b3ed23babce748315733a" HandleID="k8s-pod-network.75742efeef4ada9471487ae43a2ee1c1a7388ac5461b3ed23babce748315733a" Workload="10.200.20.13-k8s-csi--node--driver--9xghd-eth0" Sep 13 01:37:51.735298 env[1478]: 2025-09-13 01:37:51.700 [INFO][2812] cni-plugin/k8s.go 418: Populated endpoint ContainerID="75742efeef4ada9471487ae43a2ee1c1a7388ac5461b3ed23babce748315733a" Namespace="calico-system" Pod="csi-node-driver-9xghd" WorkloadEndpoint="10.200.20.13-k8s-csi--node--driver--9xghd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.13-k8s-csi--node--driver--9xghd-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"0f333ef7-95f8-4a9d-8f0e-3b7b944508da", ResourceVersion:"1743", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 1, 37, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.13", ContainerID:"", Pod:"csi-node-driver-9xghd", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.98.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali5adeb78240f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 01:37:51.735298 env[1478]: 2025-09-13 01:37:51.700 [INFO][2812] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.98.65/32] ContainerID="75742efeef4ada9471487ae43a2ee1c1a7388ac5461b3ed23babce748315733a" Namespace="calico-system" Pod="csi-node-driver-9xghd" WorkloadEndpoint="10.200.20.13-k8s-csi--node--driver--9xghd-eth0" Sep 13 01:37:51.735298 env[1478]: 2025-09-13 01:37:51.700 [INFO][2812] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5adeb78240f ContainerID="75742efeef4ada9471487ae43a2ee1c1a7388ac5461b3ed23babce748315733a" Namespace="calico-system" Pod="csi-node-driver-9xghd" WorkloadEndpoint="10.200.20.13-k8s-csi--node--driver--9xghd-eth0" Sep 13 01:37:51.735298 env[1478]: 2025-09-13 01:37:51.718 [INFO][2812] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="75742efeef4ada9471487ae43a2ee1c1a7388ac5461b3ed23babce748315733a" Namespace="calico-system" Pod="csi-node-driver-9xghd" WorkloadEndpoint="10.200.20.13-k8s-csi--node--driver--9xghd-eth0" Sep 13 01:37:51.735298 env[1478]: 2025-09-13 01:37:51.719 [INFO][2812] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="75742efeef4ada9471487ae43a2ee1c1a7388ac5461b3ed23babce748315733a" Namespace="calico-system" Pod="csi-node-driver-9xghd" WorkloadEndpoint="10.200.20.13-k8s-csi--node--driver--9xghd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.13-k8s-csi--node--driver--9xghd-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"0f333ef7-95f8-4a9d-8f0e-3b7b944508da", ResourceVersion:"1743", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 1, 37, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.13", ContainerID:"75742efeef4ada9471487ae43a2ee1c1a7388ac5461b3ed23babce748315733a", Pod:"csi-node-driver-9xghd", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.98.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali5adeb78240f", MAC:"b2:0a:53:c3:1e:77", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 01:37:51.735298 env[1478]: 2025-09-13 01:37:51.733 [INFO][2812] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="75742efeef4ada9471487ae43a2ee1c1a7388ac5461b3ed23babce748315733a" Namespace="calico-system" Pod="csi-node-driver-9xghd" WorkloadEndpoint="10.200.20.13-k8s-csi--node--driver--9xghd-eth0" Sep 13 01:37:51.750727 env[1478]: time="2025-09-13T01:37:51.750639274Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 01:37:51.750727 env[1478]: time="2025-09-13T01:37:51.750687994Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 01:37:51.750727 env[1478]: time="2025-09-13T01:37:51.750698394Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 01:37:51.751082 env[1478]: time="2025-09-13T01:37:51.751040715Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/75742efeef4ada9471487ae43a2ee1c1a7388ac5461b3ed23babce748315733a pid=2851 runtime=io.containerd.runc.v2 Sep 13 01:37:51.770607 systemd[1]: Started cri-containerd-75742efeef4ada9471487ae43a2ee1c1a7388ac5461b3ed23babce748315733a.scope. Sep 13 01:37:51.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.792246 kernel: kauditd_printk_skb: 590 callbacks suppressed Sep 13 01:37:51.792442 kernel: audit: type=1400 audit(1757727471.785:646): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.826173 kernel: audit: type=1400 audit(1757727471.785:647): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.826270 kernel: audit: type=1400 audit(1757727471.785:648): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.859745 kernel: audit: type=1400 audit(1757727471.785:649): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.877691 kernel: audit: type=1400 audit(1757727471.785:650): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.897631 kernel: audit: type=1400 audit(1757727471.785:651): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.914796 kernel: audit: type=1400 audit(1757727471.785:652): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.916496 env[1478]: time="2025-09-13T01:37:51.916217621Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9xghd,Uid:0f333ef7-95f8-4a9d-8f0e-3b7b944508da,Namespace:calico-system,Attempt:1,} returns sandbox id \"75742efeef4ada9471487ae43a2ee1c1a7388ac5461b3ed23babce748315733a\"" Sep 13 01:37:51.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.918310 env[1478]: time="2025-09-13T01:37:51.918277227Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\"" Sep 13 01:37:51.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.951067 kernel: audit: type=1400 audit(1757727471.785:653): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.951209 kernel: audit: type=1400 audit(1757727471.785:654): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.951238 kernel: audit: type=1400 audit(1757727471.785:655): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.785000 audit: BPF prog-id=98 op=LOAD Sep 13 01:37:51.788000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.788000 audit[2861]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2851 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:51.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735373432656665656634616461393437313438376165343361326565 Sep 13 01:37:51.788000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.788000 audit[2861]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2851 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:51.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735373432656665656634616461393437313438376165343361326565 Sep 13 01:37:51.788000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.788000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.788000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.788000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.788000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.788000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.788000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.788000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.788000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.788000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.788000 audit: BPF prog-id=99 op=LOAD Sep 13 01:37:51.788000 audit[2861]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2851 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:51.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735373432656665656634616461393437313438376165343361326565 Sep 13 01:37:51.791000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.791000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.791000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.791000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.791000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.791000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.791000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.791000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.791000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.791000 audit: BPF prog-id=100 op=LOAD Sep 13 01:37:51.791000 audit[2861]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2851 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:51.791000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735373432656665656634616461393437313438376165343361326565 Sep 13 01:37:51.806000 audit: BPF prog-id=100 op=UNLOAD Sep 13 01:37:51.806000 audit: BPF prog-id=99 op=UNLOAD Sep 13 01:37:51.807000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.807000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.807000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.807000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.807000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.807000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.807000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.807000 audit[2861]: AVC avc: denied { perfmon } for pid=2861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.807000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.807000 audit[2861]: AVC avc: denied { bpf } for pid=2861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:51.807000 audit: BPF prog-id=101 op=LOAD Sep 13 01:37:51.807000 audit[2861]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2851 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:51.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735373432656665656634616461393437313438376165343361326565 Sep 13 01:37:51.779000 audit[2841]: NETFILTER_CFG table=filter:72 family=2 entries=38 op=nft_register_chain pid=2841 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 01:37:51.779000 audit[2841]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21364 a0=3 a1=ffffce1f7f30 a2=0 a3=ffffb6c0dfa8 items=0 ppid=2609 pid=2841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:51.779000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 01:37:52.306720 kubelet[1979]: E0913 01:37:52.306644 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:52.555561 systemd[1]: run-containerd-runc-k8s.io-75742efeef4ada9471487ae43a2ee1c1a7388ac5461b3ed23babce748315733a-runc.fRmvHl.mount: Deactivated successfully. Sep 13 01:37:53.118025 env[1478]: time="2025-09-13T01:37:53.117971856Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:53.124502 env[1478]: time="2025-09-13T01:37:53.124455994Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5e2b30128ce4b607acd97d3edef62ce1a90be0259903090a51c360adbe4a8f3b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:53.129885 env[1478]: time="2025-09-13T01:37:53.129850529Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:53.134407 env[1478]: time="2025-09-13T01:37:53.134367421Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:f22c88018d8b58c4ef0052f594b216a13bd6852166ac131a538c5ab2fba23bb2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:53.134816 env[1478]: time="2025-09-13T01:37:53.134788422Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\" returns image reference \"sha256:5e2b30128ce4b607acd97d3edef62ce1a90be0259903090a51c360adbe4a8f3b\"" Sep 13 01:37:53.137329 env[1478]: time="2025-09-13T01:37:53.137289109Z" level=info msg="CreateContainer within sandbox \"75742efeef4ada9471487ae43a2ee1c1a7388ac5461b3ed23babce748315733a\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Sep 13 01:37:53.163081 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2839267586.mount: Deactivated successfully. Sep 13 01:37:53.179780 env[1478]: time="2025-09-13T01:37:53.179724823Z" level=info msg="CreateContainer within sandbox \"75742efeef4ada9471487ae43a2ee1c1a7388ac5461b3ed23babce748315733a\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"af17c7180db1d3ddff6a00ef928a449604e41b88b83e33542895124aa979b3c8\"" Sep 13 01:37:53.180602 env[1478]: time="2025-09-13T01:37:53.180577866Z" level=info msg="StartContainer for \"af17c7180db1d3ddff6a00ef928a449604e41b88b83e33542895124aa979b3c8\"" Sep 13 01:37:53.203624 systemd[1]: Started cri-containerd-af17c7180db1d3ddff6a00ef928a449604e41b88b83e33542895124aa979b3c8.scope. Sep 13 01:37:53.217000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.217000 audit[2898]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2851 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:53.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166313763373138306462316433646466663661303065663932386134 Sep 13 01:37:53.217000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.217000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.217000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.217000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.217000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.217000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.217000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.217000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.217000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.217000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.217000 audit: BPF prog-id=102 op=LOAD Sep 13 01:37:53.217000 audit[2898]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2851 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:53.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166313763373138306462316433646466663661303065663932386134 Sep 13 01:37:53.217000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.217000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.217000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.217000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.217000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.217000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.217000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.217000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.217000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.217000 audit: BPF prog-id=103 op=LOAD Sep 13 01:37:53.217000 audit[2898]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2851 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:53.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166313763373138306462316433646466663661303065663932386134 Sep 13 01:37:53.217000 audit: BPF prog-id=103 op=UNLOAD Sep 13 01:37:53.217000 audit: BPF prog-id=102 op=UNLOAD Sep 13 01:37:53.217000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.217000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.217000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.217000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.217000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.217000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.217000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.217000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.217000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.217000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.217000 audit: BPF prog-id=104 op=LOAD Sep 13 01:37:53.217000 audit[2898]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2851 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:53.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166313763373138306462316433646466663661303065663932386134 Sep 13 01:37:53.237031 env[1478]: time="2025-09-13T01:37:53.236975498Z" level=info msg="StartContainer for \"af17c7180db1d3ddff6a00ef928a449604e41b88b83e33542895124aa979b3c8\" returns successfully" Sep 13 01:37:53.238169 env[1478]: time="2025-09-13T01:37:53.238136061Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\"" Sep 13 01:37:53.307050 kubelet[1979]: E0913 01:37:53.306976 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:53.459563 env[1478]: time="2025-09-13T01:37:53.459530180Z" level=info msg="StopPodSandbox for \"fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175\"" Sep 13 01:37:53.553506 env[1478]: 2025-09-13 01:37:53.515 [INFO][2934] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175" Sep 13 01:37:53.553506 env[1478]: 2025-09-13 01:37:53.515 [INFO][2934] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175" iface="eth0" netns="/var/run/netns/cni-149cdb1e-3f23-e975-3469-452b6f4796f5" Sep 13 01:37:53.553506 env[1478]: 2025-09-13 01:37:53.515 [INFO][2934] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175" iface="eth0" netns="/var/run/netns/cni-149cdb1e-3f23-e975-3469-452b6f4796f5" Sep 13 01:37:53.553506 env[1478]: 2025-09-13 01:37:53.515 [INFO][2934] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175" iface="eth0" netns="/var/run/netns/cni-149cdb1e-3f23-e975-3469-452b6f4796f5" Sep 13 01:37:53.553506 env[1478]: 2025-09-13 01:37:53.515 [INFO][2934] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175" Sep 13 01:37:53.553506 env[1478]: 2025-09-13 01:37:53.515 [INFO][2934] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175" Sep 13 01:37:53.553506 env[1478]: 2025-09-13 01:37:53.536 [INFO][2941] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175" HandleID="k8s-pod-network.fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175" Workload="10.200.20.13-k8s-nginx--deployment--7fcdb87857--5tmnx-eth0" Sep 13 01:37:53.553506 env[1478]: 2025-09-13 01:37:53.536 [INFO][2941] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 01:37:53.553506 env[1478]: 2025-09-13 01:37:53.536 [INFO][2941] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 01:37:53.553506 env[1478]: 2025-09-13 01:37:53.548 [WARNING][2941] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175" HandleID="k8s-pod-network.fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175" Workload="10.200.20.13-k8s-nginx--deployment--7fcdb87857--5tmnx-eth0" Sep 13 01:37:53.553506 env[1478]: 2025-09-13 01:37:53.548 [INFO][2941] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175" HandleID="k8s-pod-network.fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175" Workload="10.200.20.13-k8s-nginx--deployment--7fcdb87857--5tmnx-eth0" Sep 13 01:37:53.553506 env[1478]: 2025-09-13 01:37:53.551 [INFO][2941] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 01:37:53.553506 env[1478]: 2025-09-13 01:37:53.552 [INFO][2934] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175" Sep 13 01:37:53.557191 env[1478]: time="2025-09-13T01:37:53.553653834Z" level=info msg="TearDown network for sandbox \"fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175\" successfully" Sep 13 01:37:53.557191 env[1478]: time="2025-09-13T01:37:53.553685634Z" level=info msg="StopPodSandbox for \"fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175\" returns successfully" Sep 13 01:37:53.555595 systemd[1]: run-containerd-runc-k8s.io-af17c7180db1d3ddff6a00ef928a449604e41b88b83e33542895124aa979b3c8-runc.rAhIjq.mount: Deactivated successfully. Sep 13 01:37:53.555677 systemd[1]: run-netns-cni\x2d149cdb1e\x2d3f23\x2de975\x2d3469\x2d452b6f4796f5.mount: Deactivated successfully. Sep 13 01:37:53.558414 env[1478]: time="2025-09-13T01:37:53.558378567Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-5tmnx,Uid:ac1461c5-c97e-45ca-a77d-336ba3ca9941,Namespace:default,Attempt:1,}" Sep 