Sep 13 01:33:39.026609 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Sep 13 01:33:39.026628 kernel: Linux version 5.15.192-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Sep 12 23:05:37 -00 2025 Sep 13 01:33:39.026635 kernel: earlycon: pl11 at MMIO 0x00000000effec000 (options '') Sep 13 01:33:39.026642 kernel: printk: bootconsole [pl11] enabled Sep 13 01:33:39.026647 kernel: efi: EFI v2.70 by EDK II Sep 13 01:33:39.026652 kernel: efi: ACPI 2.0=0x3fd5f018 SMBIOS=0x3e580000 SMBIOS 3.0=0x3e560000 MEMATTR=0x3f214018 RNG=0x3fd5f998 MEMRESERVE=0x3761cf98 Sep 13 01:33:39.026659 kernel: random: crng init done Sep 13 01:33:39.026664 kernel: ACPI: Early table checksum verification disabled Sep 13 01:33:39.026669 kernel: ACPI: RSDP 0x000000003FD5F018 000024 (v02 VRTUAL) Sep 13 01:33:39.026675 kernel: ACPI: XSDT 0x000000003FD5FF18 00006C (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 01:33:39.026680 kernel: ACPI: FACP 0x000000003FD5FC18 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 01:33:39.026685 kernel: ACPI: DSDT 0x000000003FD41018 01DFCD (v02 MSFTVM DSDT01 00000001 INTL 20230628) Sep 13 01:33:39.026692 kernel: ACPI: DBG2 0x000000003FD5FB18 000072 (v00 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 01:33:39.026698 kernel: ACPI: GTDT 0x000000003FD5FD98 000060 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 01:33:39.026704 kernel: ACPI: OEM0 0x000000003FD5F098 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 01:33:39.026710 kernel: ACPI: SPCR 0x000000003FD5FA98 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 01:33:39.026716 kernel: ACPI: APIC 0x000000003FD5F818 0000FC (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 01:33:39.026723 kernel: ACPI: SRAT 0x000000003FD5F198 000234 (v03 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 01:33:39.026729 kernel: ACPI: PPTT 0x000000003FD5F418 000120 (v01 VRTUAL MICROSFT 00000000 MSFT 00000000) Sep 13 01:33:39.026734 kernel: ACPI: BGRT 0x000000003FD5FE98 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Sep 13 01:33:39.026740 kernel: ACPI: SPCR: console: pl011,mmio32,0xeffec000,115200 Sep 13 01:33:39.026746 kernel: NUMA: Failed to initialise from firmware Sep 13 01:33:39.026751 kernel: NUMA: Faking a node at [mem 0x0000000000000000-0x00000001bfffffff] Sep 13 01:33:39.026757 kernel: NUMA: NODE_DATA [mem 0x1bf7f3900-0x1bf7f8fff] Sep 13 01:33:39.026762 kernel: Zone ranges: Sep 13 01:33:39.026768 kernel: DMA [mem 0x0000000000000000-0x00000000ffffffff] Sep 13 01:33:39.026774 kernel: DMA32 empty Sep 13 01:33:39.026780 kernel: Normal [mem 0x0000000100000000-0x00000001bfffffff] Sep 13 01:33:39.026787 kernel: Movable zone start for each node Sep 13 01:33:39.026792 kernel: Early memory node ranges Sep 13 01:33:39.026798 kernel: node 0: [mem 0x0000000000000000-0x00000000007fffff] Sep 13 01:33:39.026804 kernel: node 0: [mem 0x0000000000824000-0x000000003e54ffff] Sep 13 01:33:39.026809 kernel: node 0: [mem 0x000000003e550000-0x000000003e87ffff] Sep 13 01:33:39.026815 kernel: node 0: [mem 0x000000003e880000-0x000000003fc7ffff] Sep 13 01:33:39.026820 kernel: node 0: [mem 0x000000003fc80000-0x000000003fcfffff] Sep 13 01:33:39.026826 kernel: node 0: [mem 0x000000003fd00000-0x000000003fffffff] Sep 13 01:33:39.026832 kernel: node 0: [mem 0x0000000100000000-0x00000001bfffffff] Sep 13 01:33:39.026837 kernel: Initmem setup node 0 [mem 0x0000000000000000-0x00000001bfffffff] Sep 13 01:33:39.026843 kernel: On node 0, zone DMA: 36 pages in unavailable ranges Sep 13 01:33:39.026849 kernel: psci: probing for conduit method from ACPI. Sep 13 01:33:39.026857 kernel: psci: PSCIv1.1 detected in firmware. Sep 13 01:33:39.026863 kernel: psci: Using standard PSCI v0.2 function IDs Sep 13 01:33:39.026869 kernel: psci: MIGRATE_INFO_TYPE not supported. Sep 13 01:33:39.026875 kernel: psci: SMC Calling Convention v1.4 Sep 13 01:33:39.026881 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x0 -> Node -1 Sep 13 01:33:39.026907 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1 -> Node -1 Sep 13 01:33:39.026914 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 Sep 13 01:33:39.026920 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 Sep 13 01:33:39.026926 kernel: pcpu-alloc: [0] 0 [0] 1 Sep 13 01:33:39.026932 kernel: Detected PIPT I-cache on CPU0 Sep 13 01:33:39.026938 kernel: CPU features: detected: GIC system register CPU interface Sep 13 01:33:39.026944 kernel: CPU features: detected: Hardware dirty bit management Sep 13 01:33:39.026950 kernel: CPU features: detected: Spectre-BHB Sep 13 01:33:39.026956 kernel: CPU features: kernel page table isolation forced ON by KASLR Sep 13 01:33:39.026962 kernel: CPU features: detected: Kernel page table isolation (KPTI) Sep 13 01:33:39.026968 kernel: CPU features: detected: ARM erratum 1418040 Sep 13 01:33:39.026977 kernel: CPU features: detected: ARM erratum 1542419 (kernel portion) Sep 13 01:33:39.026983 kernel: CPU features: detected: SSBS not fully self-synchronizing Sep 13 01:33:39.026989 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1032156 Sep 13 01:33:39.026995 kernel: Policy zone: Normal Sep 13 01:33:39.027002 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=563df7b8a9b19b8c496587ae06f3c3ec1604a5105c3a3f313c9ccaa21d8055ca Sep 13 01:33:39.027009 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Sep 13 01:33:39.027015 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Sep 13 01:33:39.027021 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Sep 13 01:33:39.027027 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Sep 13 01:33:39.027033 kernel: software IO TLB: mapped [mem 0x000000003a550000-0x000000003e550000] (64MB) Sep 13 01:33:39.027040 kernel: Memory: 3986880K/4194160K available (9792K kernel code, 2094K rwdata, 7592K rodata, 36416K init, 777K bss, 207280K reserved, 0K cma-reserved) Sep 13 01:33:39.027047 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Sep 13 01:33:39.027053 kernel: trace event string verifier disabled Sep 13 01:33:39.027059 kernel: rcu: Preemptible hierarchical RCU implementation. Sep 13 01:33:39.027065 kernel: rcu: RCU event tracing is enabled. Sep 13 01:33:39.027072 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Sep 13 01:33:39.027078 kernel: Trampoline variant of Tasks RCU enabled. Sep 13 01:33:39.027084 kernel: Tracing variant of Tasks RCU enabled. Sep 13 01:33:39.027090 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Sep 13 01:33:39.027096 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Sep 13 01:33:39.027102 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Sep 13 01:33:39.027108 kernel: GICv3: 960 SPIs implemented Sep 13 01:33:39.027115 kernel: GICv3: 0 Extended SPIs implemented Sep 13 01:33:39.027121 kernel: GICv3: Distributor has no Range Selector support Sep 13 01:33:39.027127 kernel: Root IRQ handler: gic_handle_irq Sep 13 01:33:39.027133 kernel: GICv3: 16 PPIs implemented Sep 13 01:33:39.027139 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000effee000 Sep 13 01:33:39.027145 kernel: ITS: No ITS available, not enabling LPIs Sep 13 01:33:39.027152 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Sep 13 01:33:39.027158 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Sep 13 01:33:39.027164 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Sep 13 01:33:39.027170 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Sep 13 01:33:39.027177 kernel: Console: colour dummy device 80x25 Sep 13 01:33:39.027184 kernel: printk: console [tty1] enabled Sep 13 01:33:39.027190 kernel: ACPI: Core revision 20210730 Sep 13 01:33:39.027197 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Sep 13 01:33:39.027203 kernel: pid_max: default: 32768 minimum: 301 Sep 13 01:33:39.027209 kernel: LSM: Security Framework initializing Sep 13 01:33:39.027215 kernel: SELinux: Initializing. Sep 13 01:33:39.027222 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Sep 13 01:33:39.027228 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Sep 13 01:33:39.027234 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3a8030, hints 0xe, misc 0x31e1 Sep 13 01:33:39.027242 kernel: Hyper-V: Host Build 10.0.22477.1619-1-0 Sep 13 01:33:39.027248 kernel: rcu: Hierarchical SRCU implementation. Sep 13 01:33:39.027254 kernel: Remapping and enabling EFI services. Sep 13 01:33:39.027261 kernel: smp: Bringing up secondary CPUs ... Sep 13 01:33:39.027267 kernel: Detected PIPT I-cache on CPU1 Sep 13 01:33:39.027273 kernel: GICv3: CPU1: found redistributor 1 region 1:0x00000000f000e000 Sep 13 01:33:39.027280 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Sep 13 01:33:39.027286 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Sep 13 01:33:39.027292 kernel: smp: Brought up 1 node, 2 CPUs Sep 13 01:33:39.027298 kernel: SMP: Total of 2 processors activated. Sep 13 01:33:39.027305 kernel: CPU features: detected: 32-bit EL0 Support Sep 13 01:33:39.027312 kernel: CPU features: detected: Instruction cache invalidation not required for I/D coherence Sep 13 01:33:39.027318 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Sep 13 01:33:39.027325 kernel: CPU features: detected: CRC32 instructions Sep 13 01:33:39.027331 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Sep 13 01:33:39.027337 kernel: CPU features: detected: LSE atomic instructions Sep 13 01:33:39.027343 kernel: CPU features: detected: Privileged Access Never Sep 13 01:33:39.027349 kernel: CPU: All CPU(s) started at EL1 Sep 13 01:33:39.027356 kernel: alternatives: patching kernel code Sep 13 01:33:39.027363 kernel: devtmpfs: initialized Sep 13 01:33:39.027374 kernel: KASLR enabled Sep 13 01:33:39.027381 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Sep 13 01:33:39.027388 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Sep 13 01:33:39.027395 kernel: pinctrl core: initialized pinctrl subsystem Sep 13 01:33:39.027401 kernel: SMBIOS 3.1.0 present. Sep 13 01:33:39.027408 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 09/28/2024 Sep 13 01:33:39.027414 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Sep 13 01:33:39.027421 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Sep 13 01:33:39.027429 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Sep 13 01:33:39.027436 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Sep 13 01:33:39.027442 kernel: audit: initializing netlink subsys (disabled) Sep 13 01:33:39.027449 kernel: audit: type=2000 audit(0.087:1): state=initialized audit_enabled=0 res=1 Sep 13 01:33:39.027455 kernel: thermal_sys: Registered thermal governor 'step_wise' Sep 13 01:33:39.027462 kernel: cpuidle: using governor menu Sep 13 01:33:39.027468 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Sep 13 01:33:39.027476 kernel: ASID allocator initialised with 32768 entries Sep 13 01:33:39.027483 kernel: ACPI: bus type PCI registered Sep 13 01:33:39.027489 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Sep 13 01:33:39.027496 kernel: Serial: AMBA PL011 UART driver Sep 13 01:33:39.027502 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Sep 13 01:33:39.027509 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Sep 13 01:33:39.027515 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Sep 13 01:33:39.027522 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Sep 13 01:33:39.027529 kernel: cryptd: max_cpu_qlen set to 1000 Sep 13 01:33:39.027536 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Sep 13 01:33:39.027543 kernel: ACPI: Added _OSI(Module Device) Sep 13 01:33:39.027550 kernel: ACPI: Added _OSI(Processor Device) Sep 13 01:33:39.027557 kernel: ACPI: Added _OSI(Processor Aggregator Device) Sep 13 01:33:39.027563 kernel: ACPI: Added _OSI(Linux-Dell-Video) Sep 13 01:33:39.027570 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Sep 13 01:33:39.027577 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Sep 13 01:33:39.027583 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Sep 13 01:33:39.027590 kernel: ACPI: Interpreter enabled Sep 13 01:33:39.027597 kernel: ACPI: Using GIC for interrupt routing Sep 13 01:33:39.027604 kernel: ARMH0011:00: ttyAMA0 at MMIO 0xeffec000 (irq = 12, base_baud = 0) is a SBSA Sep 13 01:33:39.027611 kernel: printk: console [ttyAMA0] enabled Sep 13 01:33:39.027617 kernel: printk: bootconsole [pl11] disabled Sep 13 01:33:39.027624 kernel: ARMH0011:01: ttyAMA1 at MMIO 0xeffeb000 (irq = 13, base_baud = 0) is a SBSA Sep 13 01:33:39.027631 kernel: iommu: Default domain type: Translated Sep 13 01:33:39.027637 kernel: iommu: DMA domain TLB invalidation policy: strict mode Sep 13 01:33:39.027644 kernel: vgaarb: loaded Sep 13 01:33:39.027651 kernel: pps_core: LinuxPPS API ver. 1 registered Sep 13 01:33:39.027657 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Sep 13 01:33:39.027664 kernel: PTP clock support registered Sep 13 01:33:39.027671 kernel: Registered efivars operations Sep 13 01:33:39.027677 kernel: No ACPI PMU IRQ for CPU0 Sep 13 01:33:39.027684 kernel: No ACPI PMU IRQ for CPU1 Sep 13 01:33:39.027690 kernel: clocksource: Switched to clocksource arch_sys_counter Sep 13 01:33:39.027697 kernel: VFS: Disk quotas dquot_6.6.0 Sep 13 01:33:39.027704 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Sep 13 01:33:39.027710 kernel: pnp: PnP ACPI init Sep 13 01:33:39.027716 kernel: pnp: PnP ACPI: found 0 devices Sep 13 01:33:39.027724 kernel: NET: Registered PF_INET protocol family Sep 13 01:33:39.027731 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Sep 13 01:33:39.027738 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Sep 13 01:33:39.027744 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Sep 13 01:33:39.027751 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Sep 13 01:33:39.027757 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Sep 13 01:33:39.027764 kernel: TCP: Hash tables configured (established 32768 bind 32768) Sep 13 01:33:39.027771 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Sep 13 01:33:39.027779 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Sep 13 01:33:39.027786 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Sep 13 01:33:39.027792 kernel: PCI: CLS 0 bytes, default 64 Sep 13 01:33:39.027799 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 1 counters available Sep 13 01:33:39.027805 kernel: kvm [1]: HYP mode not available Sep 13 01:33:39.027812 kernel: Initialise system trusted keyrings Sep 13 01:33:39.027818 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Sep 13 01:33:39.027825 kernel: Key type asymmetric registered Sep 13 01:33:39.027831 kernel: Asymmetric key parser 'x509' registered Sep 13 01:33:39.027838 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Sep 13 01:33:39.027845 kernel: io scheduler mq-deadline registered Sep 13 01:33:39.027851 kernel: io scheduler kyber registered Sep 13 01:33:39.027858 kernel: io scheduler bfq registered Sep 13 01:33:39.027865 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Sep 13 01:33:39.027871 kernel: thunder_xcv, ver 1.0 Sep 13 01:33:39.027877 kernel: thunder_bgx, ver 1.0 Sep 13 01:33:39.027884 kernel: nicpf, ver 1.0 Sep 13 01:33:39.027922 kernel: nicvf, ver 1.0 Sep 13 01:33:39.028035 kernel: rtc-efi rtc-efi.0: registered as rtc0 Sep 13 01:33:39.028099 kernel: rtc-efi rtc-efi.0: setting system clock to 2025-09-13T01:33:38 UTC (1757727218) Sep 13 01:33:39.028108 kernel: efifb: probing for efifb Sep 13 01:33:39.028115 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Sep 13 01:33:39.028121 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Sep 13 01:33:39.028128 kernel: efifb: scrolling: redraw Sep 13 01:33:39.028134 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Sep 13 01:33:39.028141 kernel: Console: switching to colour frame buffer device 128x48 Sep 13 01:33:39.028149 kernel: fb0: EFI VGA frame buffer device Sep 13 01:33:39.028155 kernel: SMCCC: SOC_ID: ARCH_SOC_ID not implemented, skipping .... Sep 13 01:33:39.028162 kernel: hid: raw HID events driver (C) Jiri Kosina Sep 13 01:33:39.028168 kernel: NET: Registered PF_INET6 protocol family Sep 13 01:33:39.028175 kernel: Segment Routing with IPv6 Sep 