13 01:37:53.655504 systemd-networkd[1645]: cali5adeb78240f: Gained IPv6LL Sep 13 01:37:53.712801 systemd-networkd[1645]: calic1730cf33e5: Link UP Sep 13 01:37:53.726428 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 01:37:53.726526 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic1730cf33e5: link becomes ready Sep 13 01:37:53.733315 systemd-networkd[1645]: calic1730cf33e5: Gained carrier Sep 13 01:37:53.747610 env[1478]: 2025-09-13 01:37:53.634 [INFO][2948] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.13-k8s-nginx--deployment--7fcdb87857--5tmnx-eth0 nginx-deployment-7fcdb87857- default ac1461c5-c97e-45ca-a77d-336ba3ca9941 1756 0 2025-09-13 01:37:38 +0000 UTC map[app:nginx pod-template-hash:7fcdb87857 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.13 nginx-deployment-7fcdb87857-5tmnx eth0 default [] [] [kns.default ksa.default.default] calic1730cf33e5 [] [] }} ContainerID="f2a1e733a1ade63659c28ff750a47a4ea98f78ca3f62dc147905efd4d31c039e" Namespace="default" Pod="nginx-deployment-7fcdb87857-5tmnx" WorkloadEndpoint="10.200.20.13-k8s-nginx--deployment--7fcdb87857--5tmnx-" Sep 13 01:37:53.747610 env[1478]: 2025-09-13 01:37:53.634 [INFO][2948] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="f2a1e733a1ade63659c28ff750a47a4ea98f78ca3f62dc147905efd4d31c039e" Namespace="default" Pod="nginx-deployment-7fcdb87857-5tmnx" WorkloadEndpoint="10.200.20.13-k8s-nginx--deployment--7fcdb87857--5tmnx-eth0" Sep 13 01:37:53.747610 env[1478]: 2025-09-13 01:37:53.659 [INFO][2961] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f2a1e733a1ade63659c28ff750a47a4ea98f78ca3f62dc147905efd4d31c039e" HandleID="k8s-pod-network.f2a1e733a1ade63659c28ff750a47a4ea98f78ca3f62dc147905efd4d31c039e" Workload="10.200.20.13-k8s-nginx--deployment--7fcdb87857--5tmnx-eth0" Sep 13 01:37:53.747610 env[1478]: 2025-09-13 01:37:53.659 [INFO][2961] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f2a1e733a1ade63659c28ff750a47a4ea98f78ca3f62dc147905efd4d31c039e" HandleID="k8s-pod-network.f2a1e733a1ade63659c28ff750a47a4ea98f78ca3f62dc147905efd4d31c039e" Workload="10.200.20.13-k8s-nginx--deployment--7fcdb87857--5tmnx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d2ff0), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.13", "pod":"nginx-deployment-7fcdb87857-5tmnx", "timestamp":"2025-09-13 01:37:53.65924736 +0000 UTC"}, Hostname:"10.200.20.13", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 01:37:53.747610 env[1478]: 2025-09-13 01:37:53.659 [INFO][2961] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 01:37:53.747610 env[1478]: 2025-09-13 01:37:53.659 [INFO][2961] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 01:37:53.747610 env[1478]: 2025-09-13 01:37:53.659 [INFO][2961] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.13' Sep 13 01:37:53.747610 env[1478]: 2025-09-13 01:37:53.668 [INFO][2961] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.f2a1e733a1ade63659c28ff750a47a4ea98f78ca3f62dc147905efd4d31c039e" host="10.200.20.13" Sep 13 01:37:53.747610 env[1478]: 2025-09-13 01:37:53.676 [INFO][2961] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.20.13" Sep 13 01:37:53.747610 env[1478]: 2025-09-13 01:37:53.687 [INFO][2961] ipam/ipam.go 511: Trying affinity for 192.168.98.64/26 host="10.200.20.13" Sep 13 01:37:53.747610 env[1478]: 2025-09-13 01:37:53.689 [INFO][2961] ipam/ipam.go 158: Attempting to load block cidr=192.168.98.64/26 host="10.200.20.13" Sep 13 01:37:53.747610 env[1478]: 2025-09-13 01:37:53.691 [INFO][2961] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.98.64/26 host="10.200.20.13" Sep 13 01:37:53.747610 env[1478]: 2025-09-13 01:37:53.691 [INFO][2961] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.98.64/26 handle="k8s-pod-network.f2a1e733a1ade63659c28ff750a47a4ea98f78ca3f62dc147905efd4d31c039e" host="10.200.20.13" Sep 13 01:37:53.747610 env[1478]: 2025-09-13 01:37:53.692 [INFO][2961] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.f2a1e733a1ade63659c28ff750a47a4ea98f78ca3f62dc147905efd4d31c039e Sep 13 01:37:53.747610 env[1478]: 2025-09-13 01:37:53.698 [INFO][2961] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.98.64/26 handle="k8s-pod-network.f2a1e733a1ade63659c28ff750a47a4ea98f78ca3f62dc147905efd4d31c039e" host="10.200.20.13" Sep 13 01:37:53.747610 env[1478]: 2025-09-13 01:37:53.707 [INFO][2961] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.98.66/26] block=192.168.98.64/26 handle="k8s-pod-network.f2a1e733a1ade63659c28ff750a47a4ea98f78ca3f62dc147905efd4d31c039e" host="10.200.20.13" Sep 13 01:37:53.747610 env[1478]: 2025-09-13 01:37:53.707 [INFO][2961] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.98.66/26] handle="k8s-pod-network.f2a1e733a1ade63659c28ff750a47a4ea98f78ca3f62dc147905efd4d31c039e" host="10.200.20.13" Sep 13 01:37:53.747610 env[1478]: 2025-09-13 01:37:53.707 [INFO][2961] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 01:37:53.747610 env[1478]: 2025-09-13 01:37:53.707 [INFO][2961] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.98.66/26] IPv6=[] ContainerID="f2a1e733a1ade63659c28ff750a47a4ea98f78ca3f62dc147905efd4d31c039e" HandleID="k8s-pod-network.f2a1e733a1ade63659c28ff750a47a4ea98f78ca3f62dc147905efd4d31c039e" Workload="10.200.20.13-k8s-nginx--deployment--7fcdb87857--5tmnx-eth0" Sep 13 01:37:53.748160 env[1478]: 2025-09-13 01:37:53.708 [INFO][2948] cni-plugin/k8s.go 418: Populated endpoint ContainerID="f2a1e733a1ade63659c28ff750a47a4ea98f78ca3f62dc147905efd4d31c039e" Namespace="default" Pod="nginx-deployment-7fcdb87857-5tmnx" WorkloadEndpoint="10.200.20.13-k8s-nginx--deployment--7fcdb87857--5tmnx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.13-k8s-nginx--deployment--7fcdb87857--5tmnx-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"ac1461c5-c97e-45ca-a77d-336ba3ca9941", ResourceVersion:"1756", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 1, 37, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.13", ContainerID:"", Pod:"nginx-deployment-7fcdb87857-5tmnx", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.98.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calic1730cf33e5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 01:37:53.748160 env[1478]: 2025-09-13 01:37:53.709 [INFO][2948] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.98.66/32] ContainerID="f2a1e733a1ade63659c28ff750a47a4ea98f78ca3f62dc147905efd4d31c039e" Namespace="default" Pod="nginx-deployment-7fcdb87857-5tmnx" WorkloadEndpoint="10.200.20.13-k8s-nginx--deployment--7fcdb87857--5tmnx-eth0" Sep 13 01:37:53.748160 env[1478]: 2025-09-13 01:37:53.709 [INFO][2948] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calic1730cf33e5 ContainerID="f2a1e733a1ade63659c28ff750a47a4ea98f78ca3f62dc147905efd4d31c039e" Namespace="default" Pod="nginx-deployment-7fcdb87857-5tmnx" WorkloadEndpoint="10.200.20.13-k8s-nginx--deployment--7fcdb87857--5tmnx-eth0" Sep 13 01:37:53.748160 env[1478]: 2025-09-13 01:37:53.737 [INFO][2948] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f2a1e733a1ade63659c28ff750a47a4ea98f78ca3f62dc147905efd4d31c039e" Namespace="default" Pod="nginx-deployment-7fcdb87857-5tmnx" WorkloadEndpoint="10.200.20.13-k8s-nginx--deployment--7fcdb87857--5tmnx-eth0" Sep 13 01:37:53.748160 env[1478]: 2025-09-13 01:37:53.737 [INFO][2948] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="f2a1e733a1ade63659c28ff750a47a4ea98f78ca3f62dc147905efd4d31c039e" Namespace="default" Pod="nginx-deployment-7fcdb87857-5tmnx" WorkloadEndpoint="10.200.20.13-k8s-nginx--deployment--7fcdb87857--5tmnx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.13-k8s-nginx--deployment--7fcdb87857--5tmnx-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"ac1461c5-c97e-45ca-a77d-336ba3ca9941", ResourceVersion:"1756", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 1, 37, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.13", ContainerID:"f2a1e733a1ade63659c28ff750a47a4ea98f78ca3f62dc147905efd4d31c039e", Pod:"nginx-deployment-7fcdb87857-5tmnx", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.98.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calic1730cf33e5", MAC:"46:15:e6:d2:ee:02", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 01:37:53.748160 env[1478]: 2025-09-13 01:37:53.744 [INFO][2948] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="f2a1e733a1ade63659c28ff750a47a4ea98f78ca3f62dc147905efd4d31c039e" Namespace="default" Pod="nginx-deployment-7fcdb87857-5tmnx" WorkloadEndpoint="10.200.20.13-k8s-nginx--deployment--7fcdb87857--5tmnx-eth0" Sep 13 01:37:53.754000 audit[2977]: NETFILTER_CFG table=filter:73 family=2 entries=42 op=nft_register_chain pid=2977 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 01:37:53.754000 audit[2977]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22512 a0=3 a1=ffffcd6c5ef0 a2=0 a3=ffff984b4fa8 items=0 ppid=2609 pid=2977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:53.754000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 01:37:53.760272 env[1478]: time="2025-09-13T01:37:53.760199873Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 01:37:53.760440 env[1478]: time="2025-09-13T01:37:53.760245033Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 01:37:53.760440 env[1478]: time="2025-09-13T01:37:53.760258193Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 01:37:53.760645 env[1478]: time="2025-09-13T01:37:53.760616314Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f2a1e733a1ade63659c28ff750a47a4ea98f78ca3f62dc147905efd4d31c039e pid=2986 runtime=io.containerd.runc.v2 Sep 13 01:37:53.774979 systemd[1]: Started cri-containerd-f2a1e733a1ade63659c28ff750a47a4ea98f78ca3f62dc147905efd4d31c039e.scope. Sep 13 01:37:53.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.789000 audit: BPF prog-id=105 op=LOAD Sep 13 01:37:53.790000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.790000 audit[2995]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2986 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:53.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632613165373333613161646536333635396332386666373530613437 Sep 13 01:37:53.790000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.790000 audit[2995]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2986 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:53.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632613165373333613161646536333635396332386666373530613437 Sep 13 01:37:53.790000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.790000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.790000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.790000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.790000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.790000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.790000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.790000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.790000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.790000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.790000 audit: BPF prog-id=106 op=LOAD Sep 13 01:37:53.790000 audit[2995]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2986 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:53.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632613165373333613161646536333635396332386666373530613437 Sep 13 01:37:53.790000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.790000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.790000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.790000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.790000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.790000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.790000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.790000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.790000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.790000 audit: BPF prog-id=107 op=LOAD Sep 13 01:37:53.790000 audit[2995]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2986 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:53.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632613165373333613161646536333635396332386666373530613437 Sep 13 01:37:53.790000 audit: BPF prog-id=107 op=UNLOAD Sep 13 01:37:53.790000 audit: BPF prog-id=106 op=UNLOAD Sep 13 01:37:53.790000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.790000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.790000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.790000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.790000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.790000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.790000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.790000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.790000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.790000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:53.790000 audit: BPF prog-id=108 op=LOAD Sep 13 01:37:53.790000 audit[2995]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2986 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:53.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632613165373333613161646536333635396332386666373530613437 Sep 13 01:37:53.811219 env[1478]: time="2025-09-13T01:37:53.811161650Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-5tmnx,Uid:ac1461c5-c97e-45ca-a77d-336ba3ca9941,Namespace:default,Attempt:1,} returns sandbox id \"f2a1e733a1ade63659c28ff750a47a4ea98f78ca3f62dc147905efd4d31c039e\"" Sep 13 01:37:54.307983 kubelet[1979]: E0913 01:37:54.307949 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:54.535608 env[1478]: time="2025-09-13T01:37:54.535556139Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:54.542711 env[1478]: time="2025-09-13T01:37:54.542656758Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a319b5bdc1001e98875b68e2943279adb74bcb19d09f1db857bc27959a078a65,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:54.546972 env[1478]: time="2025-09-13T01:37:54.546928530Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:54.551043 env[1478]: time="2025-09-13T01:37:54.551005700Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:731ab232ca708102ab332340b1274d5cd656aa896ecc5368ee95850b811df86f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:54.551602 env[1478]: time="2025-09-13T01:37:54.551573062Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\" returns image reference \"sha256:a319b5bdc1001e98875b68e2943279adb74bcb19d09f1db857bc27959a078a65\"" Sep 13 01:37:54.553465 env[1478]: time="2025-09-13T01:37:54.553428587Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Sep 13 01:37:54.554140 env[1478]: time="2025-09-13T01:37:54.554112589Z" level=info msg="CreateContainer within sandbox \"75742efeef4ada9471487ae43a2ee1c1a7388ac5461b3ed23babce748315733a\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Sep 13 01:37:54.581604 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3333173201.mount: Deactivated successfully. Sep 13 01:37:54.598837 env[1478]: time="2025-09-13T01:37:54.598788027Z" level=info msg="CreateContainer within sandbox \"75742efeef4ada9471487ae43a2ee1c1a7388ac5461b3ed23babce748315733a\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"ed413e29e127500ffb42a919e582fac5910ffbabc96e416a26cf1f99a774c561\"" Sep 13 01:37:54.599746 env[1478]: time="2025-09-13T01:37:54.599720269Z" level=info msg="StartContainer for \"ed413e29e127500ffb42a919e582fac5910ffbabc96e416a26cf1f99a774c561\"" Sep 13 01:37:54.623160 systemd[1]: Started cri-containerd-ed413e29e127500ffb42a919e582fac5910ffbabc96e416a26cf1f99a774c561.scope. Sep 13 01:37:54.637000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.637000 audit[3026]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=2851 pid=3026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:54.637000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564343133653239653132373530306666623432613931396535383266 Sep 13 01:37:54.637000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.637000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.637000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.637000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.637000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.637000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.637000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.637000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.637000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.637000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.637000 audit: BPF prog-id=109 op=LOAD Sep 13 01:37:54.637000 audit[3026]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=2851 pid=3026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:54.637000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564343133653239653132373530306666623432613931396535383266 Sep 13 01:37:54.637000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.637000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.637000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.637000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.637000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.637000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.637000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.637000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.637000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.637000 audit: BPF prog-id=110 op=LOAD Sep 13 01:37:54.637000 audit[3026]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=2851 pid=3026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:54.637000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564343133653239653132373530306666623432613931396535383266 Sep 13 01:37:54.637000 audit: BPF prog-id=110 op=UNLOAD Sep 13 01:37:54.637000 audit: BPF prog-id=109 op=UNLOAD Sep 13 01:37:54.637000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.637000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.637000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.637000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.637000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.637000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.637000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.637000 audit[3026]: AVC avc: denied { perfmon } for pid=3026 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.637000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.637000 audit[3026]: AVC avc: denied { bpf } for pid=3026 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:54.637000 audit: BPF prog-id=111 op=LOAD Sep 13 01:37:54.637000 audit[3026]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=2851 pid=3026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:54.637000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564343133653239653132373530306666623432613931396535383266 Sep 13 01:37:54.661612 env[1478]: time="2025-09-13T01:37:54.661572273Z" level=info msg="StartContainer for \"ed413e29e127500ffb42a919e582fac5910ffbabc96e416a26cf1f99a774c561\" returns successfully" Sep 13 01:37:55.309352 kubelet[1979]: E0913 01:37:55.309309 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:55.383444 systemd-networkd[1645]: calic1730cf33e5: Gained IPv6LL Sep 13 01:37:55.384030 kubelet[1979]: I0913 01:37:55.383445 1979 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Sep 13 01:37:55.384030 kubelet[1979]: I0913 01:37:55.383481 1979 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Sep 13 01:37:55.565940 kubelet[1979]: I0913 01:37:55.565798 1979 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-9xghd" podStartSLOduration=34.93105688 podStartE2EDuration="37.565780638s" podCreationTimestamp="2025-09-13 01:37:18 +0000 UTC" firstStartedPulling="2025-09-13 01:37:51.917811906 +0000 UTC m=+34.567151543" lastFinishedPulling="2025-09-13 01:37:54.552535704 +0000 UTC m=+37.201875301" observedRunningTime="2025-09-13 01:37:55.565713518 +0000 UTC m=+38.215053155" watchObservedRunningTime="2025-09-13 01:37:55.565780638 +0000 UTC m=+38.215120275" Sep 13 01:37:55.579871 systemd[1]: run-containerd-runc-k8s.io-ed413e29e127500ffb42a919e582fac5910ffbabc96e416a26cf1f99a774c561-runc.nMkANK.mount: Deactivated successfully. Sep 13 01:37:56.310013 kubelet[1979]: E0913 01:37:56.309973 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:57.036613 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3937104705.mount: Deactivated successfully. Sep 13 01:37:57.310692 kubelet[1979]: E0913 01:37:57.310570 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:58.275052 kubelet[1979]: E0913 01:37:58.275006 1979 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:58.311581 kubelet[1979]: E0913 01:37:58.311530 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:37:58.374585 env[1478]: time="2025-09-13T01:37:58.374529239Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:58.381073 env[1478]: time="2025-09-13T01:37:58.381021775Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9fddf21fd9c2634e7bf6e633e36b0fb227f6cd5fbe1b3334a16de3ab50f31e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:58.385352 env[1478]: time="2025-09-13T01:37:58.385308745Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:58.391119 env[1478]: time="2025-09-13T01:37:58.391087439Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:883ca821a91fc20bcde818eeee4e1ed55ef63a020d6198ecd5a03af5a4eac530,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:37:58.391729 env[1478]: time="2025-09-13T01:37:58.391701641Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:9fddf21fd9c2634e7bf6e633e36b0fb227f6cd5fbe1b3334a16de3ab50f31e5e\"" Sep 13 01:37:58.394825 env[1478]: time="2025-09-13T01:37:58.394794248Z" level=info msg="CreateContainer within sandbox \"f2a1e733a1ade63659c28ff750a47a4ea98f78ca3f62dc147905efd4d31c039e\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Sep 13 01:37:58.428021 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3835293412.mount: Deactivated successfully. Sep 13 01:37:58.433551 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3922255198.mount: Deactivated successfully. Sep 13 01:37:58.447594 env[1478]: time="2025-09-13T01:37:58.447548097Z" level=info msg="CreateContainer within sandbox \"f2a1e733a1ade63659c28ff750a47a4ea98f78ca3f62dc147905efd4d31c039e\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"4acdbb89a36e71dc6f62414d72866945060e7b84c9d0f2477592406410eafa72\"" Sep 13 01:37:58.448187 env[1478]: time="2025-09-13T01:37:58.448164219Z" level=info msg="StartContainer for \"4acdbb89a36e71dc6f62414d72866945060e7b84c9d0f2477592406410eafa72\"" Sep 13 01:37:58.468582 systemd[1]: Started cri-containerd-4acdbb89a36e71dc6f62414d72866945060e7b84c9d0f2477592406410eafa72.scope. Sep 13 01:37:58.486278 kernel: kauditd_printk_skb: 196 callbacks suppressed Sep 13 01:37:58.486414 kernel: audit: type=1400 audit(1757727478.479:696): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:58.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:58.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:58.518617 kernel: audit: type=1400 audit(1757727478.479:697): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:58.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:58.534490 kernel: audit: type=1400 audit(1757727478.479:698): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:58.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:58.551180 kernel: audit: type=1400 audit(1757727478.479:699): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:58.551773 kernel: audit: type=1400 audit(1757727478.479:700): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:58.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:58.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:58.584641 kernel: audit: type=1400 audit(1757727478.479:701): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:58.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:58.602084 kernel: audit: type=1400 audit(1757727478.479:702): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:58.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:58.619596 kernel: audit: type=1400 audit(1757727478.479:703): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:58.622224 kernel: audit: type=1400 audit(1757727478.479:704): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:58.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:58.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:58.652599 kernel: audit: type=1400 audit(1757727478.479:705): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:58.479000 audit: BPF prog-id=112 op=LOAD Sep 13 01:37:58.485000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:58.485000 audit[3068]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2986 pid=3068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:58.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461636462623839613336653731646336663632343134643732383636 Sep 13 01:37:58.485000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:58.485000 audit[3068]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2986 pid=3068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:58.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461636462623839613336653731646336663632343134643732383636 Sep 13 01:37:58.485000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:58.485000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:58.485000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:58.485000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:58.485000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:58.485000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:58.485000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:58.485000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:58.485000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:58.485000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:58.485000 audit: BPF prog-id=113 op=LOAD Sep 13 01:37:58.485000 audit[3068]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2986 pid=3068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:58.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461636462623839613336653731646336663632343134643732383636 Sep 13 01:37:58.501000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:58.501000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:58.501000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:58.501000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:58.501000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:58.501000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:58.501000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:58.501000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:58.501000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:58.501000 audit: BPF prog-id=114 op=LOAD Sep 13 01:37:58.501000 audit[3068]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2986 pid=3068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:58.501000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461636462623839613336653731646336663632343134643732383636 Sep 13 01:37:58.517000 audit: BPF prog-id=114 op=UNLOAD Sep 13 01:37:58.517000 audit: BPF prog-id=113 op=UNLOAD Sep 13 01:37:58.517000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:58.517000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:58.517000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:58.517000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:58.517000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:58.517000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:58.517000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:58.517000 audit[3068]: AVC avc: denied { perfmon } for pid=3068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:58.517000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:58.517000 audit[3068]: AVC avc: denied { bpf } for pid=3068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:37:58.517000 audit: BPF prog-id=115 op=LOAD Sep 13 01:37:58.517000 audit[3068]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2986 pid=3068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:37:58.517000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461636462623839613336653731646336663632343134643732383636 Sep 13 01:37:58.654483 env[1478]: time="2025-09-13T01:37:58.654447883Z" level=info msg="StartContainer for \"4acdbb89a36e71dc6f62414d72866945060e7b84c9d0f2477592406410eafa72\" returns successfully" Sep 13 01:37:59.312408 kubelet[1979]: E0913 01:37:59.312364 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:00.313395 kubelet[1979]: E0913 01:38:00.313355 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:01.313530 kubelet[1979]: E0913 01:38:01.313489 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:02.314458 kubelet[1979]: E0913 01:38:02.314417 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:03.315425 kubelet[1979]: E0913 01:38:03.315385 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:04.316024 kubelet[1979]: E0913 01:38:04.315978 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:05.316764 kubelet[1979]: E0913 01:38:05.316728 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:05.481454 kubelet[1979]: I0913 01:38:05.480851 1979 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-7fcdb87857-5tmnx" podStartSLOduration=22.899305228 podStartE2EDuration="27.48083374s" podCreationTimestamp="2025-09-13 01:37:38 +0000 UTC" firstStartedPulling="2025-09-13 01:37:53.812031333 +0000 UTC m=+36.461370930" lastFinishedPulling="2025-09-13 01:37:58.393559805 +0000 UTC m=+41.042899442" observedRunningTime="2025-09-13 01:37:59.621386299 +0000 UTC m=+42.270725936" watchObservedRunningTime="2025-09-13 01:38:05.48083374 +0000 UTC m=+48.130173417" Sep 13 01:38:05.485877 kubelet[1979]: I0913 01:38:05.485848 1979 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/35833766-7fad-4961-97ab-2fc92d57e452-data\") pod \"nfs-server-provisioner-0\" (UID: \"35833766-7fad-4961-97ab-2fc92d57e452\") " pod="default/nfs-server-provisioner-0" Sep 13 01:38:05.485988 kubelet[1979]: I0913 01:38:05.485890 1979 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2l96x\" (UniqueName: \"kubernetes.io/projected/35833766-7fad-4961-97ab-2fc92d57e452-kube-api-access-2l96x\") pod \"nfs-server-provisioner-0\" (UID: \"35833766-7fad-4961-97ab-2fc92d57e452\") " pod="default/nfs-server-provisioner-0" Sep 13 01:38:05.486599 systemd[1]: Created slice kubepods-besteffort-pod35833766_7fad_4961_97ab_2fc92d57e452.slice. Sep 13 01:38:05.545000 audit[3122]: NETFILTER_CFG table=filter:74 family=2 entries=20 op=nft_register_rule pid=3122 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:38:05.552351 kernel: kauditd_printk_skb: 47 callbacks suppressed Sep 13 01:38:05.552419 kernel: audit: type=1325 audit(1757727485.545:714): table=filter:74 family=2 entries=20 op=nft_register_rule pid=3122 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:38:05.545000 audit[3122]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=fffff229af30 a2=0 a3=1 items=0 ppid=2196 pid=3122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:05.592593 kernel: audit: type=1300 audit(1757727485.545:714): arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=fffff229af30 a2=0 a3=1 items=0 ppid=2196 pid=3122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:05.545000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:38:05.607709 kernel: audit: type=1327 audit(1757727485.545:714): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:38:05.593000 audit[3122]: NETFILTER_CFG table=nat:75 family=2 entries=26 op=nft_register_rule pid=3122 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:38:05.593000 audit[3122]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8076 a0=3 a1=fffff229af30 a2=0 a3=1 items=0 ppid=2196 pid=3122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:05.651380 kernel: audit: type=1325 audit(1757727485.593:715): table=nat:75 family=2 entries=26 op=nft_register_rule pid=3122 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:38:05.651500 kernel: audit: type=1300 audit(1757727485.593:715): arch=c00000b7 syscall=211 success=yes exit=8076 a0=3 a1=fffff229af30 a2=0 a3=1 items=0 ppid=2196 pid=3122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:05.593000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:38:05.665493 kernel: audit: type=1327 audit(1757727485.593:715): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:38:05.631000 audit[3127]: NETFILTER_CFG table=filter:76 family=2 entries=32 op=nft_register_rule pid=3127 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:38:05.680203 kernel: audit: type=1325 audit(1757727485.631:716): table=filter:76 family=2 entries=32 op=nft_register_rule pid=3127 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:38:05.631000 audit[3127]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffed9de100 a2=0 a3=1 items=0 ppid=2196 pid=3127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:05.631000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:38:05.722372 kernel: audit: type=1300 audit(1757727485.631:716): arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffed9de100 a2=0 a3=1 items=0 ppid=2196 pid=3127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:05.722458 kernel: audit: type=1327 audit(1757727485.631:716): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:38:05.651000 audit[3127]: NETFILTER_CFG table=nat:77 family=2 entries=26 op=nft_register_rule pid=3127 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:38:05.736971 kernel: audit: type=1325 audit(1757727485.651:717): table=nat:77 family=2 entries=26 op=nft_register_rule pid=3127 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:38:05.651000 audit[3127]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8076 a0=3 a1=ffffed9de100 a2=0 a3=1 items=0 ppid=2196 pid=3127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:05.651000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:38:05.790032 env[1478]: time="2025-09-13T01:38:05.789988563Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:35833766-7fad-4961-97ab-2fc92d57e452,Namespace:default,Attempt:0,}" Sep 13 01:38:05.936883 systemd-networkd[1645]: cali60e51b789ff: Link UP Sep 13 01:38:05.943511 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 01:38:05.943629 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Sep 13 01:38:05.951438 systemd-networkd[1645]: cali60e51b789ff: Gained carrier Sep 13 01:38:05.966963 env[1478]: 2025-09-13 01:38:05.872 [INFO][3128] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.13-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 35833766-7fad-4961-97ab-2fc92d57e452 1814 0 2025-09-13 01:38:05 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.200.20.13 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="c1a2452283d8f36ca5f0bded12e08988a20702d9b9bada356d57a849603bdcf3" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.13-k8s-nfs--server--provisioner--0-" Sep 13 01:38:05.966963 env[1478]: 2025-09-13 01:38:05.872 [INFO][3128] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="c1a2452283d8f36ca5f0bded12e08988a20702d9b9bada356d57a849603bdcf3" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.13-k8s-nfs--server--provisioner--0-eth0" Sep 13 01:38:05.966963 env[1478]: 2025-09-13 01:38:05.896 [INFO][3142] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c1a2452283d8f36ca5f0bded12e08988a20702d9b9bada356d57a849603bdcf3" HandleID="k8s-pod-network.c1a2452283d8f36ca5f0bded12e08988a20702d9b9bada356d57a849603bdcf3" Workload="10.200.20.13-k8s-nfs--server--provisioner--0-eth0" Sep 13 01:38:05.966963 env[1478]: 2025-09-13 01:38:05.896 [INFO][3142] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c1a2452283d8f36ca5f0bded12e08988a20702d9b9bada356d57a849603bdcf3" HandleID="k8s-pod-network.c1a2452283d8f36ca5f0bded12e08988a20702d9b9bada356d57a849603bdcf3" Workload="10.200.20.13-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d2ff0), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.13", "pod":"nfs-server-provisioner-0", "timestamp":"2025-09-13 01:38:05.896401752 +0000 UTC"}, Hostname:"10.200.20.13", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 01:38:05.966963 env[1478]: 2025-09-13 01:38:05.896 [INFO][3142] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 01:38:05.966963 env[1478]: 2025-09-13 01:38:05.896 [INFO][3142] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 01:38:05.966963 env[1478]: 2025-09-13 01:38:05.896 [INFO][3142] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.13' Sep 13 01:38:05.966963 env[1478]: 2025-09-13 01:38:05.906 [INFO][3142] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.c1a2452283d8f36ca5f0bded12e08988a20702d9b9bada356d57a849603bdcf3" host="10.200.20.13" Sep 13 01:38:05.966963 env[1478]: 2025-09-13 01:38:05.911 [INFO][3142] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.20.13" Sep 13 01:38:05.966963 env[1478]: 2025-09-13 01:38:05.915 [INFO][3142] ipam/ipam.go 511: Trying affinity for 192.168.98.64/26 host="10.200.20.13" Sep 13 01:38:05.966963 env[1478]: 2025-09-13 01:38:05.917 [INFO][3142] ipam/ipam.go 158: Attempting to load block cidr=192.168.98.64/26 host="10.200.20.13" Sep 13 01:38:05.966963 env[1478]: 2025-09-13 01:38:05.919 [INFO][3142] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.98.64/26 host="10.200.20.13" Sep 13 01:38:05.966963 env[1478]: 2025-09-13 01:38:05.919 [INFO][3142] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.98.64/26 handle="k8s-pod-network.c1a2452283d8f36ca5f0bded12e08988a20702d9b9bada356d57a849603bdcf3" host="10.200.20.13" Sep 13 01:38:05.966963 env[1478]: 2025-09-13 01:38:05.921 [INFO][3142] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.c1a2452283d8f36ca5f0bded12e08988a20702d9b9bada356d57a849603bdcf3 Sep 13 01:38:05.966963 env[1478]: 2025-09-13 01:38:05.926 [INFO][3142] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.98.64/26 handle="k8s-pod-network.c1a2452283d8f36ca5f0bded12e08988a20702d9b9bada356d57a849603bdcf3" host="10.200.20.13" Sep 13 01:38:05.966963 env[1478]: 2025-09-13 01:38:05.932 [INFO][3142] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.98.67/26] block=192.168.98.64/26 handle="k8s-pod-network.c1a2452283d8f36ca5f0bded12e08988a20702d9b9bada356d57a849603bdcf3" host="10.200.20.13" Sep 13 01:38:05.966963 env[1478]: 2025-09-13 01:38:05.932 [INFO][3142] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.98.67/26] handle="k8s-pod-network.c1a2452283d8f36ca5f0bded12e08988a20702d9b9bada356d57a849603bdcf3" host="10.200.20.13" Sep 13 01:38:05.966963 env[1478]: 2025-09-13 01:38:05.932 [INFO][3142] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 01:38:05.966963 env[1478]: 2025-09-13 01:38:05.932 [INFO][3142] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.98.67/26] IPv6=[] ContainerID="c1a2452283d8f36ca5f0bded12e08988a20702d9b9bada356d57a849603bdcf3" HandleID="k8s-pod-network.c1a2452283d8f36ca5f0bded12e08988a20702d9b9bada356d57a849603bdcf3" Workload="10.200.20.13-k8s-nfs--server--provisioner--0-eth0" Sep 13 01:38:05.967540 env[1478]: 2025-09-13 01:38:05.933 [INFO][3128] cni-plugin/k8s.go 418: Populated endpoint ContainerID="c1a2452283d8f36ca5f0bded12e08988a20702d9b9bada356d57a849603bdcf3" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.13-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.13-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"35833766-7fad-4961-97ab-2fc92d57e452", ResourceVersion:"1814", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 1, 38, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.13", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.98.