13 01:33:39.028181 kernel: In-situ OAM (IOAM) with IPv6 Sep 13 01:33:39.028188 kernel: NET: Registered PF_PACKET protocol family Sep 13 01:33:39.028194 kernel: Key type dns_resolver registered Sep 13 01:33:39.028201 kernel: registered taskstats version 1 Sep 13 01:33:39.028207 kernel: Loading compiled-in X.509 certificates Sep 13 01:33:39.028215 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.192-flatcar: 47ac98e9306f36eebe4291d409359a5a5d0c2b9c' Sep 13 01:33:39.028222 kernel: Key type .fscrypt registered Sep 13 01:33:39.028228 kernel: Key type fscrypt-provisioning registered Sep 13 01:33:39.028235 kernel: ima: No TPM chip found, activating TPM-bypass! Sep 13 01:33:39.028242 kernel: ima: Allocated hash algorithm: sha1 Sep 13 01:33:39.028248 kernel: ima: No architecture policies found Sep 13 01:33:39.028255 kernel: clk: Disabling unused clocks Sep 13 01:33:39.028261 kernel: Freeing unused kernel memory: 36416K Sep 13 01:33:39.028269 kernel: Run /init as init process Sep 13 01:33:39.028276 kernel: with arguments: Sep 13 01:33:39.028282 kernel: /init Sep 13 01:33:39.028288 kernel: with environment: Sep 13 01:33:39.028295 kernel: HOME=/ Sep 13 01:33:39.028301 kernel: TERM=linux Sep 13 01:33:39.028307 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Sep 13 01:33:39.028316 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 13 01:33:39.028326 systemd[1]: Detected virtualization microsoft. Sep 13 01:33:39.028333 systemd[1]: Detected architecture arm64. Sep 13 01:33:39.028340 systemd[1]: Running in initrd. Sep 13 01:33:39.028346 systemd[1]: No hostname configured, using default hostname. Sep 13 01:33:39.028353 systemd[1]: Hostname set to . Sep 13 01:33:39.028361 systemd[1]: Initializing machine ID from random generator. Sep 13 01:33:39.028367 systemd[1]: Queued start job for default target initrd.target. Sep 13 01:33:39.028375 systemd[1]: Started systemd-ask-password-console.path. Sep 13 01:33:39.028383 systemd[1]: Reached target cryptsetup.target. Sep 13 01:33:39.028390 systemd[1]: Reached target paths.target. Sep 13 01:33:39.028397 systemd[1]: Reached target slices.target. Sep 13 01:33:39.028403 systemd[1]: Reached target swap.target. Sep 13 01:33:39.028410 systemd[1]: Reached target timers.target. Sep 13 01:33:39.028418 systemd[1]: Listening on iscsid.socket. Sep 13 01:33:39.028425 systemd[1]: Listening on iscsiuio.socket. Sep 13 01:33:39.028432 systemd[1]: Listening on systemd-journald-audit.socket. Sep 13 01:33:39.028440 systemd[1]: Listening on systemd-journald-dev-log.socket. Sep 13 01:33:39.028447 systemd[1]: Listening on systemd-journald.socket. Sep 13 01:33:39.028454 systemd[1]: Listening on systemd-networkd.socket. Sep 13 01:33:39.028461 systemd[1]: Listening on systemd-udevd-control.socket. Sep 13 01:33:39.028469 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 13 01:33:39.028475 systemd[1]: Reached target sockets.target. Sep 13 01:33:39.028482 systemd[1]: Starting kmod-static-nodes.service... Sep 13 01:33:39.028489 systemd[1]: Finished network-cleanup.service. Sep 13 01:33:39.028496 systemd[1]: Starting systemd-fsck-usr.service... Sep 13 01:33:39.028505 systemd[1]: Starting systemd-journald.service... Sep 13 01:33:39.028512 systemd[1]: Starting systemd-modules-load.service... Sep 13 01:33:39.028519 systemd[1]: Starting systemd-resolved.service... Sep 13 01:33:39.028526 systemd[1]: Starting systemd-vconsole-setup.service... Sep 13 01:33:39.028537 systemd-journald[276]: Journal started Sep 13 01:33:39.028572 systemd-journald[276]: Runtime Journal (/run/log/journal/b10fdbe30cac457da0c4e6d0469f544b) is 8.0M, max 78.5M, 70.5M free. Sep 13 01:33:39.011252 systemd-modules-load[277]: Inserted module 'overlay' Sep 13 01:33:39.059847 systemd[1]: Started systemd-journald.service. Sep 13 01:33:39.059911 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Sep 13 01:33:39.052703 systemd-resolved[278]: Positive Trust Anchors: Sep 13 01:33:39.090666 kernel: audit: type=1130 audit(1757727219.063:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:39.090689 kernel: Bridge firewalling registered Sep 13 01:33:39.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:39.052720 systemd-resolved[278]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 13 01:33:39.052747 systemd-resolved[278]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 13 01:33:39.161913 kernel: audit: type=1130 audit(1757727219.103:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:39.161934 kernel: SCSI subsystem initialized Sep 13 01:33:39.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:39.054853 systemd-resolved[278]: Defaulting to hostname 'linux'. Sep 13 01:33:39.085138 systemd[1]: Started systemd-resolved.service. Sep 13 01:33:39.237280 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Sep 13 01:33:39.237302 kernel: audit: type=1130 audit(1757727219.160:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:39.237319 kernel: device-mapper: uevent: version 1.0.3 Sep 13 01:33:39.237328 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Sep 13 01:33:39.237337 kernel: audit: type=1130 audit(1757727219.208:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:39.237345 kernel: audit: type=1130 audit(1757727219.214:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:39.160000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:39.208000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:39.214000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:39.090447 systemd-modules-load[277]: Inserted module 'br_netfilter' Sep 13 01:33:39.103864 systemd[1]: Finished kmod-static-nodes.service. Sep 13 01:33:39.285447 kernel: audit: type=1130 audit(1757727219.257:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:39.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:39.166800 systemd[1]: Finished systemd-fsck-usr.service. Sep 13 01:33:39.209342 systemd-modules-load[277]: Inserted module 'dm_multipath' Sep 13 01:33:39.209601 systemd[1]: Finished systemd-vconsole-setup.service. Sep 13 01:33:39.214739 systemd[1]: Finished systemd-modules-load.service. Sep 13 01:33:39.258134 systemd[1]: Reached target nss-lookup.target. Sep 13 01:33:39.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:39.289417 systemd[1]: Starting dracut-cmdline-ask.service... Sep 13 01:33:39.350278 kernel: audit: type=1130 audit(1757727219.328:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:39.298301 systemd[1]: Starting systemd-sysctl.service... Sep 13 01:33:39.308488 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Sep 13 01:33:39.358000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:39.325191 systemd[1]: Finished systemd-sysctl.service. Sep 13 01:33:39.387823 kernel: audit: type=1130 audit(1757727219.358:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:39.333145 systemd[1]: Finished dracut-cmdline-ask.service. Sep 13 01:33:39.414208 kernel: audit: type=1130 audit(1757727219.383:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:39.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:39.359126 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Sep 13 01:33:39.384675 systemd[1]: Starting dracut-cmdline.service... Sep 13 01:33:39.429966 dracut-cmdline[298]: dracut-dracut-053 Sep 13 01:33:39.435631 dracut-cmdline[298]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=563df7b8a9b19b8c496587ae06f3c3ec1604a5105c3a3f313c9ccaa21d8055ca Sep 13 01:33:39.519923 kernel: Loading iSCSI transport class v2.0-870. Sep 13 01:33:39.534915 kernel: iscsi: registered transport (tcp) Sep 13 01:33:39.555530 kernel: iscsi: registered transport (qla4xxx) Sep 13 01:33:39.555559 kernel: QLogic iSCSI HBA Driver Sep 13 01:33:39.584455 systemd[1]: Finished dracut-cmdline.service. Sep 13 01:33:39.588000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:39.589670 systemd[1]: Starting dracut-pre-udev.service... Sep 13 01:33:39.642905 kernel: raid6: neonx8 gen() 13757 MB/s Sep 13 01:33:39.662899 kernel: raid6: neonx8 xor() 10801 MB/s Sep 13 01:33:39.682899 kernel: raid6: neonx4 gen() 13545 MB/s Sep 13 01:33:39.703911 kernel: raid6: neonx4 xor() 10982 MB/s Sep 13 01:33:39.723897 kernel: raid6: neonx2 gen() 12947 MB/s Sep 13 01:33:39.743897 kernel: raid6: neonx2 xor() 10238 MB/s Sep 13 01:33:39.764899 kernel: raid6: neonx1 gen() 10541 MB/s Sep 13 01:33:39.800896 kernel: raid6: neonx1 xor() 8778 MB/s Sep 13 01:33:39.811907 kernel: raid6: int64x8 gen() 6276 MB/s Sep 13 01:33:39.825900 kernel: raid6: int64x8 xor() 3543 MB/s Sep 13 01:33:39.845896 kernel: raid6: int64x4 gen() 7220 MB/s Sep 13 01:33:39.865905 kernel: raid6: int64x4 xor() 3859 MB/s Sep 13 01:33:39.886897 kernel: raid6: int64x2 gen() 6150 MB/s Sep 13 01:33:39.906897 kernel: raid6: int64x2 xor() 3322 MB/s Sep 13 01:33:39.926897 kernel: raid6: int64x1 gen() 5044 MB/s Sep 13 01:33:39.952390 kernel: raid6: int64x1 xor() 2645 MB/s Sep 13 01:33:39.952409 kernel: raid6: using algorithm neonx8 gen() 13757 MB/s Sep 13 01:33:39.952417 kernel: raid6: .... xor() 10801 MB/s, rmw enabled Sep 13 01:33:39.957148 kernel: raid6: using neon recovery algorithm Sep 13 01:33:39.978460 kernel: xor: measuring software checksum speed Sep 13 01:33:39.978473 kernel: 8regs : 17191 MB/sec Sep 13 01:33:39.982437 kernel: 32regs : 20686 MB/sec Sep 13 01:33:39.986183 kernel: arm64_neon : 27860 MB/sec Sep 13 01:33:39.990797 kernel: xor: using function: arm64_neon (27860 MB/sec) Sep 13 01:33:40.046906 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Sep 13 01:33:40.055389 systemd[1]: Finished dracut-pre-udev.service. Sep 13 01:33:40.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:40.062000 audit: BPF prog-id=7 op=LOAD Sep 13 01:33:40.063000 audit: BPF prog-id=8 op=LOAD Sep 13 01:33:40.064480 systemd[1]: Starting systemd-udevd.service... Sep 13 01:33:40.079555 systemd-udevd[474]: Using default interface naming scheme 'v252'. Sep 13 01:33:40.086850 systemd[1]: Started systemd-udevd.service. Sep 13 01:33:40.091000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:40.097394 systemd[1]: Starting dracut-pre-trigger.service... Sep 13 01:33:40.110484 dracut-pre-trigger[495]: rd.md=0: removing MD RAID activation Sep 13 01:33:40.137810 systemd[1]: Finished dracut-pre-trigger.service. Sep 13 01:33:40.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:40.143304 systemd[1]: Starting systemd-udev-trigger.service... Sep 13 01:33:40.182141 systemd[1]: Finished systemd-udev-trigger.service. Sep 13 01:33:40.194000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:40.231998 kernel: hv_vmbus: Vmbus version:5.3 Sep 13 01:33:40.256108 kernel: hv_vmbus: registering driver hyperv_keyboard Sep 13 01:33:40.256162 kernel: hv_vmbus: registering driver hv_storvsc Sep 13 01:33:40.256172 kernel: hv_vmbus: registering driver hv_netvsc Sep 13 01:33:40.256909 kernel: hv_vmbus: registering driver hid_hyperv Sep 13 01:33:40.272924 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/MSFT1000:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Sep 13 01:33:40.276340 kernel: scsi host0: storvsc_host_t Sep 13 01:33:40.276396 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Sep 13 01:33:40.291319 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Sep 13 01:33:40.291378 kernel: hid-generic 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Sep 13 01:33:40.306529 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Sep 13 01:33:40.306596 kernel: scsi host1: storvsc_host_t Sep 13 01:33:40.328716 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Sep 13 01:33:40.352500 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Sep 13 01:33:40.352520 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Sep 13 01:33:40.372329 kernel: hv_netvsc 002248bb-11c1-0022-48bb-11c1002248bb eth0: VF slot 1 added Sep 13 01:33:40.372433 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Sep 13 01:33:40.372514 kernel: sd 0:0:0:0: [sda] Write Protect is off Sep 13 01:33:40.372591 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Sep 13 01:33:40.372671 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Sep 13 01:33:40.372744 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Sep 13 01:33:40.372825 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Sep 13 01:33:40.372834 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Sep 13 01:33:40.379914 kernel: hv_vmbus: registering driver hv_pci Sep 13 01:33:40.388941 kernel: hv_pci 47a4e175-d5bf-4d79-8562-2767a0cff0f8: PCI VMBus probing: Using version 0x10004 Sep 13 01:33:40.469445 kernel: hv_pci 47a4e175-d5bf-4d79-8562-2767a0cff0f8: PCI host bridge to bus d5bf:00 Sep 13 01:33:40.469548 kernel: pci_bus d5bf:00: root bus resource [mem 0xfc0000000-0xfc00fffff window] Sep 13 01:33:40.469638 kernel: pci_bus d5bf:00: No busn resource found for root bus, will use [bus 00-ff] Sep 13 01:33:40.469710 kernel: pci d5bf:00:02.0: [15b3:1018] type 00 class 0x020000 Sep 13 01:33:40.469797 kernel: pci d5bf:00:02.0: reg 0x10: [mem 0xfc0000000-0xfc00fffff 64bit pref] Sep 13 01:33:40.469873 kernel: pci d5bf:00:02.0: enabling Extended Tags Sep 13 01:33:40.469986 kernel: pci d5bf:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at d5bf:00:02.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) Sep 13 01:33:40.470063 kernel: pci_bus d5bf:00: busn_res: [bus 00-ff] end is updated to 00 Sep 13 01:33:40.470132 kernel: pci d5bf:00:02.0: BAR 0: assigned [mem 0xfc0000000-0xfc00fffff 64bit pref] Sep 13 01:33:40.506709 kernel: mlx5_core d5bf:00:02.0: enabling device (0000 -> 0002) Sep 13 01:33:40.731575 kernel: mlx5_core d5bf:00:02.0: firmware version: 16.30.1284 Sep 13 01:33:40.731691 kernel: mlx5_core d5bf:00:02.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0) Sep 13 01:33:40.731770 kernel: hv_netvsc 002248bb-11c1-0022-48bb-11c1002248bb eth0: VF registering: eth1 Sep 13 01:33:40.731850 kernel: mlx5_core d5bf:00:02.0 eth1: joined to eth0 Sep 13 01:33:40.739911 kernel: mlx5_core d5bf:00:02.0 enP54719s1: renamed from eth1 Sep 13 01:33:40.849038 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Sep 13 01:33:40.873916 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/sda6 scanned by (udev-worker) (540) Sep 13 01:33:40.886564 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 13 01:33:41.087631 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Sep 13 01:33:41.098919 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Sep 13 01:33:41.105520 systemd[1]: Starting disk-uuid.service... Sep 13 01:33:41.175684 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Sep 13 01:33:42.136909 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Sep 13 01:33:42.137227 disk-uuid[595]: The operation has completed successfully. Sep 13 01:33:42.202877 systemd[1]: disk-uuid.service: Deactivated successfully. Sep 13 01:33:42.206000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:42.206000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:42.202979 systemd[1]: Finished disk-uuid.service. Sep 13 01:33:42.216798 systemd[1]: Starting verity-setup.service... Sep 13 01:33:42.260957 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Sep 13 01:33:42.632614 systemd[1]: Found device dev-mapper-usr.device. Sep 13 01:33:42.637631 systemd[1]: Finished verity-setup.service. Sep 13 01:33:42.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:42.647033 systemd[1]: Mounting sysusr-usr.mount... Sep 13 01:33:42.709910 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Sep 13 01:33:42.710526 systemd[1]: Mounted sysusr-usr.mount. Sep 13 01:33:42.714508 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Sep 13 01:33:42.715262 systemd[1]: Starting ignition-setup.service... Sep 13 01:33:42.730776 systemd[1]: Starting parse-ip-for-networkd.service... Sep 13 01:33:42.763909 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Sep 13 01:33:42.763973 kernel: BTRFS info (device sda6): using free space tree Sep 13 01:33:42.763983 kernel: BTRFS info (device sda6): has skinny extents Sep 13 01:33:42.811731 systemd[1]: Finished parse-ip-for-networkd.service. Sep 13 01:33:42.