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 01:38:05.967540 env[1478]: 2025-09-13 01:38:05.934 [INFO][3128] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.98.67/32] ContainerID="c1a2452283d8f36ca5f0bded12e08988a20702d9b9bada356d57a849603bdcf3" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.13-k8s-nfs--server--provisioner--0-eth0" Sep 13 01:38:05.967540 env[1478]: 2025-09-13 01:38:05.934 [INFO][3128] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="c1a2452283d8f36ca5f0bded12e08988a20702d9b9bada356d57a849603bdcf3" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.13-k8s-nfs--server--provisioner--0-eth0" Sep 13 01:38:05.967540 env[1478]: 2025-09-13 01:38:05.952 [INFO][3128] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c1a2452283d8f36ca5f0bded12e08988a20702d9b9bada356d57a849603bdcf3" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.13-k8s-nfs--server--provisioner--0-eth0" Sep 13 01:38:05.967681 env[1478]: 2025-09-13 01:38:05.952 [INFO][3128] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="c1a2452283d8f36ca5f0bded12e08988a20702d9b9bada356d57a849603bdcf3" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.13-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.13-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"35833766-7fad-4961-97ab-2fc92d57e452", ResourceVersion:"1814", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 1, 38, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.13", ContainerID:"c1a2452283d8f36ca5f0bded12e08988a20702d9b9bada356d57a849603bdcf3", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.98.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"e2:41:46:4a:51:a0", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 01:38:05.967681 env[1478]: 2025-09-13 01:38:05.964 [INFO][3128] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="c1a2452283d8f36ca5f0bded12e08988a20702d9b9bada356d57a849603bdcf3" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.13-k8s-nfs--server--provisioner--0-eth0" Sep 13 01:38:05.974000 audit[3156]: NETFILTER_CFG table=filter:78 family=2 entries=40 op=nft_register_chain pid=3156 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 01:38:05.974000 audit[3156]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20756 a0=3 a1=ffffd4ddfb50 a2=0 a3=ffffbdfd7fa8 items=0 ppid=2609 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:05.974000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 01:38:05.982120 env[1478]: time="2025-09-13T01:38:05.981880575Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 01:38:05.982120 env[1478]: time="2025-09-13T01:38:05.981920535Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 01:38:05.982120 env[1478]: time="2025-09-13T01:38:05.981930855Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 01:38:05.982412 env[1478]: time="2025-09-13T01:38:05.982126576Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c1a2452283d8f36ca5f0bded12e08988a20702d9b9bada356d57a849603bdcf3 pid=3165 runtime=io.containerd.runc.v2 Sep 13 01:38:06.006430 systemd[1]: Started cri-containerd-c1a2452283d8f36ca5f0bded12e08988a20702d9b9bada356d57a849603bdcf3.scope. Sep 13 01:38:06.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.018000 audit: BPF prog-id=116 op=LOAD Sep 13 01:38:06.018000 audit[3176]: AVC avc: denied { bpf } for pid=3176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.018000 audit[3176]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014fb38 a2=10 a3=0 items=0 ppid=3165 pid=3176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:06.018000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331613234353232383364386633366361356630626465643132653038 Sep 13 01:38:06.018000 audit[3176]: AVC avc: denied { perfmon } for pid=3176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.018000 audit[3176]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014f5a0 a2=3c a3=0 items=0 ppid=3165 pid=3176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:06.018000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331613234353232383364386633366361356630626465643132653038 Sep 13 01:38:06.019000 audit[3176]: AVC avc: denied { bpf } for pid=3176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.019000 audit[3176]: AVC avc: denied { bpf } for pid=3176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.019000 audit[3176]: AVC avc: denied { bpf } for pid=3176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.019000 audit[3176]: AVC avc: denied { perfmon } for pid=3176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.019000 audit[3176]: AVC avc: denied { perfmon } for pid=3176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.019000 audit[3176]: AVC avc: denied { perfmon } for pid=3176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.019000 audit[3176]: AVC avc: denied { perfmon } for pid=3176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.019000 audit[3176]: AVC avc: denied { perfmon } for pid=3176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.019000 audit[3176]: AVC avc: denied { bpf } for pid=3176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.019000 audit[3176]: AVC avc: denied { bpf } for pid=3176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.019000 audit: BPF prog-id=117 op=LOAD Sep 13 01:38:06.019000 audit[3176]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014f8e0 a2=78 a3=0 items=0 ppid=3165 pid=3176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:06.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331613234353232383364386633366361356630626465643132653038 Sep 13 01:38:06.019000 audit[3176]: AVC avc: denied { bpf } for pid=3176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.019000 audit[3176]: AVC avc: denied { bpf } for pid=3176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.019000 audit[3176]: AVC avc: denied { perfmon } for pid=3176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.019000 audit[3176]: AVC avc: denied { perfmon } for pid=3176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.019000 audit[3176]: AVC avc: denied { perfmon } for pid=3176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.019000 audit[3176]: AVC avc: denied { perfmon } for pid=3176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.019000 audit[3176]: AVC avc: denied { perfmon } for pid=3176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.019000 audit[3176]: AVC avc: denied { bpf } for pid=3176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.019000 audit[3176]: AVC avc: denied { bpf } for pid=3176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.019000 audit: BPF prog-id=118 op=LOAD Sep 13 01:38:06.019000 audit[3176]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014f670 a2=78 a3=0 items=0 ppid=3165 pid=3176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:06.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331613234353232383364386633366361356630626465643132653038 Sep 13 01:38:06.020000 audit: BPF prog-id=118 op=UNLOAD Sep 13 01:38:06.020000 audit: BPF prog-id=117 op=UNLOAD Sep 13 01:38:06.020000 audit[3176]: AVC avc: denied { bpf } for pid=3176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.020000 audit[3176]: AVC avc: denied { bpf } for pid=3176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.020000 audit[3176]: AVC avc: denied { bpf } for pid=3176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.020000 audit[3176]: AVC avc: denied { perfmon } for pid=3176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.020000 audit[3176]: AVC avc: denied { perfmon } for pid=3176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.020000 audit[3176]: AVC avc: denied { perfmon } for pid=3176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.020000 audit[3176]: AVC avc: denied { perfmon } for pid=3176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.020000 audit[3176]: AVC avc: denied { perfmon } for pid=3176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.020000 audit[3176]: AVC avc: denied { bpf } for pid=3176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.020000 audit[3176]: AVC avc: denied { bpf } for pid=3176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:06.020000 audit: BPF prog-id=119 op=LOAD Sep 13 01:38:06.020000 audit[3176]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014fb40 a2=78 a3=0 items=0 ppid=3165 pid=3176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:06.020000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331613234353232383364386633366361356630626465643132653038 Sep 13 01:38:06.040719 env[1478]: time="2025-09-13T01:38:06.040675780Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:35833766-7fad-4961-97ab-2fc92d57e452,Namespace:default,Attempt:0,} returns sandbox id \"c1a2452283d8f36ca5f0bded12e08988a20702d9b9bada356d57a849603bdcf3\"" Sep 13 01:38:06.042829 env[1478]: time="2025-09-13T01:38:06.042802385Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Sep 13 01:38:06.320377 kubelet[1979]: E0913 01:38:06.318038 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:06.612648 systemd[1]: run-containerd-runc-k8s.io-c1a2452283d8f36ca5f0bded12e08988a20702d9b9bada356d57a849603bdcf3-runc.JTKWHs.mount: Deactivated successfully. Sep 13 01:38:07.318446 kubelet[1979]: E0913 01:38:07.318398 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:07.671558 systemd-networkd[1645]: cali60e51b789ff: Gained IPv6LL Sep 13 01:38:08.276624 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount516264834.mount: Deactivated successfully. Sep 13 01:38:08.319579 kubelet[1979]: E0913 01:38:08.319530 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:09.319965 kubelet[1979]: E0913 01:38:09.319920 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:10.099881 env[1478]: time="2025-09-13T01:38:10.099824634Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:38:10.106666 env[1478]: time="2025-09-13T01:38:10.106616368Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:38:10.111000 env[1478]: time="2025-09-13T01:38:10.110962416Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:38:10.114873 env[1478]: time="2025-09-13T01:38:10.114836624Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:38:10.115535 env[1478]: time="2025-09-13T01:38:10.115505585Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\"" Sep 13 01:38:10.118238 env[1478]: time="2025-09-13T01:38:10.118183711Z" level=info msg="CreateContainer within sandbox \"c1a2452283d8f36ca5f0bded12e08988a20702d9b9bada356d57a849603bdcf3\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Sep 13 01:38:10.140103 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2404607766.mount: Deactivated successfully. Sep 13 01:38:10.146197 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3691637464.mount: Deactivated successfully. Sep 13 01:38:10.163064 env[1478]: time="2025-09-13T01:38:10.163018719Z" level=info msg="CreateContainer within sandbox \"c1a2452283d8f36ca5f0bded12e08988a20702d9b9bada356d57a849603bdcf3\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"05814c761389a90bf17cde9e268852bfcc3ee511158a5f2cf792e7a14b22f6cd\"" Sep 13 01:38:10.163712 env[1478]: time="2025-09-13T01:38:10.163687760Z" level=info msg="StartContainer for \"05814c761389a90bf17cde9e268852bfcc3ee511158a5f2cf792e7a14b22f6cd\"" Sep 13 01:38:10.182139 systemd[1]: Started cri-containerd-05814c761389a90bf17cde9e268852bfcc3ee511158a5f2cf792e7a14b22f6cd.scope. Sep 13 01:38:10.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:10.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:10.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:10.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:10.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:10.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:10.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:10.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:10.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:10.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:10.197000 audit: BPF prog-id=120 op=LOAD Sep 13 01:38:10.198000 audit[3216]: AVC avc: denied { bpf } for pid=3216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:10.198000 audit[3216]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3165 pid=3216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:10.198000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035383134633736313338396139306266313763646539653236383835 Sep 13 01:38:10.198000 audit[3216]: AVC avc: denied { perfmon } for pid=3216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:10.198000 audit[3216]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3165 pid=3216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:10.198000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035383134633736313338396139306266313763646539653236383835 Sep 13 01:38:10.198000 audit[3216]: AVC avc: denied { bpf } for pid=3216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:10.198000 audit[3216]: AVC avc: denied { bpf } for pid=3216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:10.198000 audit[3216]: AVC avc: denied { bpf } for pid=3216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:10.198000 audit[3216]: AVC avc: denied { perfmon } for pid=3216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:10.198000 audit[3216]: AVC avc: denied { perfmon } for pid=3216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:10.198000 audit[3216]: AVC avc: denied { perfmon } for pid=3216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:10.198000 audit[3216]: AVC avc: denied { perfmon } for pid=3216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:10.198000 audit[3216]: AVC avc: denied { perfmon } for pid=3216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:10.198000 audit[3216]: AVC avc: denied { bpf } for pid=3216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:10.198000 audit[3216]: AVC avc: denied { bpf } for pid=3216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:10.198000 audit: BPF prog-id=121 op=LOAD Sep 13 01:38:10.198000 audit[3216]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3165 pid=3216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:10.198000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035383134633736313338396139306266313763646539653236383835 Sep 13 01:38:10.198000 audit[3216]: AVC avc: denied { bpf } for pid=3216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:10.198000 audit[3216]: AVC avc: denied { bpf } for pid=3216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:10.198000 audit[3216]: AVC avc: denied { perfmon } for pid=3216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:10.198000 audit[3216]: AVC avc: denied { perfmon } for pid=3216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:10.198000 audit[3216]: AVC avc: denied { perfmon } for pid=3216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:10.198000 audit[3216]: AVC avc: denied { perfmon } for pid=3216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:10.198000 audit[3216]: AVC avc: denied { perfmon } for pid=3216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:10.198000 audit[3216]: AVC avc: denied { bpf } for pid=3216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:10.198000 audit[3216]: AVC avc: denied { bpf } for pid=3216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:10.198000 audit: BPF prog-id=122 op=LOAD Sep 13 01:38:10.198000 audit[3216]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3165 pid=3216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:10.198000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035383134633736313338396139306266313763646539653236383835 Sep 13 01:38:10.198000 audit: BPF prog-id=122 op=UNLOAD Sep 13 01:38:10.198000 audit: BPF prog-id=121 op=UNLOAD Sep 13 01:38:10.198000 audit[3216]: AVC avc: denied { bpf } for pid=3216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:10.198000 audit[3216]: AVC avc: denied { bpf } for pid=3216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:10.198000 audit[3216]: AVC avc: denied { bpf } for pid=3216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:10.198000 audit[3216]: AVC avc: denied { perfmon } for pid=3216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:10.198000 audit[3216]: AVC avc: denied { perfmon } for pid=3216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:10.198000 audit[3216]: AVC avc: denied { perfmon } for pid=3216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:10.198000 audit[3216]: AVC avc: denied { perfmon } for pid=3216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:10.198000 audit[3216]: AVC avc: denied { perfmon } for pid=3216 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:10.198000 audit[3216]: AVC avc: denied { bpf } for pid=3216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:10.198000 audit[3216]: AVC avc: denied { bpf } for pid=3216 