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:42.819000 audit: BPF prog-id=9 op=LOAD Sep 13 01:33:42.821190 systemd[1]: Starting systemd-networkd.service... Sep 13 01:33:42.846001 systemd-networkd[865]: lo: Link UP Sep 13 01:33:42.846011 systemd-networkd[865]: lo: Gained carrier Sep 13 01:33:42.846420 systemd-networkd[865]: Enumeration completed Sep 13 01:33:42.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:42.847067 systemd-networkd[865]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 13 01:33:42.851986 systemd[1]: Started systemd-networkd.service. Sep 13 01:33:42.857929 systemd[1]: Reached target network.target. Sep 13 01:33:42.872329 systemd[1]: Starting iscsiuio.service... Sep 13 01:33:42.887000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:42.880567 systemd[1]: Started iscsiuio.service. Sep 13 01:33:42.895765 iscsid[872]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Sep 13 01:33:42.895765 iscsid[872]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Sep 13 01:33:42.895765 iscsid[872]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Sep 13 01:33:42.895765 iscsid[872]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Sep 13 01:33:42.895765 iscsid[872]: If using hardware iscsi like qla4xxx this message can be ignored. Sep 13 01:33:42.895765 iscsid[872]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Sep 13 01:33:42.895765 iscsid[872]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Sep 13 01:33:42.940000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:42.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:42.891292 systemd[1]: Starting iscsid.service... Sep 13 01:33:42.907288 systemd[1]: Started iscsid.service. Sep 13 01:33:42.941356 systemd[1]: Starting dracut-initqueue.service... Sep 13 01:33:42.962142 systemd[1]: Finished dracut-initqueue.service. Sep 13 01:33:42.967571 systemd[1]: Reached target remote-fs-pre.target. Sep 13 01:33:42.971916 systemd[1]: Reached target remote-cryptsetup.target. Sep 13 01:33:42.983166 systemd[1]: Reached target remote-fs.target. Sep 13 01:33:43.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:42.993615 systemd[1]: Starting dracut-pre-mount.service... Sep 13 01:33:43.048735 kernel: kauditd_printk_skb: 16 callbacks suppressed Sep 13 01:33:43.048757 kernel: audit: type=1130 audit(1757727223.020:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:43.009313 systemd[1]: mnt-oem.mount: Deactivated successfully. Sep 13 01:33:43.012557 systemd[1]: Finished dracut-pre-mount.service. Sep 13 01:33:43.070896 kernel: mlx5_core d5bf:00:02.0 enP54719s1: Link up Sep 13 01:33:43.071079 kernel: buffer_size[0]=0 is not enough for lossless buffer Sep 13 01:33:43.116591 kernel: hv_netvsc 002248bb-11c1-0022-48bb-11c1002248bb eth0: Data path switched to VF: enP54719s1 Sep 13 01:33:43.116757 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 01:33:43.117111 systemd-networkd[865]: enP54719s1: Link UP Sep 13 01:33:43.118025 systemd-networkd[865]: eth0: Link UP Sep 13 01:33:43.118154 systemd-networkd[865]: eth0: Gained carrier Sep 13 01:33:43.129307 systemd-networkd[865]: enP54719s1: Gained carrier Sep 13 01:33:43.143950 systemd-networkd[865]: eth0: DHCPv4 address 10.200.20.27/24, gateway 10.200.20.1 acquired from 168.63.129.16 Sep 13 01:33:43.369351 systemd[1]: Finished ignition-setup.service. Sep 13 01:33:43.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:43.374897 systemd[1]: Starting ignition-fetch-offline.service... Sep 13 01:33:43.402678 kernel: audit: type=1130 audit(1757727223.373:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:44.419982 systemd-networkd[865]: eth0: Gained IPv6LL Sep 13 01:33:47.015109 ignition[892]: Ignition 2.14.0 Sep 13 01:33:47.015120 ignition[892]: Stage: fetch-offline Sep 13 01:33:47.015172 ignition[892]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 01:33:47.015198 ignition[892]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 01:33:47.146152 ignition[892]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 01:33:47.146296 ignition[892]: parsed url from cmdline: "" Sep 13 01:33:47.146299 ignition[892]: no config URL provided Sep 13 01:33:47.146304 ignition[892]: reading system config file "/usr/lib/ignition/user.ign" Sep 13 01:33:47.160000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:47.155542 systemd[1]: Finished ignition-fetch-offline.service. Sep 13 01:33:47.193847 kernel: audit: type=1130 audit(1757727227.160:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:47.146312 ignition[892]: no config at "/usr/lib/ignition/user.ign" Sep 13 01:33:47.161833 systemd[1]: Starting ignition-fetch.service... Sep 13 01:33:47.146317 ignition[892]: failed to fetch config: resource requires networking Sep 13 01:33:47.146566 ignition[892]: Ignition finished successfully Sep 13 01:33:47.182310 ignition[898]: Ignition 2.14.0 Sep 13 01:33:47.182317 ignition[898]: Stage: fetch Sep 13 01:33:47.182418 ignition[898]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 01:33:47.182437 ignition[898]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 01:33:47.190022 ignition[898]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 01:33:47.190220 ignition[898]: parsed url from cmdline: "" Sep 13 01:33:47.190224 ignition[898]: no config URL provided Sep 13 01:33:47.190231 ignition[898]: reading system config file "/usr/lib/ignition/user.ign" Sep 13 01:33:47.190239 ignition[898]: no config at "/usr/lib/ignition/user.ign" Sep 13 01:33:47.190287 ignition[898]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Sep 13 01:33:47.341707 ignition[898]: GET result: OK Sep 13 01:33:47.341785 ignition[898]: config has been read from IMDS userdata Sep 13 01:33:47.344399 unknown[898]: fetched base config from "system" Sep 13 01:33:47.354000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:47.341809 ignition[898]: parsing config with SHA512: 6ee41c8285789993a7de6f11dac8e15a8f854dbe0d10a561e543595505e69d630442a835c49b241b553683bcabfd4d40e9e71f430ceddcc07962c38230fe105e Sep 13 01:33:47.344420 unknown[898]: fetched base config from "system" Sep 13 01:33:47.386998 kernel: audit: type=1130 audit(1757727227.354:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:47.344817 ignition[898]: fetch: fetch complete Sep 13 01:33:47.344426 unknown[898]: fetched user config from "azure" Sep 13 01:33:47.344822 ignition[898]: fetch: fetch passed Sep 13 01:33:47.421675 kernel: audit: type=1130 audit(1757727227.399:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:47.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:47.346037 systemd[1]: Finished ignition-fetch.service. Sep 13 01:33:47.344858 ignition[898]: Ignition finished successfully Sep 13 01:33:47.355768 systemd[1]: Starting ignition-kargs.service... Sep 13 01:33:47.385246 ignition[904]: Ignition 2.14.0 Sep 13 01:33:47.391205 systemd[1]: Finished ignition-kargs.service. Sep 13 01:33:47.444000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:47.385252 ignition[904]: Stage: kargs Sep 13 01:33:47.471792 kernel: audit: type=1130 audit(1757727227.444:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:47.400280 systemd[1]: Starting ignition-disks.service... Sep 13 01:33:47.385349 ignition[904]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 01:33:47.439778 systemd[1]: Finished ignition-disks.service. Sep 13 01:33:47.385369 ignition[904]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 01:33:47.462552 systemd[1]: Reached target initrd-root-device.target. Sep 13 01:33:47.388034 ignition[904]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 01:33:47.469171 systemd[1]: Reached target local-fs-pre.target. Sep 13 01:33:47.389909 ignition[904]: kargs: kargs passed Sep 13 01:33:47.476249 systemd[1]: Reached target local-fs.target. Sep 13 01:33:47.389952 ignition[904]: Ignition finished successfully Sep 13 01:33:47.484615 systemd[1]: Reached target sysinit.target. Sep 13 01:33:47.425178 ignition[910]: Ignition 2.14.0 Sep 13 01:33:47.494978 systemd[1]: Reached target basic.target. Sep 13 01:33:47.425183 ignition[910]: Stage: disks Sep 13 01:33:47.503854 systemd[1]: Starting systemd-fsck-root.service... Sep 13 01:33:47.425282 ignition[910]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 01:33:47.425300 ignition[910]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 01:33:47.435495 ignition[910]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 01:33:47.436300 ignition[910]: disks: disks passed Sep 13 01:33:47.436343 ignition[910]: Ignition finished successfully Sep 13 01:33:47.629059 systemd-fsck[918]: ROOT: clean, 629/7326000 files, 481083/7359488 blocks Sep 13 01:33:47.639035 systemd[1]: Finished systemd-fsck-root.service. Sep 13 01:33:47.665277 kernel: audit: type=1130 audit(1757727227.643:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:47.643000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:47.644304 systemd[1]: Mounting sysroot.mount... Sep 13 01:33:47.685946 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Sep 13 01:33:47.686876 systemd[1]: Mounted sysroot.mount. Sep 13 01:33:47.693871 systemd[1]: Reached target initrd-root-fs.target. Sep 13 01:33:47.743957 systemd[1]: Mounting sysroot-usr.mount... Sep 13 01:33:47.748560 systemd[1]: Starting flatcar-metadata-hostname.service... Sep 13 01:33:47.755751 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Sep 13 01:33:47.755782 systemd[1]: Reached target ignition-diskful.target. Sep 13 01:33:47.761494 systemd[1]: Mounted sysroot-usr.mount. Sep 13 01:33:47.817939 systemd[1]: Mounting sysroot-usr-share-oem.mount... Sep 13 01:33:47.823040 systemd[1]: Starting initrd-setup-root.service... Sep 13 01:33:47.845914 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/sda6 scanned by mount (929) Sep 13 01:33:47.858174 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Sep 13 01:33:47.858218 kernel: BTRFS info (device sda6): using free space tree Sep 13 01:33:47.863248 kernel: BTRFS info (device sda6): has skinny extents Sep 13 01:33:47.871216 systemd[1]: Mounted sysroot-usr-share-oem.mount. Sep 13 01:33:47.881076 initrd-setup-root[939]: cut: /sysroot/etc/passwd: No such file or directory Sep 13 01:33:47.918176 initrd-setup-root[960]: cut: /sysroot/etc/group: No such file or directory Sep 13 01:33:47.942386 initrd-setup-root[968]: cut: /sysroot/etc/shadow: No such file or directory Sep 13 01:33:47.965157 initrd-setup-root[976]: cut: /sysroot/etc/gshadow: No such file or directory Sep 13 01:33:48.623511 systemd[1]: Finished initrd-setup-root.service. Sep 13 01:33:48.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:48.628832 systemd[1]: Starting ignition-mount.service... Sep 13 01:33:48.655272 kernel: audit: type=1130 audit(1757727228.627:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:48.656044 systemd[1]: Starting sysroot-boot.service... Sep 13 01:33:48.660663 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Sep 13 01:33:48.660771 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Sep 13 01:33:48.696438 systemd[1]: Finished sysroot-boot.service. Sep 13 01:33:48.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:48.724684 kernel: audit: type=1130 audit(1757727228.701:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:48.730918 ignition[998]: INFO : Ignition 2.14.0 Sep 13 01:33:48.730918 ignition[998]: INFO : Stage: mount Sep 13 01:33:48.740961 ignition[998]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 01:33:48.740961 ignition[998]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 01:33:48.740961 ignition[998]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 01:33:48.740961 ignition[998]: INFO : mount: mount passed Sep 13 01:33:48.740961 ignition[998]: INFO : Ignition finished successfully Sep 13 01:33:48.793799 kernel: audit: type=1130 audit(1757727228.744:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:48.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:48.739993 systemd[1]: Finished ignition-mount.service. Sep 13 01:33:49.276013 coreos-metadata[928]: Sep 13 01:33:49.275 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Sep 13 01:33:49.285737 coreos-metadata[928]: Sep 13 01:33:49.285 INFO Fetch successful Sep 13 01:33:49.319412 coreos-metadata[928]: Sep 13 01:33:49.319 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Sep 13 01:33:49.331022 coreos-metadata[928]: Sep 13 01:33:49.330 INFO Fetch successful Sep 13 01:33:49.348906 coreos-metadata[928]: Sep 13 01:33:49.348 INFO wrote hostname ci-3510.3.8-n-669f7473be to /sysroot/etc/hostname Sep 13 01:33:49.356949 systemd[1]: Finished flatcar-metadata-hostname.service. Sep 13 01:33:49.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:49.383903 kernel: audit: type=1130 audit(1757727229.362:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:49.363201 systemd[1]: Starting ignition-files.service... Sep 13 01:33:49.388207 systemd[1]: Mounting sysroot-usr-share-oem.mount... Sep 13 01:33:49.411908 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by mount (1007) Sep 13 01:33:49.423797 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Sep 13 01:33:49.423811 kernel: BTRFS info (device sda6): using free space tree Sep 13 01:33:49.423820 kernel: BTRFS info (device sda6): has skinny extents Sep 13 01:33:49.436186 systemd[1]: Mounted sysroot-usr-share-oem.mount. Sep 13 01:33:49.449344 ignition[1026]: INFO : Ignition 2.14.0 Sep 13 01:33:49.449344 ignition[1026]: INFO : Stage: files Sep 13 01:33:49.458443 ignition[1026]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 01:33:49.458443 ignition[1026]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 01:33:49.458443 ignition[1026]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 01:33:49.458443 ignition[1026]: DEBUG : files: compiled without relabeling support, skipping Sep 13 01:33:49.489644 ignition[1026]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Sep 13 01:33:49.489644 ignition[1026]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Sep 13 01:33:49.561527 ignition[1026]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Sep 13 01:33:49.569009 ignition[1026]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Sep 13 01:33:49.592395 unknown[1026]: wrote ssh authorized keys file for user: core Sep 13 01:33:49.597841 ignition[1026]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Sep 13 01:33:49.609446 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Sep 13 01:33:49.618733 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Sep 13 01:33:49.627966 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Sep 13 01:33:49.627966 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Sep 13 01:33:49.627966 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-arm64.raw" Sep 13 01:33:49.627966 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-arm64.raw" Sep 13 01:33:49.676742 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Sep 13 01:33:49.676742 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(6): oem config not found in "/usr/share/oem", looking on oem partition Sep 13 01:33:49.676742 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1586096663" Sep 13 01:33:49.676742 ignition[1026]: CRITICAL : files: createFilesystemsFiles: createFiles: op(6): op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1586096663": device or resource busy Sep 13 01:33:49.676742 ignition[1026]: ERROR : files: createFilesystemsFiles: createFiles: op(6): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1586096663", trying btrfs: device or resource busy Sep 13 01:33:49.676742 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1586096663" Sep 13 01:33:49.676742 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1586096663" Sep 13 01:33:49.676742 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [started] unmounting "/mnt/oem1586096663" Sep 13 01:33:49.676742 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [finished] unmounting "/mnt/oem1586096663" Sep 13 01:33:49.676742 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Sep 13 01:33:49.676742 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Sep 13 01:33:49.676742 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Sep 13 01:33:49.675736 systemd[1]: mnt-oem1586096663.mount: Deactivated successfully. Sep 13 01:33:49.806151 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3501436058" Sep 13 01:33:49.806151 ignition[1026]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3501436058": device or resource busy Sep 13 01:33:49.806151 ignition[1026]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3501436058", trying btrfs: device or resource busy Sep 13 01:33:49.806151 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3501436058" Sep 13 01:33:49.806151 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3501436058" Sep 13 01:33:49.806151 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem3501436058" Sep 13 01:33:49.806151 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem3501436058" Sep 13 01:33:49.806151 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Sep 13 01:33:49.806151 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-arm64.raw" Sep 13 01:33:49.806151 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET https://extensions.flatcar.org/extensions/kubernetes-v1.33.0-arm64.raw: attempt #1 Sep 13 01:33:50.235025 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET result: OK Sep 13 01:33:50.464138 ignition[1026]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-arm64.raw" Sep 13 01:33:50.476247 ignition[1026]: INFO : files: op(f): [started] processing unit "waagent.service" Sep 13 01:33:50.476247 ignition[1026]: INFO : files: op(f): [finished] processing unit "waagent.service" Sep 13 01:33:50.476247 ignition[1026]: INFO : files: op(10): [started] processing unit "nvidia.service" Sep 13 01:33:50.476247 ignition[1026]: INFO : files: op(10): [finished] processing unit "nvidia.service" Sep 13 01:33:50.476247 ignition[1026]: INFO : files: op(11): [started] setting preset to enabled for "waagent.service" Sep 13 01:33:50.476247 ignition[1026]: INFO : files: op(11): [finished] setting preset to enabled for "waagent.service" Sep 13 01:33:50.476247 ignition[1026]: INFO : files: op(12): [started] setting preset to enabled for "nvidia.service" Sep 13 01:33:50.476247 ignition[1026]: INFO : files: op(12): [finished] setting preset to enabled for "nvidia.service" Sep 13 01:33:50.604713 kernel: audit: type=1130 audit(1757727230.487:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:50.604747 kernel: audit: type=1130 audit(1757727230.553:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:50.604758 kernel: audit: type=1130 audit(1757727230.579:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:50.604767 kernel: audit: type=1131 audit(1757727230.579:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:50.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:50.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:50.579000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:50.579000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:50.604883 ignition[1026]: INFO : files: createResultFile: createFiles: op(13): [started] writing file "/sysroot/etc/.ignition-result.json" Sep 13 01:33:50.604883 ignition[1026]: INFO : files: createResultFile: createFiles: op(13): [finished] writing file "/sysroot/etc/.ignition-result.json" Sep 13 01:33:50.604883 ignition[1026]: INFO : files: files passed Sep 13 01:33:50.604883 ignition[1026]: INFO : Ignition finished successfully Sep 13 01:33:50.483403 systemd[1]: Finished ignition-files.service. Sep 13 01:33:50.491104 systemd[1]: Starting initrd-setup-root-after-ignition.service... Sep 13 01:33:50.514659 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Sep 13 01:33:50.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:50.693963 initrd-setup-root-after-ignition[1051]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Sep 13 01:33:50.695000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:50.522453 systemd[1]: Starting ignition-quench.service... Sep 13 01:33:50.727376 kernel: audit: type=1130 audit(1757727230.669:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:50.727397 kernel: audit: type=1131 audit(1757727230.695:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:50.541188 systemd[1]: Finished initrd-setup-root-after-ignition.service. Sep 13 01:33:50.553497 systemd[1]: ignition-quench.service: Deactivated successfully. Sep 13 01:33:50.553579 systemd[1]: Finished ignition-quench.service. Sep 13 01:33:50.579429 systemd[1]: Reached target ignition-complete.target. Sep 13 01:33:50.633726 systemd[1]: Starting initrd-parse-etc.service... Sep 13 01:33:50.661783 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Sep 13 01:33:50.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:50.661928 systemd[1]: Finished initrd-parse-etc.service. Sep 13 01:33:50.696445 systemd[1]: Reached target initrd-fs.target. Sep 13 01:33:50.723555 systemd[1]: Reached target initrd.target. Sep 13 01:33:50.731224 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Sep 13 01:33:50.736137 systemd[1]: Starting dracut-pre-pivot.service... Sep 13 01:33:50.760985 systemd[1]: Finished dracut-pre-pivot.service. Sep 13 01:33:50.813000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:50.766106 systemd[1]: Starting initrd-cleanup.service... Sep 13 01:33:50.781397 systemd[1]: Stopped target nss-lookup.target. Sep 13 01:33:50.787083 systemd[1]: Stopped target remote-cryptsetup.target. Sep 13 01:33:50.795075 systemd[1]: Stopped target timers.target. Sep 13 01:33:50.805579 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Sep 13 01:33:50.805696 systemd[1]: Stopped dracut-pre-pivot.service. Sep 13 01:33:50.813966 systemd[1]: Stopped target initrd.target. Sep 13 01:33:50.821783 systemd[1]: Stopped target basic.target. Sep 13 01:33:50.829961 systemd[1]: Stopped target ignition-complete.target. Sep 13 01:33:50.838378 systemd[1]: Stopped target ignition-diskful.target. Sep 13 01:33:50.847270 systemd[1]: Stopped target initrd-root-device.target. Sep 13 01:33:50.855223 systemd[1]: Stopped target remote-fs.target. Sep 13 01:33:50.912000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:50.865023 systemd[1]: Stopped target remote-fs-pre.target. Sep 13 01:33:50.873111 systemd[1]: Stopped target sysinit.target. Sep 13 01:33:50.927000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:50.880555 systemd[1]: Stopped target local-fs.target. Sep 13 01:33:50.936000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:50.887878 systemd[1]: Stopped target local-fs-pre.target. Sep 13 01:33:50.944000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:50.896274 systemd[1]: Stopped target swap.target. Sep 13 01:33:50.952000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:50.904044 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Sep 13 01:33:50.904205 systemd[1]: Stopped dracut-pre-mount.service. Sep 13 01:33:50.975000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:50.912457 systemd[1]: Stopped target cryptsetup.target. Sep 13 01:33:50.984224 ignition[1064]: INFO : Ignition 2.14.0 Sep 13 01:33:50.984224 ignition[1064]: INFO : Stage: umount Sep 13 01:33:50.984224 ignition[1064]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 01:33:50.984224 ignition[1064]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Sep 13 01:33:51.002000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:51.007000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:51.019000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:51.025000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:50.920172 systemd[1]: dracut-initqueue.service: Deactivated successfully. Sep 13 01:33:51.043000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:51.049132 ignition[1064]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Sep 13 01:33:51.049132 ignition[1064]: INFO : umount: umount passed Sep 13 01:33:51.049132 ignition[1064]: INFO : Ignition finished successfully Sep 13 01:33:51.053000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:51.063000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:50.920314 systemd[1]: Stopped dracut-initqueue.service. Sep 13 01:33:50.928234 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Sep 13 01:33:51.086000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:50.928374 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Sep 13 01:33:50.936790 systemd[1]: ignition-files.service: Deactivated successfully. Sep 13 01:33:50.936927 systemd[1]: Stopped ignition-files.service. Sep 13 01:33:50.944524 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Sep 13 01:33:50.944653 systemd[1]: Stopped flatcar-metadata-hostname.service. Sep 13 01:33:50.953873 systemd[1]: Stopping ignition-mount.service... Sep 13 01:33:50.960503 systemd[1]: Stopping iscsiuio.service... Sep 13 01:33:50.966252 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Sep 13 01:33:50.969028 systemd[1]: Stopped kmod-static-nodes.service. Sep 13 01:33:50.979725 systemd[1]: Stopping sysroot-boot.service... Sep 13 01:33:51.165000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:50.989300 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Sep 13 01:33:50.989756 systemd[1]: Stopped systemd-udev-trigger.service. Sep 13 01:33:51.003136 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Sep 13 01:33:51.190000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:51.003261 systemd[1]: Stopped dracut-pre-trigger.service. Sep 13 01:33:51.009172 systemd[1]: iscsiuio.service: Deactivated successfully. Sep 13 01:33:51.205000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:51.205000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:51.209000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:51.009264 systemd[1]: Stopped iscsiuio.service. Sep 13 01:33:51.020398 systemd[1]: sysroot-boot.mount: Deactivated successfully. Sep 13 01:33:51.020903 systemd[1]: ignition-mount.service: Deactivated successfully. Sep 13 01:33:51.230000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:51.020986 systemd[1]: Stopped ignition-mount.service. Sep 13 01:33:51.026090 systemd[1]: ignition-disks.service: Deactivated successfully. Sep 13 01:33:51.026179 systemd[1]: Stopped ignition-disks.service. Sep 13 01:33:51.252000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:51.043737 systemd[1]: ignition-kargs.service: Deactivated successfully. Sep 13 01:33:51.259000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:51.043897 systemd[1]: Stopped ignition-kargs.service. Sep 13 01:33:51.268000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:51.053626 systemd[1]: ignition-fetch.service: Deactivated successfully. Sep 13 01:33:51.053761 systemd[1]: Stopped ignition-fetch.service. Sep 13 01:33:51.286000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:51.289000 audit: BPF prog-id=6 op=UNLOAD Sep 13 01:33:51.063940 systemd[1]: Stopped target network.target. Sep 13 01:33:51.293000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:51.071960 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Sep 13 01:33:51.072097 systemd[1]: Stopped ignition-fetch-offline.service. Sep 13 01:33:51.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:51.087458 systemd[1]: Stopped target paths.target. Sep 13 01:33:51.324000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:51.097047 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Sep 13 01:33:51.332000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:51.110924 systemd[1]: Stopped systemd-ask-password-console.path. Sep 13 01:33:51.360410 kernel: hv_netvsc 002248bb-11c1-0022-48bb-11c1002248bb eth0: Data path switched from VF: enP54719s1 Sep 13 01:33:51.346000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:51.122209 systemd[1]: Stopped target slices.target. Sep 13 01:33:51.131095 systemd[1]: Stopped target sockets.target. Sep 13 01:33:51.369000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:51.369000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:51.138837 systemd[1]: iscsid.socket: Deactivated successfully. Sep 13 01:33:51.138965 systemd[1]: Closed iscsid.socket. Sep 13 01:33:51.149062 systemd[1]: iscsiuio.socket: Deactivated successfully. Sep 13 01:33:51.149175 systemd[1]: Closed iscsiuio.socket. Sep 13 01:33:51.157414 systemd[1]: ignition-setup.service: Deactivated successfully. Sep 13 01:33:51.157553 systemd[1]: Stopped ignition-setup.service. Sep 13 01:33:51.165570 systemd[1]: Stopping systemd-networkd.service... Sep 13 01:33:51.172872 systemd[1]: Stopping systemd-resolved.service... Sep 13 01:33:51.177923 systemd-networkd[865]: eth0: DHCPv6 lease lost Sep 13 01:33:51.408000 audit: BPF prog-id=9 op=UNLOAD Sep 13 01:33:51.183849 systemd[1]: systemd-networkd.service: Deactivated successfully. Sep 13 01:33:51.183948 systemd[1]: Stopped systemd-networkd.service. Sep 13 01:33:51.192677 systemd[1]: initrd-cleanup.service: Deactivated successfully. Sep 13 01:33:51.192759 systemd[1]: Finished initrd-cleanup.service. Sep 13 01:33:51.206313 systemd[1]: sysroot-boot.service: Deactivated successfully. Sep 13 01:33:51.206396 systemd[1]: Stopped sysroot-boot.service. Sep 13 01:33:51.211295 systemd[1]: systemd-networkd.socket: Deactivated successfully. Sep 13 01:33:51.211331 systemd[1]: Closed systemd-networkd.socket. Sep 13 01:33:51.452000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:33:51.222207 systemd[1]: initrd-setup-root.service: Deactivated successfully. Sep 13 01:33:51.222251 systemd[1]: Stopped initrd-setup-root.service. Sep 13 01:33:51.235412 systemd[1]: Stopping network-cleanup.service... Sep 13 01:33:51.243374 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Sep 13 01:33:51.243442 systemd[1]: Stopped parse-ip-for-networkd.service. Sep 13 01:33:51.252394 systemd[1]: systemd-sysctl.service: Deactivated successfully. Sep 13 01:33:51.252445 systemd[1]: Stopped systemd-sysctl.service. Sep 13 01:33:51.264487 systemd[1]: systemd-modules-load.service: Deactivated successfully. Sep 13 01:33:51.264525 systemd[1]: Stopped systemd-modules-load.service. Sep 13 01:33:51.517564 iscsid[872]: iscsid shutting down. Sep 13 01:33:51.269338 systemd[1]: Stopping systemd-udevd.service... Sep 13 01:33:51.278550 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Sep 13 01:33:51.279075 systemd[1]: systemd-resolved.service: Deactivated successfully. Sep 13 01:33:51.279176 systemd[1]: Stopped systemd-resolved.service. Sep 13 01:33:51.286776 systemd[1]: systemd-udevd.service: Deactivated successfully. Sep 13 01:33:51.286896 systemd[1]: Stopped systemd-udevd.service. Sep 13 01:33:51.295028 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Sep 13 01:33:51.295077 systemd[1]: Closed systemd-udevd-control.socket. Sep 13 01:33:51.302233 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Sep 13 01:33:51.302264 systemd[1]: Closed systemd-udevd-kernel.socket. Sep 13 01:33:51.306874 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Sep 13 01:33:51.517924 systemd-journald[276]: Received SIGTERM from PID 1 (n/a). Sep 13 01:33:51.306941 systemd[1]: Stopped dracut-pre-udev.service. Sep 13 01:33:51.316727 systemd[1]: dracut-cmdline.service: Deactivated successfully. Sep 13 01:33:51.316764 systemd[1]: Stopped dracut-cmdline.service. Sep 13 01:33:51.325131 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Sep 13 01:33:51.325165 systemd[1]: Stopped dracut-cmdline-ask.service. Sep 13 01:33:51.333456 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Sep 13 01:33:51.342603 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Sep 13 01:33:51.342656 systemd[1]: Stopped systemd-vconsole-setup.service. Sep 13 01:33:51.363111 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Sep 13 01:33:51.363207 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Sep 13 01:33:51.442825 systemd[1]: network-cleanup.service: Deactivated successfully. Sep 13 01:33:51.442949 systemd[1]: Stopped network-cleanup.service. Sep 13 01:33:51.453369 systemd[1]: Reached target initrd-switch-root.target. Sep 13 01:33:51.462715 systemd[1]: Starting initrd-switch-root.service... Sep 13 01:33:51.482972 systemd[1]: Switching root. Sep 13 01:33:51.518306 systemd-journald[276]: Journal stopped Sep 13 01:34:07.657353 kernel: SELinux: Class mctp_socket not defined in policy. Sep 13 