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:10.198000 audit: BPF prog-id=123 op=LOAD Sep 13 01:38:10.198000 audit[3216]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3165 pid=3216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:10.198000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035383134633736313338396139306266313763646539653236383835 Sep 13 01:38:10.221499 env[1478]: time="2025-09-13T01:38:10.221454314Z" level=info msg="StartContainer for \"05814c761389a90bf17cde9e268852bfcc3ee511158a5f2cf792e7a14b22f6cd\" returns successfully" Sep 13 01:38:10.258000 audit[3244]: AVC avc: denied { search } for pid=3244 comm="rpcbind" name="crypto" dev="proc" ino=21566 scontext=system_u:system_r:svirt_lxc_net_t:s0:c252,c606 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 13 01:38:10.258000 audit[3244]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffa5a9f000 a2=0 a3=0 items=0 ppid=3227 pid=3244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c252,c606 key=(null) Sep 13 01:38:10.258000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Sep 13 01:38:10.298000 audit[3249]: AVC avc: denied { search } for pid=3249 comm="dbus-daemon" name="crypto" dev="proc" ino=21566 scontext=system_u:system_r:svirt_lxc_net_t:s0:c252,c606 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 13 01:38:10.298000 audit[3249]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffb20df000 a2=0 a3=0 items=0 ppid=3227 pid=3249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c252,c606 key=(null) Sep 13 01:38:10.298000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Sep 13 01:38:10.301000 audit[3250]: AVC avc: denied { watch } for pid=3250 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=1049660 scontext=system_u:system_r:svirt_lxc_net_t:s0:c252,c606 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c252,c606 tclass=dir permissive=0 Sep 13 01:38:10.301000 audit[3250]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaab04189090 a2=2c8 a3=aaab04163a60 items=0 ppid=3227 pid=3250 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c252,c606 key=(null) Sep 13 01:38:10.301000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Sep 13 01:38:10.306000 audit[3251]: AVC avc: denied { read } for pid=3251 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=21591 scontext=system_u:system_r:svirt_lxc_net_t:s0:c252,c606 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Sep 13 01:38:10.306000 audit[3251]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffff9c a1=ffffa6eca570 a2=80000 a3=0 items=0 ppid=3227 pid=3251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c252,c606 key=(null) Sep 13 01:38:10.306000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Sep 13 01:38:10.307000 audit[3251]: AVC avc: denied { search } for pid=3251 comm="ganesha.nfsd" name="crypto" dev="proc" ino=21566 scontext=system_u:system_r:svirt_lxc_net_t:s0:c252,c606 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 13 01:38:10.307000 audit[3251]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffa625f000 a2=0 a3=0 items=0 ppid=3227 pid=3251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c252,c606 key=(null) Sep 13 01:38:10.307000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Sep 13 01:38:10.320764 kubelet[1979]: E0913 01:38:10.320681 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:10.685000 audit[3256]: NETFILTER_CFG table=filter:79 family=2 entries=20 op=nft_register_rule pid=3256 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:38:10.692400 kernel: kauditd_printk_skb: 134 callbacks suppressed Sep 13 01:38:10.692491 kernel: audit: type=1325 audit(1757727490.685:760): table=filter:79 family=2 entries=20 op=nft_register_rule pid=3256 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:38:10.685000 audit[3256]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffd76a1c30 a2=0 a3=1 items=0 ppid=2196 pid=3256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:10.736274 kernel: audit: type=1300 audit(1757727490.685:760): arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffd76a1c30 a2=0 a3=1 items=0 ppid=2196 pid=3256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:10.736472 kernel: audit: type=1327 audit(1757727490.685:760): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:38:10.685000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:38:10.707000 audit[3256]: NETFILTER_CFG table=nat:80 family=2 entries=110 op=nft_register_chain pid=3256 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:38:10.765356 kernel: audit: type=1325 audit(1757727490.707:761): table=nat:80 family=2 entries=110 op=nft_register_chain pid=3256 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:38:10.765453 kernel: audit: type=1300 audit(1757727490.707:761): arch=c00000b7 syscall=211 success=yes exit=50988 a0=3 a1=ffffd76a1c30 a2=0 a3=1 items=0 ppid=2196 pid=3256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:10.707000 audit[3256]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=50988 a0=3 a1=ffffd76a1c30 a2=0 a3=1 items=0 ppid=2196 pid=3256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:10.707000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:38:10.808333 kernel: audit: type=1327 audit(1757727490.707:761): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:38:11.321083 kubelet[1979]: E0913 01:38:11.321043 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:12.321871 kubelet[1979]: E0913 01:38:12.321817 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:13.322875 kubelet[1979]: E0913 01:38:13.322831 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:14.323751 kubelet[1979]: E0913 01:38:14.323711 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:14.542896 systemd[1]: run-containerd-runc-k8s.io-1dff9a187ce82f59bbe29e41335aed17899c68c59f7272e931e003d36926858e-runc.7Ywtrg.mount: Deactivated successfully. Sep 13 01:38:14.619239 kubelet[1979]: I0913 01:38:14.619077 1979 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=5.544436351 podStartE2EDuration="9.619058036s" podCreationTimestamp="2025-09-13 01:38:05 +0000 UTC" firstStartedPulling="2025-09-13 01:38:06.042078983 +0000 UTC m=+48.691418620" lastFinishedPulling="2025-09-13 01:38:10.116700708 +0000 UTC m=+52.766040305" observedRunningTime="2025-09-13 01:38:10.66063854 +0000 UTC m=+53.309978177" watchObservedRunningTime="2025-09-13 01:38:14.619058036 +0000 UTC m=+57.268397633" Sep 13 01:38:15.324821 kubelet[1979]: E0913 01:38:15.324779 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:16.325926 kubelet[1979]: E0913 01:38:16.325884 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:17.326033 kubelet[1979]: E0913 01:38:17.325996 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:18.275072 kubelet[1979]: E0913 01:38:18.275041 1979 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:18.298567 env[1478]: time="2025-09-13T01:38:18.298532759Z" level=info msg="StopPodSandbox for \"fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175\"" Sep 13 01:38:18.327128 kubelet[1979]: E0913 01:38:18.327091 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:18.363776 env[1478]: 2025-09-13 01:38:18.331 [WARNING][3290] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.13-k8s-nginx--deployment--7fcdb87857--5tmnx-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"ac1461c5-c97e-45ca-a77d-336ba3ca9941", ResourceVersion:"1783", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 1, 37, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.13", ContainerID:"f2a1e733a1ade63659c28ff750a47a4ea98f78ca3f62dc147905efd4d31c039e", Pod:"nginx-deployment-7fcdb87857-5tmnx", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.98.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calic1730cf33e5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 01:38:18.363776 env[1478]: 2025-09-13 01:38:18.331 [INFO][3290] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175" Sep 13 01:38:18.363776 env[1478]: 2025-09-13 01:38:18.331 [INFO][3290] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175" iface="eth0" netns="" Sep 13 01:38:18.363776 env[1478]: 2025-09-13 01:38:18.331 [INFO][3290] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175" Sep 13 01:38:18.363776 env[1478]: 2025-09-13 01:38:18.331 [INFO][3290] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175" Sep 13 01:38:18.363776 env[1478]: 2025-09-13 01:38:18.350 [INFO][3297] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175" HandleID="k8s-pod-network.fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175" Workload="10.200.20.13-k8s-nginx--deployment--7fcdb87857--5tmnx-eth0" Sep 13 01:38:18.363776 env[1478]: 2025-09-13 01:38:18.350 [INFO][3297] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 01:38:18.363776 env[1478]: 2025-09-13 01:38:18.350 [INFO][3297] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 01:38:18.363776 env[1478]: 2025-09-13 01:38:18.360 [WARNING][3297] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175" HandleID="k8s-pod-network.fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175" Workload="10.200.20.13-k8s-nginx--deployment--7fcdb87857--5tmnx-eth0" Sep 13 01:38:18.363776 env[1478]: 2025-09-13 01:38:18.360 [INFO][3297] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175" HandleID="k8s-pod-network.fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175" Workload="10.200.20.13-k8s-nginx--deployment--7fcdb87857--5tmnx-eth0" Sep 13 01:38:18.363776 env[1478]: 2025-09-13 01:38:18.361 [INFO][3297] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 01:38:18.363776 env[1478]: 2025-09-13 01:38:18.362 [INFO][3290] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175" Sep 13 01:38:18.364328 env[1478]: time="2025-09-13T01:38:18.364279674Z" level=info msg="TearDown network for sandbox \"fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175\" successfully" Sep 13 01:38:18.364475 env[1478]: time="2025-09-13T01:38:18.364453914Z" level=info msg="StopPodSandbox for \"fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175\" returns successfully" Sep 13 01:38:18.365486 env[1478]: time="2025-09-13T01:38:18.365460876Z" level=info msg="RemovePodSandbox for \"fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175\"" Sep 13 01:38:18.365644 env[1478]: time="2025-09-13T01:38:18.365604316Z" level=info msg="Forcibly stopping sandbox \"fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175\"" Sep 13 01:38:18.438668 env[1478]: 2025-09-13 01:38:18.400 [WARNING][3313] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.13-k8s-nginx--deployment--7fcdb87857--5tmnx-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"ac1461c5-c97e-45ca-a77d-336ba3ca9941", ResourceVersion:"1783", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 1, 37, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.13", ContainerID:"f2a1e733a1ade63659c28ff750a47a4ea98f78ca3f62dc147905efd4d31c039e", Pod:"nginx-deployment-7fcdb87857-5tmnx", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.98.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calic1730cf33e5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 01:38:18.438668 env[1478]: 2025-09-13 01:38:18.400 [INFO][3313] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175" Sep 13 01:38:18.438668 env[1478]: 2025-09-13 01:38:18.400 [INFO][3313] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175" iface="eth0" netns="" Sep 13 01:38:18.438668 env[1478]: 2025-09-13 01:38:18.400 [INFO][3313] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175" Sep 13 01:38:18.438668 env[1478]: 2025-09-13 01:38:18.400 [INFO][3313] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175" Sep 13 01:38:18.438668 env[1478]: 2025-09-13 01:38:18.421 [INFO][3320] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175" HandleID="k8s-pod-network.fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175" Workload="10.200.20.13-k8s-nginx--deployment--7fcdb87857--5tmnx-eth0" Sep 13 01:38:18.438668 env[1478]: 2025-09-13 01:38:18.421 [INFO][3320] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 01:38:18.438668 env[1478]: 2025-09-13 01:38:18.421 [INFO][3320] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 01:38:18.438668 env[1478]: 2025-09-13 01:38:18.434 [WARNING][3320] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175" HandleID="k8s-pod-network.fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175" Workload="10.200.20.13-k8s-nginx--deployment--7fcdb87857--5tmnx-eth0" Sep 13 01:38:18.438668 env[1478]: 2025-09-13 01:38:18.434 [INFO][3320] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175" HandleID="k8s-pod-network.fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175" Workload="10.200.20.13-k8s-nginx--deployment--7fcdb87857--5tmnx-eth0" Sep 13 01:38:18.438668 env[1478]: 2025-09-13 01:38:18.435 [INFO][3320] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 01:38:18.438668 env[1478]: 2025-09-13 01:38:18.437 [INFO][3313] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175" Sep 13 01:38:18.439202 env[1478]: time="2025-09-13T01:38:18.439159084Z" level=info msg="TearDown network for sandbox \"fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175\" successfully" Sep 13 01:38:18.449832 env[1478]: time="2025-09-13T01:38:18.449779303Z" level=info msg="RemovePodSandbox \"fc6e708e3e1d8b92acdd27e0c383e1a6cf6db10c82e8871eb98a3d43585c7175\" returns successfully" Sep 13 01:38:18.450424 env[1478]: time="2025-09-13T01:38:18.450393984Z" level=info msg="StopPodSandbox for \"6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9\"" Sep 13 01:38:18.537017 env[1478]: 2025-09-13 01:38:18.502 [WARNING][3334] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.13-k8s-csi--node--driver--9xghd-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"0f333ef7-95f8-4a9d-8f0e-3b7b944508da", ResourceVersion:"1770", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 1, 37, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.13", ContainerID:"75742efeef4ada9471487ae43a2ee1c1a7388ac5461b3ed23babce748315733a", Pod:"csi-node-driver-9xghd", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.98.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali5adeb78240f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 01:38:18.537017 env[1478]: 2025-09-13 01:38:18.502 [INFO][3334] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9" Sep 13 01:38:18.537017 env[1478]: 2025-09-13 01:38:18.502 [INFO][3334] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9" iface="eth0" netns="" Sep 13 01:38:18.537017 env[1478]: 2025-09-13 01:38:18.502 [INFO][3334] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9" Sep 13 01:38:18.537017 env[1478]: 2025-09-13 01:38:18.502 [INFO][3334] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9" Sep 13 01:38:18.537017 env[1478]: 2025-09-13 01:38:18.520 [INFO][3343] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9" HandleID="k8s-pod-network.6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9" Workload="10.200.20.13-k8s-csi--node--driver--9xghd-eth0" Sep 13 01:38:18.537017 env[1478]: 2025-09-13 01:38:18.521 [INFO][3343] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 01:38:18.537017 env[1478]: 2025-09-13 01:38:18.521 [INFO][3343] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 01:38:18.537017 env[1478]: 2025-09-13 01:38:18.531 [WARNING][3343] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9" HandleID="k8s-pod-network.6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9" Workload="10.200.20.13-k8s-csi--node--driver--9xghd-eth0" Sep 13 01:38:18.537017 env[1478]: 2025-09-13 01:38:18.531 [INFO][3343] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9" HandleID="k8s-pod-network.6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9" Workload="10.200.20.13-k8s-csi--node--driver--9xghd-eth0" Sep 13 01:38:18.537017 env[1478]: 2025-09-13 01:38:18.533 [INFO][3343] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 01:38:18.537017 env[1478]: 2025-09-13 01:38:18.534 [INFO][3334] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9" Sep 13 01:38:18.537017 env[1478]: time="2025-09-13T01:38:18.536409134Z" level=info msg="TearDown network for sandbox \"6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9\" successfully" Sep 13 01:38:18.537017 env[1478]: time="2025-09-13T01:38:18.536449614Z" level=info msg="StopPodSandbox for \"6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9\" returns successfully" Sep 13 01:38:18.537598 env[1478]: time="2025-09-13T01:38:18.537312855Z" level=info msg="RemovePodSandbox for \"6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9\"" Sep 13 01:38:18.537598 env[1478]: time="2025-09-13T01:38:18.537351535Z" level=info msg="Forcibly stopping sandbox \"6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9\"" Sep 13 01:38:18.613215 env[1478]: 2025-09-13 01:38:18.582 [WARNING][3357] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.13-k8s-csi--node--driver--9xghd-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"0f333ef7-95f8-4a9d-8f0e-3b7b944508da", ResourceVersion:"1770", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 1, 37, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.13", ContainerID:"75742efeef4ada9471487ae43a2ee1c1a7388ac5461b3ed23babce748315733a", Pod:"csi-node-driver-9xghd", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.98.