01:34:07.657373 kernel: SELinux: Class anon_inode not defined in policy. Sep 13 01:34:07.657383 kernel: SELinux: the above unknown classes and permissions will be allowed Sep 13 01:34:07.657393 kernel: SELinux: policy capability network_peer_controls=1 Sep 13 01:34:07.657401 kernel: SELinux: policy capability open_perms=1 Sep 13 01:34:07.657408 kernel: SELinux: policy capability extended_socket_class=1 Sep 13 01:34:07.657417 kernel: SELinux: policy capability always_check_network=0 Sep 13 01:34:07.657425 kernel: SELinux: policy capability cgroup_seclabel=1 Sep 13 01:34:07.657433 kernel: SELinux: policy capability nnp_nosuid_transition=1 Sep 13 01:34:07.657441 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Sep 13 01:34:07.657448 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Sep 13 01:34:07.657457 kernel: kauditd_printk_skb: 36 callbacks suppressed Sep 13 01:34:07.657466 kernel: audit: type=1403 audit(1757727234.123:80): auid=4294967295 ses=4294967295 lsm=selinux res=1 Sep 13 01:34:07.657476 systemd[1]: Successfully loaded SELinux policy in 335.360ms. Sep 13 01:34:07.657486 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 23.824ms. Sep 13 01:34:07.657498 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 13 01:34:07.657507 systemd[1]: Detected virtualization microsoft. Sep 13 01:34:07.657516 systemd[1]: Detected architecture arm64. Sep 13 01:34:07.657526 systemd[1]: Detected first boot. Sep 13 01:34:07.657536 systemd[1]: Hostname set to . Sep 13 01:34:07.657545 systemd[1]: Initializing machine ID from random generator. Sep 13 01:34:07.657554 kernel: audit: type=1400 audit(1757727235.085:81): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 13 01:34:07.657564 kernel: audit: type=1400 audit(1757727235.085:82): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 13 01:34:07.657573 kernel: audit: type=1334 audit(1757727235.101:83): prog-id=10 op=LOAD Sep 13 01:34:07.657581 kernel: audit: type=1334 audit(1757727235.101:84): prog-id=10 op=UNLOAD Sep 13 01:34:07.657590 kernel: audit: type=1334 audit(1757727235.117:85): prog-id=11 op=LOAD Sep 13 01:34:07.657598 kernel: audit: type=1334 audit(1757727235.117:86): prog-id=11 op=UNLOAD Sep 13 01:34:07.657607 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Sep 13 01:34:07.657616 kernel: audit: type=1400 audit(1757727236.591:87): avc: denied { associate } for pid=1098 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Sep 13 01:34:07.657627 kernel: audit: type=1300 audit(1757727236.591:87): arch=c00000b7 syscall=5 success=yes exit=0 a0=40001453a4 a1=40000c6708 a2=40000ccc00 a3=32 items=0 ppid=1081 pid=1098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:34:07.657636 kernel: audit: type=1327 audit(1757727236.591:87): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 13 01:34:07.657645 systemd[1]: Populated /etc with preset unit settings. Sep 13 01:34:07.657654 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 13 01:34:07.657663 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 13 01:34:07.657674 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 13 01:34:07.657684 kernel: kauditd_printk_skb: 6 callbacks suppressed Sep 13 01:34:07.657692 kernel: audit: type=1334 audit(1757727246.892:89): prog-id=12 op=LOAD Sep 13 01:34:07.657700 systemd[1]: iscsid.service: Deactivated successfully. Sep 13 01:34:07.657709 kernel: audit: type=1334 audit(1757727246.892:90): prog-id=3 op=UNLOAD Sep 13 01:34:07.657719 systemd[1]: Stopped iscsid.service. Sep 13 01:34:07.657730 kernel: audit: type=1334 audit(1757727246.892:91): prog-id=13 op=LOAD Sep 13 01:34:07.657739 kernel: audit: type=1334 audit(1757727246.892:92): prog-id=14 op=LOAD Sep 13 01:34:07.657748 kernel: audit: type=1334 audit(1757727246.892:93): prog-id=4 op=UNLOAD Sep 13 01:34:07.657758 kernel: audit: type=1334 audit(1757727246.892:94): prog-id=5 op=UNLOAD Sep 13 01:34:07.657766 systemd[1]: initrd-switch-root.service: Deactivated successfully. Sep 13 01:34:07.657776 kernel: audit: type=1131 audit(1757727246.893:95): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:07.657784 kernel: audit: type=1334 audit(1757727246.937:96): prog-id=12 op=UNLOAD Sep 13 01:34:07.657793 kernel: audit: type=1131 audit(1757727246.937:97): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:07.657802 systemd[1]: Stopped initrd-switch-root.service. Sep 13 01:34:07.657811 kernel: audit: type=1130 audit(1757727246.997:98): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:07.657822 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Sep 13 01:34:07.657831 systemd[1]: Created slice system-addon\x2dconfig.slice. Sep 13 01:34:07.657840 systemd[1]: Created slice system-addon\x2drun.slice. Sep 13 01:34:07.657849 systemd[1]: Created slice system-getty.slice. Sep 13 01:34:07.657858 systemd[1]: Created slice system-modprobe.slice. Sep 13 01:34:07.657867 systemd[1]: Created slice system-serial\x2dgetty.slice. Sep 13 01:34:07.657876 systemd[1]: Created slice system-system\x2dcloudinit.slice. Sep 13 01:34:07.657885 systemd[1]: Created slice system-systemd\x2dfsck.slice. Sep 13 01:34:07.657906 systemd[1]: Created slice user.slice. Sep 13 01:34:07.657917 systemd[1]: Started systemd-ask-password-console.path. Sep 13 01:34:07.657927 systemd[1]: Started systemd-ask-password-wall.path. Sep 13 01:34:07.657936 systemd[1]: Set up automount boot.automount. Sep 13 01:34:07.657945 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Sep 13 01:34:07.657954 systemd[1]: Stopped target initrd-switch-root.target. Sep 13 01:34:07.657963 systemd[1]: Stopped target initrd-fs.target. Sep 13 01:34:07.657972 systemd[1]: Stopped target initrd-root-fs.target. Sep 13 01:34:07.657981 systemd[1]: Reached target integritysetup.target. Sep 13 01:34:07.657991 systemd[1]: Reached target remote-cryptsetup.target. Sep 13 01:34:07.658000 systemd[1]: Reached target remote-fs.target. Sep 13 01:34:07.658009 systemd[1]: Reached target slices.target. Sep 13 01:34:07.658018 systemd[1]: Reached target swap.target. Sep 13 01:34:07.658027 systemd[1]: Reached target torcx.target. Sep 13 01:34:07.658036 systemd[1]: Reached target veritysetup.target. Sep 13 01:34:07.658045 systemd[1]: Listening on systemd-coredump.socket. Sep 13 01:34:07.658056 systemd[1]: Listening on systemd-initctl.socket. Sep 13 01:34:07.658066 systemd[1]: Listening on systemd-networkd.socket. Sep 13 01:34:07.658075 systemd[1]: Listening on systemd-udevd-control.socket. Sep 13 01:34:07.658084 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 13 01:34:07.658093 systemd[1]: Listening on systemd-userdbd.socket. Sep 13 01:34:07.658102 systemd[1]: Mounting dev-hugepages.mount... Sep 13 01:34:07.658113 systemd[1]: Mounting dev-mqueue.mount... Sep 13 01:34:07.658123 systemd[1]: Mounting media.mount... Sep 13 01:34:07.658132 systemd[1]: Mounting sys-kernel-debug.mount... Sep 13 01:34:07.658141 systemd[1]: Mounting sys-kernel-tracing.mount... Sep 13 01:34:07.658150 systemd[1]: Mounting tmp.mount... Sep 13 01:34:07.658159 systemd[1]: Starting flatcar-tmpfiles.service... Sep 13 01:34:07.658169 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 01:34:07.658178 systemd[1]: Starting kmod-static-nodes.service... Sep 13 01:34:07.658187 systemd[1]: Starting modprobe@configfs.service... Sep 13 01:34:07.658197 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 01:34:07.658206 systemd[1]: Starting modprobe@drm.service... Sep 13 01:34:07.658215 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 01:34:07.658224 systemd[1]: Starting modprobe@fuse.service... Sep 13 01:34:07.658234 systemd[1]: Starting modprobe@loop.service... Sep 13 01:34:07.658243 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Sep 13 01:34:07.658253 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Sep 13 01:34:07.658262 systemd[1]: Stopped systemd-fsck-root.service. Sep 13 01:34:07.658271 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Sep 13 01:34:07.658281 systemd[1]: Stopped systemd-fsck-usr.service. Sep 13 01:34:07.658291 systemd[1]: Stopped systemd-journald.service. Sep 13 01:34:07.658300 systemd[1]: systemd-journald.service: Consumed 2.647s CPU time. Sep 13 01:34:07.658309 systemd[1]: Starting systemd-journald.service... Sep 13 01:34:07.658320 kernel: loop: module loaded Sep 13 01:34:07.658328 systemd[1]: Starting systemd-modules-load.service... Sep 13 01:34:07.661566 systemd[1]: Starting systemd-network-generator.service... Sep 13 01:34:07.661593 systemd[1]: Starting systemd-remount-fs.service... Sep 13 01:34:07.661603 kernel: fuse: init (API version 7.34) Sep 13 01:34:07.661617 systemd[1]: Starting systemd-udev-trigger.service... Sep 13 01:34:07.661627 systemd[1]: verity-setup.service: Deactivated successfully. Sep 13 01:34:07.661637 systemd[1]: Stopped verity-setup.service. Sep 13 01:34:07.661646 systemd[1]: Mounted dev-hugepages.mount. Sep 13 01:34:07.661655 systemd[1]: Mounted dev-mqueue.mount. Sep 13 01:34:07.661664 systemd[1]: Mounted media.mount. Sep 13 01:34:07.661673 systemd[1]: Mounted sys-kernel-debug.mount. Sep 13 01:34:07.661686 systemd-journald[1176]: Journal started Sep 13 01:34:07.661733 systemd-journald[1176]: Runtime Journal (/run/log/journal/52530985f28c415d84992448026b9c7d) is 8.0M, max 78.5M, 70.5M free. Sep 13 01:33:54.123000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Sep 13 01:33:55.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 13 01:33:55.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 13 01:33:55.101000 audit: BPF prog-id=10 op=LOAD Sep 13 01:33:55.101000 audit: BPF prog-id=10 op=UNLOAD Sep 13 01:33:55.117000 audit: BPF prog-id=11 op=LOAD Sep 13 01:33:55.117000 audit: BPF prog-id=11 op=UNLOAD Sep 13 01:33:56.591000 audit[1098]: AVC avc: denied { associate } for pid=1098 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Sep 13 01:33:56.591000 audit[1098]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001453a4 a1=40000c6708 a2=40000ccc00 a3=32 items=0 ppid=1081 pid=1098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:33:56.591000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 13 01:33:56.600000 audit[1098]: AVC avc: denied { associate } for pid=1098 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Sep 13 01:33:56.600000 audit[1098]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145479 a2=1ed a3=0 items=2 ppid=1081 pid=1098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:33:56.600000 audit: CWD cwd="/" Sep 13 01:33:56.600000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:33:56.600000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:33:56.600000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 13 01:34:06.892000 audit: BPF prog-id=12 op=LOAD Sep 13 01:34:06.892000 audit: BPF prog-id=3 op=UNLOAD Sep 13 01:34:06.892000 audit: BPF prog-id=13 op=LOAD Sep 13 01:34:06.892000 audit: BPF prog-id=14 op=LOAD Sep 13 01:34:06.892000 audit: BPF prog-id=4 op=UNLOAD Sep 13 01:34:06.892000 audit: BPF prog-id=5 op=UNLOAD Sep 13 01:34:06.893000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:06.937000 audit: BPF prog-id=12 op=UNLOAD Sep 13 01:34:06.937000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:06.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:06.997000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:07.493000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:07.507000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:07.516000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:07.516000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:07.521000 audit: BPF prog-id=15 op=LOAD Sep 13 01:34:07.521000 audit: BPF prog-id=16 op=LOAD Sep 13 01:34:07.521000 audit: BPF prog-id=17 op=LOAD Sep 13 01:34:07.521000 audit: BPF prog-id=13 op=UNLOAD Sep 13 01:34:07.521000 audit: BPF prog-id=14 op=UNLOAD Sep 13 01:34:07.627000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:07.654000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Sep 13 01:34:07.654000 audit[1176]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=3 a1=ffffd47a6010 a2=4000 a3=1 items=0 ppid=1 pid=1176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:34:07.654000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Sep 13 01:33:56.503178 /usr/lib/systemd/system-generators/torcx-generator[1098]: time="2025-09-13T01:33:56Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 13 01:34:06.891862 systemd[1]: Queued start job for default target multi-user.target. Sep 13 01:33:56.532177 /usr/lib/systemd/system-generators/torcx-generator[1098]: time="2025-09-13T01:33:56Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 13 01:34:06.891874 systemd[1]: Unnecessary job was removed for dev-sda6.device. Sep 13 01:33:56.532196 /usr/lib/systemd/system-generators/torcx-generator[1098]: time="2025-09-13T01:33:56Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 13 01:34:06.894521 systemd[1]: systemd-journald.service: Deactivated successfully. Sep 13 01:33:56.532233 /usr/lib/systemd/system-generators/torcx-generator[1098]: time="2025-09-13T01:33:56Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Sep 13 01:34:06.894834 systemd[1]: systemd-journald.service: Consumed 2.647s CPU time. Sep 13 01:33:56.532242 /usr/lib/systemd/system-generators/torcx-generator[1098]: time="2025-09-13T01:33:56Z" level=debug msg="skipped missing lower profile" missing profile=oem Sep 13 01:33:56.532277 /usr/lib/systemd/system-generators/torcx-generator[1098]: time="2025-09-13T01:33:56Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Sep 13 01:33:56.532289 /usr/lib/systemd/system-generators/torcx-generator[1098]: time="2025-09-13T01:33:56Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Sep 13 01:33:56.532490 /usr/lib/systemd/system-generators/torcx-generator[1098]: time="2025-09-13T01:33:56Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Sep 13 01:33:56.532521 /usr/lib/systemd/system-generators/torcx-generator[1098]: time="2025-09-13T01:33:56Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 13 01:33:56.532532 /usr/lib/systemd/system-generators/torcx-generator[1098]: time="2025-09-13T01:33:56Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 13 01:33:56.576612 /usr/lib/systemd/system-generators/torcx-generator[1098]: time="2025-09-13T01:33:56Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Sep 13 01:33:56.576647 /usr/lib/systemd/system-generators/torcx-generator[1098]: time="2025-09-13T01:33:56Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Sep 13 01:33:56.576667 /usr/lib/systemd/system-generators/torcx-generator[1098]: time="2025-09-13T01:33:56Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Sep 13 01:33:56.576682 /usr/lib/systemd/system-generators/torcx-generator[1098]: time="2025-09-13T01:33:56Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Sep 13 01:33:56.576701 /usr/lib/systemd/system-generators/torcx-generator[1098]: time="2025-09-13T01:33:56Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Sep 13 01:33:56.576714 /usr/lib/systemd/system-generators/torcx-generator[1098]: time="2025-09-13T01:33:56Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Sep 13 01:34:03.074698 /usr/lib/systemd/system-generators/torcx-generator[1098]: time="2025-09-13T01:34:03Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 01:34:03.074984 /usr/lib/systemd/system-generators/torcx-generator[1098]: time="2025-09-13T01:34:03Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 01:34:03.075077 /usr/lib/systemd/system-generators/torcx-generator[1098]: time="2025-09-13T01:34:03Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 01:34:03.075234 /usr/lib/systemd/system-generators/torcx-generator[1098]: time="2025-09-13T01:34:03Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 01:34:03.075282 /usr/lib/systemd/system-generators/torcx-generator[1098]: time="2025-09-13T01:34:03Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Sep 13 01:34:03.075339 /usr/lib/systemd/system-generators/torcx-generator[1098]: time="2025-09-13T01:34:03Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Sep 13 01:34:07.673454 systemd[1]: Started systemd-journald.service. Sep 13 01:34:07.673000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:07.674191 systemd[1]: Mounted sys-kernel-tracing.mount. Sep 13 01:34:07.678498 systemd[1]: Mounted tmp.mount. Sep 13 01:34:07.682232 systemd[1]: Finished flatcar-tmpfiles.service. Sep 13 01:34:07.686000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:07.686964 systemd[1]: Finished kmod-static-nodes.service. Sep 13 01:34:07.