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali5adeb78240f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 01:38:18.613215 env[1478]: 2025-09-13 01:38:18.582 [INFO][3357] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9" Sep 13 01:38:18.613215 env[1478]: 2025-09-13 01:38:18.582 [INFO][3357] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9" iface="eth0" netns="" Sep 13 01:38:18.613215 env[1478]: 2025-09-13 01:38:18.582 [INFO][3357] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9" Sep 13 01:38:18.613215 env[1478]: 2025-09-13 01:38:18.582 [INFO][3357] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9" Sep 13 01:38:18.613215 env[1478]: 2025-09-13 01:38:18.599 [INFO][3364] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9" HandleID="k8s-pod-network.6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9" Workload="10.200.20.13-k8s-csi--node--driver--9xghd-eth0" Sep 13 01:38:18.613215 env[1478]: 2025-09-13 01:38:18.599 [INFO][3364] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 01:38:18.613215 env[1478]: 2025-09-13 01:38:18.599 [INFO][3364] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 01:38:18.613215 env[1478]: 2025-09-13 01:38:18.609 [WARNING][3364] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9" HandleID="k8s-pod-network.6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9" Workload="10.200.20.13-k8s-csi--node--driver--9xghd-eth0" Sep 13 01:38:18.613215 env[1478]: 2025-09-13 01:38:18.609 [INFO][3364] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9" HandleID="k8s-pod-network.6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9" Workload="10.200.20.13-k8s-csi--node--driver--9xghd-eth0" Sep 13 01:38:18.613215 env[1478]: 2025-09-13 01:38:18.610 [INFO][3364] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 01:38:18.613215 env[1478]: 2025-09-13 01:38:18.611 [INFO][3357] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9" Sep 13 01:38:18.613698 env[1478]: time="2025-09-13T01:38:18.613248067Z" level=info msg="TearDown network for sandbox \"6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9\" successfully" Sep 13 01:38:18.620569 env[1478]: time="2025-09-13T01:38:18.620528760Z" level=info msg="RemovePodSandbox \"6d7108bb47647f828bcf951430f2dff5607845abe2c6b8a733ab8fb207a7c2c9\" returns successfully" Sep 13 01:38:19.327638 kubelet[1979]: E0913 01:38:19.327599 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:20.329126 kubelet[1979]: E0913 01:38:20.329065 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:21.330140 kubelet[1979]: E0913 01:38:21.330098 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:22.331284 kubelet[1979]: E0913 01:38:22.331242 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:23.332226 kubelet[1979]: E0913 01:38:23.332189 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:24.333346 kubelet[1979]: E0913 01:38:24.333306 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:25.333775 kubelet[1979]: E0913 01:38:25.333733 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:26.333870 kubelet[1979]: E0913 01:38:26.333822 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:27.334386 kubelet[1979]: E0913 01:38:27.334350 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:28.335002 kubelet[1979]: E0913 01:38:28.334958 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:29.335723 kubelet[1979]: E0913 01:38:29.335688 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:30.336474 kubelet[1979]: E0913 01:38:30.336442 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:31.337615 kubelet[1979]: E0913 01:38:31.337575 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:32.337978 kubelet[1979]: E0913 01:38:32.337943 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:33.338791 kubelet[1979]: E0913 01:38:33.338752 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:34.339103 kubelet[1979]: E0913 01:38:34.339056 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:35.067919 systemd[1]: Created slice kubepods-besteffort-pod1fed7fa5_0885_46bf_b156_516c47b928d9.slice. Sep 13 01:38:35.227486 kubelet[1979]: I0913 01:38:35.227445 1979 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fpkpk\" (UniqueName: \"kubernetes.io/projected/1fed7fa5-0885-46bf-b156-516c47b928d9-kube-api-access-fpkpk\") pod \"test-pod-1\" (UID: \"1fed7fa5-0885-46bf-b156-516c47b928d9\") " pod="default/test-pod-1" Sep 13 01:38:35.227630 kubelet[1979]: I0913 01:38:35.227525 1979 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-f873739e-ad81-4daa-aee4-ad75fa6c8e6f\" (UniqueName: \"kubernetes.io/nfs/1fed7fa5-0885-46bf-b156-516c47b928d9-pvc-f873739e-ad81-4daa-aee4-ad75fa6c8e6f\") pod \"test-pod-1\" (UID: \"1fed7fa5-0885-46bf-b156-516c47b928d9\") " pod="default/test-pod-1" Sep 13 01:38:35.342152 kubelet[1979]: E0913 01:38:35.341436 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:35.738066 kernel: Failed to create system directory netfs Sep 13 01:38:35.738226 kernel: audit: type=1400 audit(1757727515.710:762): avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:35.738267 kernel: Failed to create system directory netfs Sep 13 01:38:35.710000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:35.710000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:35.766189 kernel: audit: type=1400 audit(1757727515.710:762): avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:35.766303 kernel: Failed to create system directory netfs Sep 13 01:38:35.766331 kernel: audit: type=1400 audit(1757727515.710:762): avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:35.710000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:35.790417 kernel: Failed to create system directory netfs Sep 13 01:38:35.790527 kernel: audit: type=1400 audit(1757727515.710:762): avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:35.710000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:35.710000 audit[3398]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaada4a25e0 a1=12c14 a2=aaaab00ce028 a3=aaaada493010 items=0 ppid=555 pid=3398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:35.836113 kernel: audit: type=1300 audit(1757727515.710:762): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaada4a25e0 a1=12c14 a2=aaaab00ce028 a3=aaaada493010 items=0 ppid=555 pid=3398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:35.710000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 01:38:35.845772 kernel: audit: type=1327 audit(1757727515.710:762): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 01:38:35.857000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:35.890145 kernel: Failed to create system directory fscache Sep 13 01:38:35.890234 kernel: audit: type=1400 audit(1757727515.857:763): avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:35.890274 kernel: Failed to create system directory fscache Sep 13 01:38:35.890297 kernel: audit: type=1400 audit(1757727515.857:763): avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:35.857000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:35.914839 kernel: Failed to create system directory fscache Sep 13 01:38:35.914938 kernel: audit: type=1400 audit(1757727515.857:763): avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:35.857000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:35.939474 kernel: Failed to create system directory fscache Sep 13 01:38:35.939560 kernel: audit: type=1400 audit(1757727515.857:763): avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:35.857000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:35.959879 kernel: Failed to create system directory fscache Sep 13 01:38:35.857000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:35.857000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:35.969639 kernel: Failed to create system directory fscache Sep 13 01:38:35.969706 kernel: Failed to create system directory fscache Sep 13 01:38:35.857000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:35.857000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:35.979129 kernel: Failed to create system directory fscache Sep 13 01:38:35.979188 kernel: Failed to create system directory fscache Sep 13 01:38:35.857000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:35.857000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:35.988082 kernel: Failed to create system directory fscache Sep 13 01:38:35.988160 kernel: Failed to create system directory fscache Sep 13 01:38:35.857000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:35.857000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:35.997192 kernel: Failed to create system directory fscache Sep 13 01:38:35.857000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.002183 kernel: Failed to create system directory fscache Sep 13 01:38:36.002281 kernel: Failed to create system directory fscache Sep 13 01:38:35.857000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.010065 kernel: FS-Cache: Loaded Sep 13 01:38:35.857000 audit[3398]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaada6b5210 a1=4c344 a2=aaaab00ce028 a3=aaaada493010 items=0 ppid=555 pid=3398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:35.857000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.157405 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.157506 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.157548 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.167186 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.167265 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.176486 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.176557 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.184843 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.184907 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.193438 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.197494 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.197527 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.206004 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.206069 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.214187 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.214245 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.222194 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.222299 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.230445 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.230513 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.238347 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.238394 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.245674 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.245743 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.253244 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.257418 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.257464 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.264918 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.264975 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.272442 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.272490 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.280129 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.280200 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.287565 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.287623 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.296041 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.296104 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.303658 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.303712 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.311911 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.311992 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.319546 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.323284 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.323358 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.327371 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.334856 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.334928 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.342723 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.342825 kubelet[1979]: E0913 01:38:36.342782 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.346950 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.347073 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.354787 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.358781 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.363139 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.367236 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.367287 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.375278 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.375322 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.382746 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.382798 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.390132 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.390201 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.397210 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.397367 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.404977 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.405036 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.412561 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.416553 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.416607 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.424106 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.424143 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.431445 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.431530 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.439302 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.439366 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.446590 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.446647 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.454103 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.454173 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.461551 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.461615 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.470791 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.470847 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.478050 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.478107 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.485645 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.485682 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.492733 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.492779 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.500077 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.500143 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.506964 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.507003 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.513981 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.514031 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.521631 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.525548 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.525634 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.532996 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.533047 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.540491 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.540534 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.548270 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.548365 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.555988 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.556045 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.563446 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.563521 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.567070 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.574595 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.578626 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.578675 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.586040 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.586095 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.594425 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.598886 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.598931 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.607549 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.607605 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.616425 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.616485 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.625024 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.625076 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.634452 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.634514 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.642966 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.643076 kernel: Failed to create system directory sunrpc Sep 13 01:38:36.141000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:36.660626 kernel: RPC: Registered named UNIX socket transport module. Sep 13 01:38:36.660717 kernel: RPC: Registered udp transport module. Sep 13 01:38:36.660755 kernel: RPC: Registered tcp transport module. Sep 13 01:38:36.670252 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Sep 13 01:38:36.141000 audit[3398]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaada701560 a1=14a804 a2=aaaab00ce028 a3=aaaada493010 items=6 ppid=555 pid=3398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:36.141000 audit: CWD cwd="/" Sep 13 01:38:36.141000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:38:36.141000 audit: PATH item=1 name=(null) inode=21365 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:38:36.141000 audit: PATH item=2 name=(null) inode=21365 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:38:36.141000 audit: PATH item=3 name=(null) inode=21366 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:38:36.141000 audit: PATH item=4 name=(null) inode=21365 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:38:36.141000 audit: PATH item=5 name=(null) inode=21367 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:38:36.141000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.063835 kernel: Failed to create system directory nfs Sep 13 01:38:37.063902 kernel: Failed to create system directory nfs Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.067981 kernel: Failed to create system directory nfs Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.071564 kernel: Failed to create system directory nfs Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.075117 kernel: Failed to create system directory nfs Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.078674 kernel: Failed to create system directory nfs Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.082175 kernel: Failed to create system directory nfs Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.085593 kernel: Failed to create system directory nfs Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.089076 kernel: Failed to create system directory nfs Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.092426 kernel: Failed to create system directory nfs Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.095813 kernel: Failed to create system directory nfs Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.099348 kernel: Failed to create system directory nfs Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.102692 kernel: Failed to create system directory nfs Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.106516 kernel: Failed to create system directory nfs Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.110227 kernel: Failed to create system directory nfs Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.114299 kernel: Failed to create system directory nfs Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.121328 kernel: Failed to create system directory nfs Sep 13 01:38:37.121381 kernel: Failed to create system directory nfs Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.124657 kernel: Failed to create system directory nfs Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.128220 kernel: Failed to create system directory nfs Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.131844 kernel: Failed to create system directory nfs Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.135427 kernel: Failed to create system directory nfs Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.138905 kernel: Failed to create system directory nfs Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.142366 kernel: Failed to create system directory nfs Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.145720 kernel: Failed to create system directory nfs Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.149261 kernel: Failed to create system directory nfs Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.156037 kernel: Failed to create system directory nfs Sep 13 01:38:37.156067 kernel: Failed to create system directory nfs Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.159552 kernel: Failed to create system directory nfs Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.163393 kernel: Failed to create system directory nfs Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.167112 kernel: Failed to create system directory nfs Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.170605 kernel: Failed to create system directory nfs Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.173925 kernel: Failed to create system directory nfs Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.178160 kernel: Failed to create system directory nfs Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.181516 kernel: Failed to create system directory nfs Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.185013 kernel: Failed to create system directory nfs Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.188480 kernel: Failed to create system directory nfs Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.191766 kernel: Failed to create system directory nfs Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.195367 kernel: Failed to create system directory nfs Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.198723 kernel: Failed to create system directory nfs Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.202246 kernel: Failed to create system directory nfs Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.209323 kernel: Failed to create system directory nfs Sep 13 01:38:37.209374 kernel: Failed to create system directory nfs Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.212774 kernel: Failed to create system directory nfs Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.216295 kernel: Failed to create system directory nfs Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.220178 kernel: Failed to create system directory nfs Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.223608 kernel: Failed to create system directory nfs Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.227107 kernel: Failed to create system directory nfs Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.231241 kernel: Failed to create system directory nfs Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.238204 kernel: Failed to create system directory nfs Sep 13 01:38:37.238304 kernel: Failed to create system directory nfs Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.245842 kernel: Failed to create system directory nfs Sep 13 01:38:37.245881 kernel: Failed to create system directory nfs Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.249411 kernel: Failed to create system directory nfs Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.252830 kernel: Failed to create system directory nfs Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.256656 kernel: Failed to create system directory nfs Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.260098 kernel: Failed to create system directory nfs Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.263563 kernel: Failed to create system directory nfs Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.267028 kernel: Failed to create system directory nfs Sep 13 01:38:37.051000 audit[3398]: AVC avc: denied { confidentiality } for pid=3398 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.271124 kernel: Failed to create system directory nfs Sep 13 01:38:37.290404 kernel: FS-Cache: Netfs 'nfs' registered for caching Sep 13 01:38:37.051000 audit[3398]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaada8aab50 a1=116324 a2=aaaab00ce028 a3=aaaada493010 items=0 ppid=555 pid=3398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:37.051000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 01:38:37.343875 kubelet[1979]: E0913 01:38:37.343776 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.449899 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.449944 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.453367 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.456967 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.457006 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.464481 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.467830 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.467873 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.474814 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.478700 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.482385 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.482430 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.489257 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.489300 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.496432 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.496501 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.504216 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.504268 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.511973 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.512022 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.515496 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.522571 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.522600 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.530108 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.530153 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.537328 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.537411 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.544843 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.544886 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.549383 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.556781 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.556826 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.563792 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.563836 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.570753 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.570802 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.577813 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.581626 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.581688 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.589154 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.589199 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.596301 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.596446 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.599868 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.603515 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.610920 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.610977 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.618223 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.618295 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.621944 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.629297 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.633410 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.633457 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.640417 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.640469 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.647602 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.647647 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.654739 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.654788 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.658203 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.661713 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.665384 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.672309 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.672364 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.679229 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.679286 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.686974 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.687049 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.690633 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.698315 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.698375 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.705747 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.705793 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.712889 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.712941 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.719887 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.719933 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.726938 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.726996 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.730493 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.741302 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.741393 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.741440 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.748306 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.748341 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.751757 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.758975 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.759023 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.766404 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.766465 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.773796 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.773877 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.781117 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.781147 kernel: Failed to create system directory nfs4 Sep 13 01:38:37.436000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:37.891232 kernel: NFS: Registering the id_resolver key type Sep 13 01:38:37.891380 kernel: Key type id_resolver registered Sep 13 01:38:37.895202 kernel: Key type id_legacy registered Sep 13 01:38:37.436000 audit[3403]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff9d74a010 a1=19c744 a2=aaaac892e028 a3=aaaada611010 items=0 ppid=555 pid=3403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:37.436000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Sep 13 01:38:38.072000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:38.072000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:38.083214 kernel: Failed to create system directory rpcgss Sep 13 01:38:38.083289 kernel: Failed to create system directory rpcgss Sep 13 01:38:38.083318 kernel: Failed to create system directory rpcgss Sep 13 01:38:38.072000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:38.072000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:38.090972 kernel: Failed to create system directory rpcgss Sep 13 01:38:38.091007 kernel: Failed to create system directory rpcgss Sep 13 01:38:38.072000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:38.072000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:38.098472 kernel: Failed to create system directory rpcgss Sep 13 01:38:38.072000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:38.102701 kernel: Failed to create system directory rpcgss Sep 13 01:38:38.102751 kernel: Failed to create system directory rpcgss Sep 13 01:38:38.072000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:38.072000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:38.110901 kernel: Failed to create system directory rpcgss Sep 13 01:38:38.110949 kernel: Failed to create system directory rpcgss Sep 13 01:38:38.072000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:38.072000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:38.118652 kernel: Failed to create system directory rpcgss Sep 13 01:38:38.118730 kernel: Failed to create system directory rpcgss Sep 13 01:38:38.072000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:38.072000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:38.126914 kernel: Failed to create system directory rpcgss Sep 13 01:38:38.126968 kernel: Failed to create system directory rpcgss Sep 13 01:38:38.072000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:38.072000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:38.135027 kernel: Failed to create system directory rpcgss Sep 13 01:38:38.135091 kernel: Failed to create system directory rpcgss Sep 13 01:38:38.072000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:38.139304 kernel: Failed to create system directory rpcgss Sep 13 01:38:38.072000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:38.072000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:38.146772 kernel: Failed to create system directory rpcgss Sep 13 01:38:38.146874 kernel: Failed to create system directory rpcgss Sep 13 01:38:38.072000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:38.072000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:38.154986 kernel: Failed to create system directory rpcgss Sep 13 01:38:38.155046 kernel: Failed to create system directory rpcgss Sep 13 01:38:38.072000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:38.072000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:38.163102 kernel: Failed to create system directory rpcgss Sep 13 01:38:38.163163 kernel: Failed to create system directory rpcgss Sep 13 01:38:38.072000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:38.072000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:38.170972 kernel: Failed to create system directory rpcgss Sep 13 01:38:38.171006 kernel: Failed to create system directory rpcgss Sep 13 01:38:38.072000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:38.072000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:38:38.178518 kernel: Failed to create system directory rpcgss Sep 13 01:38:38.072000 audit[3405]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffffb1ed2010 a1=5eedc a2=aaaabd74e028 a3=aaaae8f51010 items=0 ppid=555 pid=3405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:38.072000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Sep 13 01:38:38.275124 kubelet[1979]: E0913 01:38:38.275072 1979 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:38.344738 kubelet[1979]: E0913 01:38:38.344696 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:38.840004 nfsidmap[3411]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.8-n-94f5c418a3' Sep 13 01:38:38.849704 nfsidmap[3412]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.8-n-94f5c418a3' Sep 13 01:38:38.859000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2917 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 01:38:38.859000 audit[1585]: AVC avc: denied { watch_reads } for pid=1585 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2917 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 01:38:38.859000 audit[1585]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaab01a752a0 a2=10 a3=0 items=0 ppid=1 pid=1585 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:38.859000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2917 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 01:38:38.859000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 13 01:38:38.862000 audit[1585]: AVC avc: denied { watch_reads } for pid=1585 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2917 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 01:38:38.862000 audit[1585]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaab01a752a0 a2=10 a3=0 items=0 ppid=1 pid=1585 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:38.862000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 13 01:38:38.971696 env[1478]: time="2025-09-13T01:38:38.971656245Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:1fed7fa5-0885-46bf-b156-516c47b928d9,Namespace:default,Attempt:0,}" Sep 13 01:38:39.109693 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 01:38:39.109801 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Sep 13 01:38:39.100100 systemd-networkd[1645]: cali5ec59c6bf6e: Link UP Sep 13 01:38:39.110448 systemd-networkd[1645]: cali5ec59c6bf6e: Gained carrier Sep 13 01:38:39.130844 env[1478]: 2025-09-13 01:38:39.033 [INFO][3413] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.13-k8s-test--pod--1-eth0 default 1fed7fa5-0885-46bf-b156-516c47b928d9 1913 0 2025-09-13 01:38:06 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.13 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="d824e41dabdac2ccbf0e231eaba5365b5c385aa111924da19d2dd65d284a6224" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.13-k8s-test--pod--1-" Sep 13 01:38:39.130844 env[1478]: 2025-09-13 01:38:39.033 [INFO][3413] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="d824e41dabdac2ccbf0e231eaba5365b5c385aa111924da19d2dd65d284a6224" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.13-k8s-test--pod--1-eth0" Sep 13 01:38:39.130844 env[1478]: 2025-09-13 01:38:39.055 [INFO][3425] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d824e41dabdac2ccbf0e231eaba5365b5c385aa111924da19d2dd65d284a6224" HandleID="k8s-pod-network.d824e41dabdac2ccbf0e231eaba5365b5c385aa111924da19d2dd65d284a6224" Workload="10.200.20.13-k8s-test--pod--1-eth0" Sep 13 01:38:39.130844 env[1478]: 2025-09-13 01:38:39.056 [INFO][3425] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d824e41dabdac2ccbf0e231eaba5365b5c385aa111924da19d2dd65d284a6224" HandleID="k8s-pod-network.d824e41dabdac2ccbf0e231eaba5365b5c385aa111924da19d2dd65d284a6224" Workload="10.200.20.13-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d2ff0), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.13", "pod":"test-pod-1", "timestamp":"2025-09-13 01:38:39.055928639 +0000 UTC"}, Hostname:"10.200.20.13", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 01:38:39.130844 env[1478]: 2025-09-13 01:38:39.056 [INFO][3425] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 01:38:39.130844 env[1478]: 2025-09-13 01:38:39.056 [INFO][3425] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 01:38:39.130844 env[1478]: 2025-09-13 01:38:39.056 [INFO][3425] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.13' Sep 13 01:38:39.130844 env[1478]: 2025-09-13 01:38:39.065 [INFO][3425] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.d824e41dabdac2ccbf0e231eaba5365b5c385aa111924da19d2dd65d284a6224" host="10.200.20.13" Sep 