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:07.691647 systemd[1]: modprobe@configfs.service: Deactivated successfully. Sep 13 01:34:07.691770 systemd[1]: Finished modprobe@configfs.service. Sep 13 01:34:07.695000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:07.695000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:07.696410 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 01:34:07.696526 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 01:34:07.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:07.700000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:07.701280 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 13 01:34:07.701399 systemd[1]: Finished modprobe@drm.service. Sep 13 01:34:07.705000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:07.705000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:07.705842 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 01:34:07.706051 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 01:34:07.710000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:07.710000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:07.710780 systemd[1]: modprobe@fuse.service: Deactivated successfully. Sep 13 01:34:07.710968 systemd[1]: Finished modprobe@fuse.service. Sep 13 01:34:07.715000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:07.715000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:07.715447 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 01:34:07.715563 systemd[1]: Finished modprobe@loop.service. Sep 13 01:34:07.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:07.719000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:07.720315 systemd[1]: Finished systemd-network-generator.service. Sep 13 01:34:07.724000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:07.725441 systemd[1]: Finished systemd-remount-fs.service. Sep 13 01:34:07.729000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:07.730400 systemd[1]: Reached target network-pre.target. Sep 13 01:34:07.736184 systemd[1]: Mounting sys-fs-fuse-connections.mount... Sep 13 01:34:07.741303 systemd[1]: Mounting sys-kernel-config.mount... Sep 13 01:34:07.745327 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Sep 13 01:34:07.777606 systemd[1]: Starting systemd-hwdb-update.service... Sep 13 01:34:07.782652 systemd[1]: Starting systemd-journal-flush.service... Sep 13 01:34:07.787118 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 01:34:07.788095 systemd[1]: Starting systemd-random-seed.service... Sep 13 01:34:07.792226 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 01:34:07.793278 systemd[1]: Starting systemd-sysusers.service... Sep 13 01:34:07.798842 systemd[1]: Finished systemd-modules-load.service. Sep 13 01:34:07.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:07.803824 systemd[1]: Finished systemd-udev-trigger.service. Sep 13 01:34:07.807000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:07.808988 systemd[1]: Mounted sys-fs-fuse-connections.mount. Sep 13 01:34:07.814386 systemd[1]: Mounted sys-kernel-config.mount. Sep 13 01:34:07.819555 systemd[1]: Starting systemd-sysctl.service... Sep 13 01:34:07.824603 systemd[1]: Starting systemd-udev-settle.service... Sep 13 01:34:07.833771 udevadm[1218]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Sep 13 01:34:07.861080 systemd-journald[1176]: Time spent on flushing to /var/log/journal/52530985f28c415d84992448026b9c7d is 12.993ms for 1072 entries. Sep 13 01:34:07.861080 systemd-journald[1176]: System Journal (/var/log/journal/52530985f28c415d84992448026b9c7d) is 8.0M, max 2.6G, 2.6G free. Sep 13 01:34:07.942102 systemd-journald[1176]: Received client request to flush runtime journal. Sep 13 01:34:07.874000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:07.870250 systemd[1]: Finished systemd-random-seed.service. Sep 13 01:34:07.874906 systemd[1]: Reached target first-boot-complete.target. Sep 13 01:34:07.943117 systemd[1]: Finished systemd-journal-flush.service. Sep 13 01:34:07.947000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:08.011338 systemd[1]: Finished systemd-sysctl.service. Sep 13 01:34:08.015000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:08.665833 systemd[1]: Finished systemd-sysusers.service. Sep 13 01:34:08.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:09.367276 systemd[1]: Finished systemd-hwdb-update.service. Sep 13 01:34:09.371000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:09.371000 audit: BPF prog-id=18 op=LOAD Sep 13 01:34:09.371000 audit: BPF prog-id=19 op=LOAD Sep 13 01:34:09.371000 audit: BPF prog-id=7 op=UNLOAD Sep 13 01:34:09.371000 audit: BPF prog-id=8 op=UNLOAD Sep 13 01:34:09.373451 systemd[1]: Starting systemd-udevd.service... Sep 13 01:34:09.390931 systemd-udevd[1221]: Using default interface naming scheme 'v252'. Sep 13 01:34:10.687350 systemd[1]: Started systemd-udevd.service. Sep 13 01:34:10.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:10.695000 audit: BPF prog-id=20 op=LOAD Sep 13 01:34:10.698573 systemd[1]: Starting systemd-networkd.service... Sep 13 01:34:10.724232 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Sep 13 01:34:10.790937 kernel: mousedev: PS/2 mouse device common for all mice Sep 13 01:34:10.797826 systemd[1]: Starting systemd-userdbd.service... Sep 13 01:34:10.796000 audit: BPF prog-id=21 op=LOAD Sep 13 01:34:10.796000 audit: BPF prog-id=22 op=LOAD Sep 13 01:34:10.796000 audit: BPF prog-id=23 op=LOAD Sep 13 01:34:10.799000 audit[1232]: AVC avc: denied { confidentiality } for pid=1232 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Sep 13 01:34:10.819909 kernel: hv_vmbus: registering driver hv_balloon Sep 13 01:34:10.830566 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Sep 13 01:34:10.830649 kernel: hv_balloon: Memory hot add disabled on ARM64 Sep 13 01:34:10.799000 audit[1232]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab08292250 a1=aa2c a2=ffffbb9d24b0 a3=aaab081ef010 items=12 ppid=1221 pid=1232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:34:10.799000 audit: CWD cwd="/" Sep 13 01:34:10.799000 audit: PATH item=0 name=(null) inode=6717 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:34:10.799000 audit: PATH item=1 name=(null) inode=10657 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:34:10.799000 audit: PATH item=2 name=(null) inode=10657 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:34:10.799000 audit: PATH item=3 name=(null) inode=10658 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:34:10.799000 audit: PATH item=4 name=(null) inode=10657 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:34:10.799000 audit: PATH item=5 name=(null) inode=10659 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:34:10.799000 audit: PATH item=6 name=(null) inode=10657 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:34:10.799000 audit: PATH item=7 name=(null) inode=10660 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:34:10.799000 audit: PATH item=8 name=(null) inode=10657 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:34:10.799000 audit: PATH item=9 name=(null) inode=10661 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:34:10.799000 audit: PATH item=10 name=(null) inode=10657 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:34:10.799000 audit: PATH item=11 name=(null) inode=10662 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:34:10.799000 audit: PROCTITLE proctitle="(udev-worker)" Sep 13 01:34:10.858166 kernel: hv_vmbus: registering driver hyperv_fb Sep 13 01:34:10.858636 kernel: hv_utils: Registering HyperV Utility Driver Sep 13 01:34:10.858674 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Sep 13 01:34:10.858693 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Sep 13 01:34:10.871934 kernel: hv_vmbus: registering driver hv_utils Sep 13 01:34:10.882060 kernel: Console: switching to colour dummy device 80x25 Sep 13 01:34:10.882184 kernel: hv_utils: Heartbeat IC version 3.0 Sep 13 01:34:10.882240 kernel: hv_utils: Shutdown IC version 3.2 Sep 13 01:34:10.882259 kernel: hv_utils: TimeSync IC version 4.0 Sep 13 01:34:10.540687 kernel: Console: switching to colour frame buffer device 128x48 Sep 13 01:34:10.589565 systemd-journald[1176]: Time jumped backwards, rotating. Sep 13 01:34:10.559000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:10.554962 systemd[1]: Started systemd-userdbd.service. Sep 13 01:34:10.874060 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 13 01:34:10.881023 systemd[1]: Finished systemd-udev-settle.service. Sep 13 01:34:10.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:10.887091 systemd[1]: Starting lvm2-activation-early.service... Sep 13 01:34:11.202113 lvm[1299]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 13 01:34:11.265595 systemd[1]: Finished lvm2-activation-early.service. Sep 13 01:34:11.271000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:11.271918 systemd[1]: Reached target cryptsetup.target. Sep 13 01:34:11.272350 systemd-networkd[1242]: lo: Link UP Sep 13 01:34:11.272354 systemd-networkd[1242]: lo: Gained carrier Sep 13 01:34:11.272773 systemd-networkd[1242]: Enumeration completed Sep 13 01:34:11.278078 systemd[1]: Starting lvm2-activation.service... Sep 13 01:34:11.282176 lvm[1300]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 13 01:34:11.282180 systemd[1]: Started systemd-networkd.service. Sep 13 01:34:11.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:11.288034 systemd[1]: Starting systemd-networkd-wait-online.service... Sep 13 01:34:11.304723 systemd-networkd[1242]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 13 01:34:11.306637 systemd[1]: Finished lvm2-activation.service. Sep 13 01:34:11.310000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:11.311280 systemd[1]: Reached target local-fs-pre.target. Sep 13 01:34:11.315936 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Sep 13 01:34:11.315965 systemd[1]: Reached target local-fs.target. Sep 13 01:34:11.320567 systemd[1]: Reached target machines.target. Sep 13 01:34:11.326154 systemd[1]: Starting ldconfig.service... Sep 13 01:34:11.365576 kernel: mlx5_core d5bf:00:02.0 enP54719s1: Link up Sep 13 01:34:11.365921 kernel: buffer_size[0]=0 is not enough for lossless buffer Sep 13 01:34:11.392664 kernel: hv_netvsc 002248bb-11c1-0022-48bb-11c1002248bb eth0: Data path switched to VF: enP54719s1 Sep 13 01:34:11.393113 systemd-networkd[1242]: enP54719s1: Link UP Sep 13 01:34:11.393715 systemd-networkd[1242]: eth0: Link UP Sep 13 01:34:11.393725 systemd-networkd[1242]: eth0: Gained carrier Sep 13 01:34:11.398886 systemd-networkd[1242]: enP54719s1: Gained carrier Sep 13 01:34:11.408757 systemd-networkd[1242]: eth0: DHCPv4 address 10.200.20.27/24, gateway 10.200.20.1 acquired from 168.63.129.16 Sep 13 01:34:11.502022 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 01:34:11.502097 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 01:34:11.503316 systemd[1]: Starting systemd-boot-update.service... Sep 13 01:34:11.508796 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Sep 13 01:34:11.515613 systemd[1]: Starting systemd-machine-id-commit.service... Sep 13 01:34:11.544975 systemd[1]: Starting systemd-sysext.service... Sep 13 01:34:11.609289 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1303 (bootctl) Sep 13 01:34:11.610755 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Sep 13 01:34:11.658285 systemd[1]: Unmounting usr-share-oem.mount... Sep 13 01:34:11.673094 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Sep 13 01:34:11.673941 systemd[1]: Finished systemd-machine-id-commit.service. Sep 13 01:34:11.678000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:11.679758 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Sep 13 01:34:11.683577 kernel: kauditd_printk_skb: 68 callbacks suppressed Sep 13 01:34:11.683649 kernel: audit: type=1130 audit(1757727251.678:150): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:11.705000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:11.723678 kernel: audit: type=1130 audit(1757727251.705:151): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:11.724201 systemd[1]: usr-share-oem.mount: Deactivated successfully. Sep 13 01:34:11.724495 systemd[1]: Unmounted usr-share-oem.mount. Sep 13 01:34:11.785678 kernel: loop0: detected capacity change from 0 to 211168 Sep 13 01:34:11.853808 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Sep 13 01:34:11.872725 kernel: loop1: detected capacity change from 0 to 211168 Sep 13 01:34:11.883914 (sd-sysext)[1315]: Using extensions 'kubernetes'. Sep 13 01:34:11.884239 (sd-sysext)[1315]: Merged extensions into '/usr'. Sep 13 01:34:11.901105 systemd[1]: Mounting usr-share-oem.mount... Sep 13 01:34:11.905248 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 01:34:11.906422 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 01:34:11.911107 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 01:34:11.916370 systemd[1]: Starting modprobe@loop.service... Sep 13 01:34:11.920282 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 01:34:11.920403 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 01:34:11.922686 systemd[1]: Mounted usr-share-oem.mount. Sep 13 01:34:11.926967 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 01:34:11.927100 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 01:34:11.931000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:11.937102 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 01:34:11.937226 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 01:34:11.936000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:11.967991 kernel: audit: type=1130 audit(1757727251.931:152): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:11.968032 kernel: audit: type=1131 audit(1757727251.936:153): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:11.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:11.969029 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 01:34:11.969270 systemd[1]: Finished modprobe@loop.service. Sep 13 01:34:11.985065 kernel: audit: type=1130 audit(1757727251.967:154): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:11.985171 kernel: audit: type=1131 audit(1757727251.967:155): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:11.967000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:12.000286 systemd-fsck[1312]: fsck.fat 4.2 (2021-01-31) Sep 13 01:34:12.000286 systemd-fsck[1312]: /dev/sda1: 236 files, 117310/258078 clusters Sep 13 01:34:12.008000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:12.012121 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Sep 13 01:34:12.008000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:12.052030 kernel: audit: type=1130 audit(1757727252.008:156): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:12.052123 kernel: audit: type=1131 audit(1757727252.008:157): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:12.052149 kernel: audit: type=1130 audit(1757727252.027:158): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:12.027000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:12.052584 systemd[1]: Finished systemd-sysext.service. Sep 13 01:34:12.077000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:12.082451 systemd[1]: Mounting boot.mount... Sep 13 01:34:12.099668 kernel: audit: type=1130 audit(1757727252.077:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:12.104908 systemd[1]: Starting ensure-sysext.service... Sep 13 01:34:12.109569 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 01:34:12.109687 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 01:34:12.114484 systemd[1]: Starting systemd-tmpfiles-setup.service... Sep 13 01:34:12.123727 systemd[1]: Mounted boot.mount. Sep 13 01:34:12.131912 systemd[1]: Reloading. Sep 13 01:34:12.179042 /usr/lib/systemd/system-generators/torcx-generator[1346]: time="2025-09-13T01:34:12Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 13 01:34:12.179347 /usr/lib/systemd/system-generators/torcx-generator[1346]: time="2025-09-13T01:34:12Z" level=info msg="torcx already run" Sep 13 01:34:12.258637 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 13 01:34:12.258665 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 13 01:34:12.273718 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 13 01:34:12.335000 audit: BPF prog-id=24 op=LOAD Sep 13 01:34:12.335000 audit: BPF prog-id=25 op=LOAD Sep 13 01:34:12.335000 audit: BPF prog-id=18 op=UNLOAD Sep 13 01:34:12.335000 audit: BPF prog-id=19 op=UNLOAD Sep 13 01:34:12.336000 audit: BPF prog-id=26 op=LOAD Sep 13 01:34:12.336000 audit: BPF prog-id=20 op=UNLOAD Sep 13 01:34:12.338000 audit: BPF prog-id=27 op=LOAD Sep 13 01:34:12.338000 audit: BPF prog-id=21 op=UNLOAD Sep 13 01:34:12.338000 audit: BPF prog-id=28 op=LOAD Sep 13 01:34:12.338000 audit: BPF prog-id=29 op=LOAD Sep 13 01:34:12.338000 audit: BPF prog-id=22 op=UNLOAD Sep 13 01:34:12.338000 audit: BPF prog-id=23 op=UNLOAD Sep 13 01:34:12.339000 audit: BPF prog-id=30 op=LOAD Sep 13 01:34:12.339000 audit: BPF prog-id=15 op=UNLOAD Sep 13 01:34:12.339000 audit: BPF prog-id=31 op=LOAD Sep 13 01:34:12.339000 audit: BPF prog-id=32 op=LOAD Sep 13 01:34:12.339000 audit: BPF prog-id=16 op=UNLOAD Sep 13 01:34:12.339000 audit: BPF prog-id=17 op=UNLOAD Sep 13 01:34:12.341952 systemd[1]: Finished systemd-boot-update.service. Sep 13 01:34:12.