13 01:38:39.130844 env[1478]: 2025-09-13 01:38:39.070 [INFO][3425] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.20.13" Sep 13 01:38:39.130844 env[1478]: 2025-09-13 01:38:39.074 [INFO][3425] ipam/ipam.go 511: Trying affinity for 192.168.98.64/26 host="10.200.20.13" Sep 13 01:38:39.130844 env[1478]: 2025-09-13 01:38:39.075 [INFO][3425] ipam/ipam.go 158: Attempting to load block cidr=192.168.98.64/26 host="10.200.20.13" Sep 13 01:38:39.130844 env[1478]: 2025-09-13 01:38:39.079 [INFO][3425] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.98.64/26 host="10.200.20.13" Sep 13 01:38:39.130844 env[1478]: 2025-09-13 01:38:39.079 [INFO][3425] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.98.64/26 handle="k8s-pod-network.d824e41dabdac2ccbf0e231eaba5365b5c385aa111924da19d2dd65d284a6224" host="10.200.20.13" Sep 13 01:38:39.130844 env[1478]: 2025-09-13 01:38:39.080 [INFO][3425] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.d824e41dabdac2ccbf0e231eaba5365b5c385aa111924da19d2dd65d284a6224 Sep 13 01:38:39.130844 env[1478]: 2025-09-13 01:38:39.085 [INFO][3425] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.98.64/26 handle="k8s-pod-network.d824e41dabdac2ccbf0e231eaba5365b5c385aa111924da19d2dd65d284a6224" host="10.200.20.13" Sep 13 01:38:39.130844 env[1478]: 2025-09-13 01:38:39.095 [INFO][3425] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.98.68/26] block=192.168.98.64/26 handle="k8s-pod-network.d824e41dabdac2ccbf0e231eaba5365b5c385aa111924da19d2dd65d284a6224" host="10.200.20.13" Sep 13 01:38:39.130844 env[1478]: 2025-09-13 01:38:39.095 [INFO][3425] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.98.68/26] handle="k8s-pod-network.d824e41dabdac2ccbf0e231eaba5365b5c385aa111924da19d2dd65d284a6224" host="10.200.20.13" Sep 13 01:38:39.130844 env[1478]: 2025-09-13 01:38:39.095 [INFO][3425] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 01:38:39.130844 env[1478]: 2025-09-13 01:38:39.095 [INFO][3425] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.98.68/26] IPv6=[] ContainerID="d824e41dabdac2ccbf0e231eaba5365b5c385aa111924da19d2dd65d284a6224" HandleID="k8s-pod-network.d824e41dabdac2ccbf0e231eaba5365b5c385aa111924da19d2dd65d284a6224" Workload="10.200.20.13-k8s-test--pod--1-eth0" Sep 13 01:38:39.130844 env[1478]: 2025-09-13 01:38:39.098 [INFO][3413] cni-plugin/k8s.go 418: Populated endpoint ContainerID="d824e41dabdac2ccbf0e231eaba5365b5c385aa111924da19d2dd65d284a6224" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.13-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.13-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"1fed7fa5-0885-46bf-b156-516c47b928d9", ResourceVersion:"1913", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 1, 38, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.13", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.98.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 01:38:39.131505 env[1478]: 2025-09-13 01:38:39.098 [INFO][3413] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.98.68/32] ContainerID="d824e41dabdac2ccbf0e231eaba5365b5c385aa111924da19d2dd65d284a6224" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.13-k8s-test--pod--1-eth0" Sep 13 01:38:39.131505 env[1478]: 2025-09-13 01:38:39.098 [INFO][3413] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="d824e41dabdac2ccbf0e231eaba5365b5c385aa111924da19d2dd65d284a6224" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.13-k8s-test--pod--1-eth0" Sep 13 01:38:39.131505 env[1478]: 2025-09-13 01:38:39.110 [INFO][3413] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d824e41dabdac2ccbf0e231eaba5365b5c385aa111924da19d2dd65d284a6224" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.13-k8s-test--pod--1-eth0" Sep 13 01:38:39.131505 env[1478]: 2025-09-13 01:38:39.111 [INFO][3413] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="d824e41dabdac2ccbf0e231eaba5365b5c385aa111924da19d2dd65d284a6224" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.13-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.13-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"1fed7fa5-0885-46bf-b156-516c47b928d9", ResourceVersion:"1913", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 1, 38, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.13", ContainerID:"d824e41dabdac2ccbf0e231eaba5365b5c385aa111924da19d2dd65d284a6224", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.98.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"6e:87:e1:02:b1:bd", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 01:38:39.131505 env[1478]: 2025-09-13 01:38:39.126 [INFO][3413] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="d824e41dabdac2ccbf0e231eaba5365b5c385aa111924da19d2dd65d284a6224" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.13-k8s-test--pod--1-eth0" Sep 13 01:38:39.138000 audit[3440]: NETFILTER_CFG table=filter:81 family=2 entries=46 op=nft_register_chain pid=3440 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 01:38:39.138000 audit[3440]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=23188 a0=3 a1=ffffc6ffa970 a2=0 a3=ffff9dd54fa8 items=0 ppid=2609 pid=3440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:39.138000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 01:38:39.148705 env[1478]: time="2025-09-13T01:38:39.148630725Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 01:38:39.148852 env[1478]: time="2025-09-13T01:38:39.148675485Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 01:38:39.148852 env[1478]: time="2025-09-13T01:38:39.148685685Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 01:38:39.148965 env[1478]: time="2025-09-13T01:38:39.148876005Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d824e41dabdac2ccbf0e231eaba5365b5c385aa111924da19d2dd65d284a6224 pid=3447 runtime=io.containerd.runc.v2 Sep 13 01:38:39.163678 systemd[1]: Started cri-containerd-d824e41dabdac2ccbf0e231eaba5365b5c385aa111924da19d2dd65d284a6224.scope. Sep 13 01:38:39.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.174000 audit: BPF prog-id=124 op=LOAD Sep 13 01:38:39.174000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.174000 audit[3459]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=3447 pid=3459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:39.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438323465343164616264616332636362663065323331656162613533 Sep 13 01:38:39.174000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.174000 audit[3459]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3447 pid=3459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:39.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438323465343164616264616332636362663065323331656162613533 Sep 13 01:38:39.174000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.174000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.174000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.174000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.174000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.174000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.174000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.174000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.174000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.174000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.174000 audit: BPF prog-id=125 op=LOAD Sep 13 01:38:39.174000 audit[3459]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3447 pid=3459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:39.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438323465343164616264616332636362663065323331656162613533 Sep 13 01:38:39.175000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.175000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.175000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.175000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.175000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.175000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.175000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.175000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.175000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.175000 audit: BPF prog-id=126 op=LOAD Sep 13 01:38:39.175000 audit[3459]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3447 pid=3459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:39.175000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438323465343164616264616332636362663065323331656162613533 Sep 13 01:38:39.175000 audit: BPF prog-id=126 op=UNLOAD Sep 13 01:38:39.175000 audit: BPF prog-id=125 op=UNLOAD Sep 13 01:38:39.175000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.175000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.175000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.175000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.175000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.175000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.175000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.175000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.175000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.175000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.175000 audit: BPF prog-id=127 op=LOAD Sep 13 01:38:39.175000 audit[3459]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3447 pid=3459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:39.175000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438323465343164616264616332636362663065323331656162613533 Sep 13 01:38:39.194950 env[1478]: time="2025-09-13T01:38:39.194903667Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:1fed7fa5-0885-46bf-b156-516c47b928d9,Namespace:default,Attempt:0,} returns sandbox id \"d824e41dabdac2ccbf0e231eaba5365b5c385aa111924da19d2dd65d284a6224\"" Sep 13 01:38:39.196548 env[1478]: time="2025-09-13T01:38:39.196510869Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Sep 13 01:38:39.344918 kubelet[1979]: E0913 01:38:39.344838 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:39.533901 env[1478]: time="2025-09-13T01:38:39.533844006Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:38:39.540822 env[1478]: time="2025-09-13T01:38:39.540778696Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:9fddf21fd9c2634e7bf6e633e36b0fb227f6cd5fbe1b3334a16de3ab50f31e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:38:39.545499 env[1478]: time="2025-09-13T01:38:39.545465902Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:38:39.549717 env[1478]: time="2025-09-13T01:38:39.549673548Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:883ca821a91fc20bcde818eeee4e1ed55ef63a020d6198ecd5a03af5a4eac530,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:38:39.550467 env[1478]: time="2025-09-13T01:38:39.550439589Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:9fddf21fd9c2634e7bf6e633e36b0fb227f6cd5fbe1b3334a16de3ab50f31e5e\"" Sep 13 01:38:39.553291 env[1478]: time="2025-09-13T01:38:39.553258313Z" level=info msg="CreateContainer within sandbox \"d824e41dabdac2ccbf0e231eaba5365b5c385aa111924da19d2dd65d284a6224\" for container &ContainerMetadata{Name:test,Attempt:0,}" Sep 13 01:38:39.586962 env[1478]: time="2025-09-13T01:38:39.586874918Z" level=info msg="CreateContainer within sandbox \"d824e41dabdac2ccbf0e231eaba5365b5c385aa111924da19d2dd65d284a6224\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"1c5f649287d395a9ab94088ca76933de68c1187d310d3960b6d143d243318059\"" Sep 13 01:38:39.587867 env[1478]: time="2025-09-13T01:38:39.587815799Z" level=info msg="StartContainer for \"1c5f649287d395a9ab94088ca76933de68c1187d310d3960b6d143d243318059\"" Sep 13 01:38:39.606424 systemd[1]: Started cri-containerd-1c5f649287d395a9ab94088ca76933de68c1187d310d3960b6d143d243318059.scope. Sep 13 01:38:39.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.618000 audit: BPF prog-id=128 op=LOAD Sep 13 01:38:39.619000 audit[3493]: AVC avc: denied { bpf } for pid=3493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.619000 audit[3493]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3447 pid=3493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:39.619000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163356636343932383764333935613961623934303838636137363933 Sep 13 01:38:39.619000 audit[3493]: AVC avc: denied { perfmon } for pid=3493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.619000 audit[3493]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3447 pid=3493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:39.619000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163356636343932383764333935613961623934303838636137363933 Sep 13 01:38:39.619000 audit[3493]: AVC avc: denied { bpf } for pid=3493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.619000 audit[3493]: AVC avc: denied { bpf } for pid=3493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.619000 audit[3493]: AVC avc: denied { bpf } for pid=3493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.619000 audit[3493]: AVC avc: denied { perfmon } for pid=3493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.619000 audit[3493]: AVC avc: denied { perfmon } for pid=3493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.619000 audit[3493]: AVC avc: denied { perfmon } for pid=3493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.619000 audit[3493]: AVC avc: denied { perfmon } for pid=3493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.619000 audit[3493]: AVC avc: denied { perfmon } for pid=3493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.619000 audit[3493]: AVC avc: denied { bpf } for pid=3493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.619000 audit[3493]: AVC avc: denied { bpf } for pid=3493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.619000 audit: BPF prog-id=129 op=LOAD Sep 13 01:38:39.619000 audit[3493]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3447 pid=3493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:39.619000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163356636343932383764333935613961623934303838636137363933 Sep 13 01:38:39.620000 audit[3493]: AVC avc: denied { bpf } for pid=3493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.620000 audit[3493]: AVC avc: denied { bpf } for pid=3493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.620000 audit[3493]: AVC avc: denied { perfmon } for pid=3493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.620000 audit[3493]: AVC avc: denied { perfmon } for pid=3493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.620000 audit[3493]: AVC avc: denied { perfmon } for pid=3493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.620000 audit[3493]: AVC avc: denied { perfmon } for pid=3493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.620000 audit[3493]: AVC avc: denied { perfmon } for pid=3493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.620000 audit[3493]: AVC avc: denied { bpf } for pid=3493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.620000 audit[3493]: AVC avc: denied { bpf } for pid=3493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.620000 audit: BPF prog-id=130 op=LOAD Sep 13 01:38:39.620000 audit[3493]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3447 pid=3493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:39.620000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163356636343932383764333935613961623934303838636137363933 Sep 13 01:38:39.621000 audit: BPF prog-id=130 op=UNLOAD Sep 13 01:38:39.621000 audit: BPF prog-id=129 op=UNLOAD Sep 13 01:38:39.621000 audit[3493]: AVC avc: denied { bpf } for pid=3493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.621000 audit[3493]: AVC avc: denied { bpf } for pid=3493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.621000 audit[3493]: AVC avc: denied { bpf } for pid=3493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.621000 audit[3493]: AVC avc: denied { perfmon } for pid=3493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.621000 audit[3493]: AVC avc: denied { perfmon } for pid=3493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.621000 audit[3493]: AVC avc: denied { perfmon } for pid=3493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.621000 audit[3493]: AVC avc: denied { perfmon } for pid=3493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.621000 audit[3493]: AVC avc: denied { perfmon } for pid=3493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.621000 audit[3493]: AVC avc: denied { bpf } for pid=3493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.621000 audit[3493]: AVC avc: denied { bpf } for pid=3493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:38:39.621000 audit: BPF prog-id=131 op=LOAD Sep 13 01:38:39.621000 audit[3493]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3447 pid=3493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:38:39.621000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163356636343932383764333935613961623934303838636137363933 Sep 13 01:38:39.640412 env[1478]: time="2025-09-13T01:38:39.640362951Z" level=info msg="StartContainer for \"1c5f649287d395a9ab94088ca76933de68c1187d310d3960b6d143d243318059\" returns successfully" Sep 13 01:38:39.705535 kubelet[1979]: I0913 01:38:39.705471 1979 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=33.349428037 podStartE2EDuration="33.705452999s" podCreationTimestamp="2025-09-13 01:38:06 +0000 UTC" firstStartedPulling="2025-09-13 01:38:39.195878189 +0000 UTC m=+81.845217826" lastFinishedPulling="2025-09-13 01:38:39.551903151 +0000 UTC m=+82.201242788" observedRunningTime="2025-09-13 01:38:39.705223918 +0000 UTC m=+82.354563555" watchObservedRunningTime="2025-09-13 01:38:39.705452999 +0000 UTC m=+82.354792636" Sep 13 01:38:40.311556 systemd-networkd[1645]: cali5ec59c6bf6e: Gained IPv6LL Sep 13 01:38:40.345946 kubelet[1979]: E0913 01:38:40.345906 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:41.346885 kubelet[1979]: E0913 01:38:41.346847 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:42.347840 kubelet[1979]: E0913 01:38:42.347802 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:43.347916 kubelet[1979]: E0913 01:38:43.347882 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:44.348531 kubelet[1979]: E0913 01:38:44.348500 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:44.545098 systemd[1]: run-containerd-runc-k8s.io-1dff9a187ce82f59bbe29e41335aed17899c68c59f7272e931e003d36926858e-runc.FB8k9C.mount: Deactivated successfully. Sep 13 01:38:45.349249 kubelet[1979]: E0913 01:38:45.349097 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:46.350371 kubelet[1979]: E0913 01:38:46.350323 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:38:47.351724 kubelet[1979]: E0913 01:38:47.351675 1979 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"