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:12.354804 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 01:34:12.355910 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 01:34:12.360947 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 01:34:12.366879 systemd[1]: Starting modprobe@loop.service... Sep 13 01:34:12.370881 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 01:34:12.371011 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 01:34:12.371804 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 01:34:12.371941 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 01:34:12.375000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:12.375000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:12.376864 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 01:34:12.376984 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 01:34:12.381000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:12.381000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:12.381939 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 01:34:12.382054 systemd[1]: Finished modprobe@loop.service. Sep 13 01:34:12.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:12.385000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:12.387839 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 01:34:12.389107 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 01:34:12.393970 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 01:34:12.399269 systemd[1]: Starting modprobe@loop.service... Sep 13 01:34:12.402953 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 01:34:12.403074 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 01:34:12.403832 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 01:34:12.403952 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 01:34:12.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:12.407000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:12.408563 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 01:34:12.408688 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 01:34:12.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:12.412000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:12.413574 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 01:34:12.413703 systemd[1]: Finished modprobe@loop.service. Sep 13 01:34:12.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:12.417000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:12.420186 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 01:34:12.421242 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 01:34:12.426136 systemd[1]: Starting modprobe@drm.service... Sep 13 01:34:12.430607 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 01:34:12.435975 systemd[1]: Starting modprobe@loop.service... Sep 13 01:34:12.439662 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 01:34:12.439775 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 01:34:12.440641 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 01:34:12.440798 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 01:34:12.444000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:12.444000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:12.445515 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 13 01:34:12.445631 systemd[1]: Finished modprobe@drm.service. Sep 13 01:34:12.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:12.449000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:12.450110 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 01:34:12.450222 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 01:34:12.454000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:12.454000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:12.455120 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 01:34:12.455229 systemd[1]: Finished modprobe@loop.service. Sep 13 01:34:12.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:12.459000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:12.459913 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 01:34:12.459979 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 01:34:12.460175 systemd-tmpfiles[1327]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Sep 13 01:34:12.461305 systemd[1]: Finished ensure-sysext.service. Sep 13 01:34:12.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:12.959350 systemd-tmpfiles[1327]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Sep 13 01:34:13.126820 systemd-networkd[1242]: eth0: Gained IPv6LL Sep 13 01:34:13.129518 systemd[1]: Finished systemd-networkd-wait-online.service. Sep 13 01:34:13.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:13.244887 systemd-tmpfiles[1327]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Sep 13 01:34:16.534806 systemd[1]: Finished systemd-tmpfiles-setup.service. Sep 13 01:34:16.539000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:16.541914 systemd[1]: Starting audit-rules.service... Sep 13 01:34:16.546925 systemd[1]: Starting clean-ca-certificates.service... Sep 13 01:34:16.552290 systemd[1]: Starting systemd-journal-catalog-update.service... Sep 13 01:34:16.558000 audit: BPF prog-id=33 op=LOAD Sep 13 01:34:16.559473 systemd[1]: Starting systemd-resolved.service... Sep 13 01:34:16.563000 audit: BPF prog-id=34 op=LOAD Sep 13 01:34:16.565363 systemd[1]: Starting systemd-timesyncd.service... Sep 13 01:34:16.571128 systemd[1]: Starting systemd-update-utmp.service... Sep 13 01:34:16.632000 audit[1423]: SYSTEM_BOOT pid=1423 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Sep 13 01:34:16.636826 systemd[1]: Finished clean-ca-certificates.service. Sep 13 01:34:16.641000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:16.642269 systemd[1]: Finished systemd-update-utmp.service. Sep 13 01:34:16.647000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:16.648162 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 13 01:34:16.776887 systemd[1]: Started systemd-timesyncd.service. Sep 13 01:34:16.777450 systemd-resolved[1420]: Positive Trust Anchors: Sep 13 01:34:16.777461 systemd-resolved[1420]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 13 01:34:16.777488 systemd-resolved[1420]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 13 01:34:16.780000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:16.781691 systemd[1]: Reached target time-set.target. Sep 13 01:34:16.786280 kernel: kauditd_printk_skb: 47 callbacks suppressed Sep 13 01:34:16.786343 kernel: audit: type=1130 audit(1757727256.780:207): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:16.870187 systemd-resolved[1420]: Using system hostname 'ci-3510.3.8-n-669f7473be'. Sep 13 01:34:16.871748 systemd[1]: Started systemd-resolved.service. Sep 13 01:34:16.875000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:16.876282 systemd[1]: Reached target network.target. Sep 13 01:34:16.897464 kernel: audit: type=1130 audit(1757727256.875:208): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:16.897814 systemd[1]: Reached target network-online.target. Sep 13 01:34:16.902383 systemd[1]: Reached target nss-lookup.target. Sep 13 01:34:16.961442 systemd[1]: Finished systemd-journal-catalog-update.service. Sep 13 01:34:16.966000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:16.986674 kernel: audit: type=1130 audit(1757727256.966:209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:34:17.111791 augenrules[1438]: No rules Sep 13 01:34:17.111000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Sep 13 01:34:17.124264 systemd[1]: Finished audit-rules.service. Sep 13 01:34:17.111000 audit[1438]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd07f8be0 a2=420 a3=0 items=0 ppid=1417 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:34:17.152740 kernel: audit: type=1305 audit(1757727257.111:210): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Sep 13 01:34:17.152833 kernel: audit: type=1300 audit(1757727257.111:210): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd07f8be0 a2=420 a3=0 items=0 ppid=1417 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:34:17.111000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Sep 13 01:34:17.164022 kernel: audit: type=1327 audit(1757727257.111:210): proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Sep 13 01:34:17.171043 systemd-timesyncd[1422]: Contacted time server 144.202.0.197:123 (0.flatcar.pool.ntp.org). Sep 13 01:34:17.171109 systemd-timesyncd[1422]: Initial clock synchronization to Sat 2025-09-13 01:34:17.170850 UTC. Sep 13 01:34:23.580766 ldconfig[1302]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Sep 13 01:34:23.590824 systemd[1]: Finished ldconfig.service. Sep 13 01:34:23.596609 systemd[1]: Starting systemd-update-done.service... Sep 13 01:34:23.647760 systemd[1]: Finished systemd-update-done.service. Sep 13 01:34:23.652581 systemd[1]: Reached target sysinit.target. Sep 13 01:34:23.656961 systemd[1]: Started motdgen.path. Sep 13 01:34:23.660594 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Sep 13 01:34:23.666567 systemd[1]: Started logrotate.timer. Sep 13 01:34:23.670593 systemd[1]: Started mdadm.timer. Sep 13 01:34:23.674028 systemd[1]: Started systemd-tmpfiles-clean.timer. Sep 13 01:34:23.678523 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Sep 13 01:34:23.678556 systemd[1]: Reached target paths.target. Sep 13 01:34:23.682485 systemd[1]: Reached target timers.target. Sep 13 01:34:23.687450 systemd[1]: Listening on dbus.socket. Sep 13 01:34:23.692293 systemd[1]: Starting docker.socket... Sep 13 01:34:23.727836 systemd[1]: Listening on sshd.socket. Sep 13 01:34:23.731946 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 01:34:23.732378 systemd[1]: Listening on docker.socket. Sep 13 01:34:23.736358 systemd[1]: Reached target sockets.target. Sep 13 01:34:23.740569 systemd[1]: Reached target basic.target. Sep 13 01:34:23.744536 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 13 01:34:23.744561 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 13 01:34:23.745586 systemd[1]: Starting containerd.service... Sep 13 01:34:23.749957 systemd[1]: Starting dbus.service... Sep 13 01:34:23.753980 systemd[1]: Starting enable-oem-cloudinit.service... Sep 13 01:34:23.759002 systemd[1]: Starting extend-filesystems.service... Sep 13 01:34:23.763160 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Sep 13 01:34:23.778697 systemd[1]: Starting kubelet.service... Sep 13 01:34:23.785625 systemd[1]: Starting motdgen.service... Sep 13 01:34:23.789903 systemd[1]: Started nvidia.service. Sep 13 01:34:23.794744 systemd[1]: Starting ssh-key-proc-cmdline.service... Sep 13 01:34:23.799898 systemd[1]: Starting sshd-keygen.service... Sep 13 01:34:23.805435 systemd[1]: Starting systemd-logind.service... Sep 13 01:34:23.809142 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 01:34:23.809203 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Sep 13 01:34:23.809562 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Sep 13 01:34:23.810183 systemd[1]: Starting update-engine.service... Sep 13 01:34:23.815863 systemd[1]: Starting update-ssh-keys-after-ignition.service... Sep 13 01:34:23.824154 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Sep 13 01:34:23.824339 systemd[1]: Finished ssh-key-proc-cmdline.service. Sep 13 01:34:23.844365 jq[1448]: false Sep 13 01:34:23.844594 jq[1460]: true Sep 13 01:34:23.862890 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Sep 13 01:34:23.863042 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Sep 13 01:34:23.905460 jq[1465]: true Sep 13 01:34:23.913692 systemd[1]: motdgen.service: Deactivated successfully. Sep 13 01:34:23.913867 systemd[1]: Finished motdgen.service. Sep 13 01:34:23.931122 extend-filesystems[1449]: Found loop1 Sep 13 01:34:23.935269 extend-filesystems[1449]: Found sda Sep 13 01:34:23.935269 extend-filesystems[1449]: Found sda1 Sep 13 01:34:23.935269 extend-filesystems[1449]: Found sda2 Sep 13 01:34:23.935269 extend-filesystems[1449]: Found sda3 Sep 13 01:34:23.935269 extend-filesystems[1449]: Found usr Sep 13 01:34:23.935269 extend-filesystems[1449]: Found sda4 Sep 13 01:34:23.935269 extend-filesystems[1449]: Found sda6 Sep 13 01:34:23.935269 extend-filesystems[1449]: Found sda7 Sep 13 01:34:23.935269 extend-filesystems[1449]: Found sda9 Sep 13 01:34:23.935269 extend-filesystems[1449]: Checking size of /dev/sda9 Sep 13 01:34:23.960492 systemd-logind[1457]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Sep 13 01:34:24.004208 env[1468]: time="2025-09-13T01:34:23.992454541Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Sep 13 01:34:23.964032 systemd-logind[1457]: New seat seat0. Sep 13 01:34:24.022723 env[1468]: time="2025-09-13T01:34:24.022682435Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Sep 13 01:34:24.022989 env[1468]: time="2025-09-13T01:34:24.022970554Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Sep 13 01:34:24.025375 env[1468]: time="2025-09-13T01:34:24.025344906Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.192-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Sep 13 01:34:24.025466 env[1468]: time="2025-09-13T01:34:24.025451546Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Sep 13 01:34:24.025767 env[1468]: time="2025-09-13T01:34:24.025743865Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 13 01:34:24.025855 env[1468]: time="2025-09-13T01:34:24.025840584Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Sep 13 01:34:24.025915 env[1468]: time="2025-09-13T01:34:24.025901744Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Sep 13 01:34:24.025965 env[1468]: time="2025-09-13T01:34:24.025952264Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Sep 13 01:34:24.026124 env[1468]: time="2025-09-13T01:34:24.026108144Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Sep 13 01:34:24.026406 env[1468]: time="2025-09-13T01:34:24.026387663Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Sep 13 01:34:24.026603 env[1468]: time="2025-09-13T01:34:24.026582702Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 13 01:34:24.026711 env[1468]: time="2025-09-13T01:34:24.026696542Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Sep 13 01:34:24.026857 env[1468]: time="2025-09-13T01:34:24.026838621Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Sep 13 01:34:24.026928 env[1468]: time="2025-09-13T01:34:24.026915061Z" level=info msg="metadata content store policy set" policy=shared Sep 13 01:34:24.042871 env[1468]: time="2025-09-13T01:34:24.042843966Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Sep 13 01:34:24.042982 env[1468]: time="2025-09-13T01:34:24.042967806Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Sep 13 01:34:24.043041 env[1468]: time="2025-09-13T01:34:24.043027965Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Sep 13 01:34:24.043127 env[1468]: time="2025-09-13T01:34:24.043112485Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Sep 13 01:34:24.043195 env[1468]: time="2025-09-13T01:34:24.043181805Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Sep 13 01:34:24.043257 env[1468]: time="2025-09-13T01:34:24.043243965Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Sep 13 01:34:24.043320 env[1468]: time="2025-09-13T01:34:24.043307804Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Sep 13 01:34:24.044278 env[1468]: time="2025-09-13T01:34:24.044253401Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Sep 13 01:34:24.044364 env[1468]: time="2025-09-13T01:34:24.044350401Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Sep 13 01:34:24.044435 env[1468]: time="2025-09-13T01:34:24.044421801Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Sep 13 01:34:24.045640 env[1468]: time="2025-09-13T01:34:24.045619236Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Sep 13 01:34:24.045753 env[1468]: time="2025-09-13T01:34:24.045736916Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Sep 13 01:34:24.045912 env[1468]: time="2025-09-13T01:34:24.045895755Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Sep 13 01:34:24.046645 env[1468]: time="2025-09-13T01:34:24.046040235Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Sep 13 01:34:24.047309 env[1468]: time="2025-09-13T01:34:24.047287231Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Sep 13 01:34:24.047398 env[1468]: time="2025-09-13T01:34:24.047384350Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Sep 13 01:34:24.047459 env[1468]: time="2025-09-13T01:34:24.047443910Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Sep 13 01:34:24.047580 env[1468]: time="2025-09-13T01:34:24.047563870Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Sep 13 01:34:24.048353 env[1468]: time="2025-09-13T01:34:24.048333387Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Sep 13 01:34:24.048570 env[1468]: time="2025-09-13T01:34:24.048408627Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Sep 13 01:34:24.048570 env[1468]: time="2025-09-13T01:34:24.048426027Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Sep 13 01:34:24.048570 env[1468]: time="2025-09-13T01:34:24.048439107Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Sep 13 01:34:24.048570 env[1468]: time="2025-09-13T01:34:24.048451427Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Sep 13 01:34:24.048570 env[1468]: time="2025-09-13T01:34:24.048462387Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Sep 13 01:34:24.048570 env[1468]: time="2025-09-13T01:34:24.048474067Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Sep 13 01:34:24.048570 env[1468]: time="2025-09-13T01:34:24.048490507Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Sep 13 01:34:24.048877 env[1468]: time="2025-09-13T01:34:24.048858745Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Sep 13 01:34:24.049166 env[1468]: time="2025-09-13T01:34:24.049146864Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Sep 13 01:34:24.049248 env[1468]: time="2025-09-13T01:34:24.049233984Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Sep 13 01:34:24.049314 env[1468]: time="2025-09-13T01:34:24.049300544Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Sep 13 01:34:24.049372 env[1468]: time="2025-09-13T01:34:24.049357304Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Sep 13 01:34:24.049426 env[1468]: time="2025-09-13T01:34:24.049413663Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Sep 13 01:34:24.049489 env[1468]: time="2025-09-13T01:34:24.049475423Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Sep 13 01:34:24.049564 env[1468]: time="2025-09-13T01:34:24.049551503Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Sep 13 01:34:24.049876 env[1468]: time="2025-09-13T01:34:24.049822782Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Sep 13 01:34:24.080586 env[1468]: time="2025-09-13T01:34:24.050693459Z" level=info msg="Connect containerd service" Sep 13 01:34:24.080586 env[1468]: time="2025-09-13T01:34:24.050736179Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Sep 13 01:34:24.080586 env[1468]: time="2025-09-13T01:34:24.053007851Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 13 01:34:24.080586 env[1468]: time="2025-09-13T01:34:24.053230330Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Sep 13 01:34:24.080586 env[1468]: time="2025-09-13T01:34:24.053267770Z" level=info msg=serving... address=/run/containerd/containerd.sock Sep 13 01:34:24.080586 env[1468]: time="2025-09-13T01:34:24.053316210Z" level=info msg="containerd successfully booted in 0.069046s" Sep 13 01:34:24.080586 env[1468]: time="2025-09-13T01:34:24.056568119Z" level=info msg="Start subscribing containerd event" Sep 13 01:34:24.080586 env[1468]: time="2025-09-13T01:34:24.056626119Z" level=info msg="Start recovering state" Sep 13 01:34:24.080586 env[1468]: time="2025-09-13T01:34:24.056720558Z" level=info msg="Start event monitor" Sep 13 01:34:24.080586 env[1468]: time="2025-09-13T01:34:24.056743518Z" level=info msg="Start snapshots syncer" Sep 13 01:34:24.080586 env[1468]: time="2025-09-13T01:34:24.056753758Z" level=info msg="Start cni network conf syncer for default" Sep 13 01:34:24.080586 env[1468]: time="2025-09-13T01:34:24.056764638Z" level=info msg="Start streaming server" Sep 13 01:34:24.080908 bash[1489]: Updated "/home/core/.ssh/authorized_keys" Sep 13 01:34:24.053412 systemd[1]: Started containerd.service. Sep 13 01:34:24.074598 systemd[1]: Finished update-ssh-keys-after-ignition.service. Sep 13 01:34:24.099068 extend-filesystems[1449]: Old size kept for /dev/sda9 Sep 13 01:34:24.109211 extend-filesystems[1449]: Found sr0 Sep 13 01:34:24.103854 systemd[1]: extend-filesystems.service: Deactivated successfully. Sep 13 01:34:24.104002 systemd[1]: Finished extend-filesystems.service. Sep 13 01:34:24.235016 systemd[1]: nvidia.service: Deactivated successfully. Sep 13 01:34:24.531925 dbus-daemon[1447]: [system] SELinux support is enabled Sep 13 01:34:24.537919 dbus-daemon[1447]: [system] Successfully activated service 'org.freedesktop.systemd1' Sep 13 01:34:24.532143 systemd[1]: Started dbus.service. Sep 13 01:34:24.537423 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Sep 13 01:34:24.537445 systemd[1]: Reached target system-config.target. Sep 13 01:34:24.543597 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Sep 13 01:34:24.543617 systemd[1]: Reached target user-config.target. Sep 13 01:34:24.548702 systemd[1]: Started systemd-logind.service. Sep 13 01:34:24.728852 update_engine[1458]: I0913 01:34:24.705919 1458 main.cc:92] Flatcar Update Engine starting Sep 13 01:34:24.744162 systemd[1]: Started kubelet.service. Sep 13 01:34:24.799003 systemd[1]: Started update-engine.service. Sep 13 01:34:24.808861 update_engine[1458]: I0913 01:34:24.799031 1458 update_check_scheduler.cc:74] Next update check in 9m13s Sep 13 01:34:24.805032 systemd[1]: Started locksmithd.service. Sep 13 01:34:25.231802 kubelet[1545]: E0913 01:34:25.231749 1545 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 01:34:25.233742 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 01:34:25.233857 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 01:34:25.282391 sshd_keygen[1485]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Sep 13 01:34:25.298759 systemd[1]: Finished sshd-keygen.service. Sep 13 01:34:25.304384 systemd[1]: Starting issuegen.service... Sep 13 01:34:25.309533 systemd[1]: Started waagent.service. Sep 13 01:34:25.315177 systemd[1]: issuegen.service: Deactivated successfully. Sep 13 01:34:25.315314 systemd[1]: Finished issuegen.service. Sep 13 01:34:25.320554 systemd[1]: Starting systemd-user-sessions.service... Sep 13 01:34:25.374643 systemd[1]: Finished systemd-user-sessions.service. Sep 13 01:34:25.381312 systemd[1]: Started getty@tty1.service. Sep 13 01:34:25.386506 systemd[1]: Started serial-getty@ttyAMA0.service. Sep 13 01:34:25.395965 systemd[1]: Reached target getty.target. Sep 13 01:34:25.400280 systemd[1]: Reached target multi-user.target. Sep 13 01:34:25.406010 systemd[1]: Starting systemd-update-utmp-runlevel.service... Sep 13 01:34:25.413806 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Sep 13 01:34:25.413960 systemd[1]: Finished systemd-update-utmp-runlevel.service. Sep 13 01:34:25.420883 systemd[1]: Startup finished in 714ms (kernel) + 14.922s (initrd) + 32.208s (userspace) = 47.845s. Sep 13 01:34:26.304397 locksmithd[1546]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Sep 13 01:34:26.402341 login[1568]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Sep 13 01:34:26.450101 login[1569]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Sep 13 01:34:26.632269 systemd[1]: Created slice user-500.slice. Sep 13 01:34:26.633389 systemd[1]: Starting user-runtime-dir@500.service... Sep 13 01:34:26.635616 systemd-logind[1457]: New session 2 of user core. Sep 13 01:34:26.691671 systemd[1]: Finished user-runtime-dir@500.service. Sep 13 01:34:26.693040 systemd[1]: Starting user@500.service... Sep 13 01:34:26.773141 (systemd)[1573]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Sep 13 01:34:27.252846 systemd[1573]: Queued start job for default target default.target. Sep 13 01:34:27.253620 systemd[1573]: Reached target paths.target. Sep 13 01:34:27.253750 systemd[1573]: Reached target sockets.target. Sep 13 01:34:27.253816 systemd[1573]: Reached target timers.target. Sep 13 01:34:27.253972 systemd[1573]: Reached target basic.target. Sep 13 01:34:27.254133 systemd[1]: Started user@500.service. Sep 13 01:34:27.254850 systemd[1573]: Reached target default.target. Sep 13 01:34:27.254891 systemd[1573]: Startup finished in 475ms. Sep 13 01:34:27.254961 systemd[1]: Started session-2.scope. Sep 13 01:34:27.402734 login[1568]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Sep 13 01:34:27.407069 systemd[1]: Started session-1.scope. Sep 13 01:34:27.407615 systemd-logind[1457]: New session 1 of user core. Sep 13 01:34:35.343204 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Sep 13 01:34:35.343381 systemd[1]: Stopped kubelet.service. Sep 13 01:34:35.344703 systemd[1]: Starting kubelet.service... Sep 13 01:34:35.443700 systemd[1]: Started kubelet.service. Sep 13 01:34:35.569306 kubelet[1600]: E0913 01:34:35.569253 1600 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 01:34:35.572085 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 01:34:35.572203 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 01:34:37.076874 waagent[1564]: 2025-09-13T01:34:37.076770Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Sep 13 01:34:37.114491 waagent[1564]: 2025-09-13T01:34:37.114406Z INFO Daemon Daemon OS: flatcar 3510.3.8 Sep 13 01:34:37.119011 waagent[1564]: 2025-09-13T01:34:37.118950Z INFO Daemon Daemon Python: 3.9.16 Sep 13 01:34:37.123629 waagent[1564]: 2025-09-13T01:34:37.123566Z INFO Daemon Daemon Run daemon Sep 13 01:34:37.127838 waagent[1564]: 2025-09-13T01:34:37.127782Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.8' Sep 13 01:34:37.159412 waagent[1564]: 2025-09-13T01:34:37.159293Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Sep 13 01:34:37.173944 waagent[1564]: 2025-09-13T01:34:37.173832Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Sep 13 01:34:37.183345 waagent[1564]: 2025-09-13T01:34:37.183280Z INFO Daemon Daemon cloud-init is enabled: False Sep 13 01:34:37.188666 waagent[1564]: 2025-09-13T01:34:37.188595Z INFO Daemon Daemon Using waagent for provisioning Sep 13 01:34:37.194218 waagent[1564]: 2025-09-13T01:34:37.194161Z INFO Daemon Daemon Activate resource disk Sep 13 01:34:37.199014 waagent[1564]: 2025-09-13T01:34:37.198958Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Sep 13 01:34:37.213121 waagent[1564]: 2025-09-13T01:34:37.213064Z INFO Daemon Daemon Found device: None Sep 13 01:34:37.217771 waagent[1564]: 2025-09-13T01:34:37.217713Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Sep 13 01:34:37.226147 waagent[1564]: 2025-09-13T01:34:37.226091Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Sep 13 01:34:37.237607 waagent[1564]: 2025-09-13T01:34:37.237552Z INFO Daemon Daemon Clean protocol and wireserver endpoint Sep 13 01:34:37.243298 waagent[1564]: 2025-09-13T01:34:37.243242Z INFO Daemon Daemon Running default provisioning handler Sep 13 01:34:37.256354 waagent[1564]: 2025-09-13T01:34:37.256238Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Sep 13 01:34:37.270833 waagent[1564]: 2025-09-13T01:34:37.270718Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Sep 13 01:34:37.280220 waagent[1564]: 2025-09-13T01:34:37.280156Z INFO Daemon Daemon cloud-init is enabled: False Sep 13 01:34:37.285356 waagent[1564]: 2025-09-13T01:34:37.285296Z INFO Daemon Daemon Copying ovf-env.xml Sep 13 01:34:37.440758 waagent[1564]: 2025-09-13T01:34:37.439074Z INFO Daemon Daemon Successfully mounted dvd Sep 13 01:34:37.562791 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Sep 13 01:34:37.614737 waagent[1564]: 2025-09-13T01:34:37.614552Z INFO Daemon Daemon Detect protocol endpoint Sep 13 01:34:37.619813 waagent[1564]: 2025-09-13T01:34:37.619747Z INFO Daemon Daemon Clean protocol and wireserver endpoint Sep 13 01:34:37.625753 waagent[1564]: 2025-09-13T01:34:37.625689Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Sep 13 01:34:37.632774 waagent[1564]: 2025-09-13T01:34:37.632711Z INFO Daemon Daemon Test for route to 168.63.129.16 Sep 13 01:34:37.638418 waagent[1564]: 2025-09-13T01:34:37.638358Z INFO Daemon Daemon Route to 168.63.129.16 exists Sep 13 01:34:37.643596 waagent[1564]: 2025-09-13T01:34:37.643538Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Sep 13 01:34:37.804526 waagent[1564]: 2025-09-13T01:34:37.804405Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Sep 13 01:34:37.811240 waagent[1564]: 2025-09-13T01:34:37.811195Z INFO Daemon Daemon Wire protocol version:2012-11-30 Sep 13 01:34:37.816343 waagent[1564]: 2025-09-13T01:34:37.816288Z INFO Daemon Daemon Server preferred version:2015-04-05 Sep 13 01:34:38.680877 waagent[1564]: 2025-09-13T01:34:38.680717Z INFO Daemon Daemon Initializing goal state during protocol detection Sep 13 01:34:38.696242 waagent[1564]: 2025-09-13T01:34:38.696169Z INFO Daemon Daemon Forcing an update of the goal state.. Sep 13 01:34:38.702102 waagent[1564]: 2025-09-13T01:34:38.702040Z INFO Daemon Daemon Fetching goal state [incarnation 1] Sep 13 01:34:38.886140 waagent[1564]: 2025-09-13T01:34:38.885992Z INFO Daemon Daemon Found private key matching thumbprint 99A7F35E0A17925A576E62356EED0EE2C2D0F507 Sep 13 01:34:38.894808 waagent[1564]: 2025-09-13T01:34:38.894730Z INFO Daemon Daemon Fetch goal state completed Sep 13 01:34:38.944889 waagent[1564]: 2025-09-13T01:34:38.944777Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 9ce3c3db-653f-4b94-bf30-0db4609609fd New eTag: 12374006405458008245] Sep 13 01:34:38.955384 waagent[1564]: 2025-09-13T01:34:38.955303Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Sep 13 01:34:39.002162 waagent[1564]: 2025-09-13T01:34:39.002068Z INFO Daemon Daemon Starting provisioning Sep 13 01:34:39.007418 waagent[1564]: 2025-09-13T01:34:39.007344Z INFO Daemon Daemon Handle ovf-env.xml. Sep 13 01:34:39.012305 waagent[1564]: 2025-09-13T01:34:39.012247Z INFO Daemon Daemon Set hostname [ci-3510.3.8-n-669f7473be] Sep 13 01:34:39.069114 waagent[1564]: 2025-09-13T01:34:39.068980Z INFO Daemon Daemon Publish hostname [ci-3510.3.8-n-669f7473be] Sep 13 01:34:39.075694 waagent[1564]: 2025-09-13T01:34:39.075604Z INFO Daemon Daemon Examine /proc/net/route for primary interface Sep 13 01:34:39.082959 waagent[1564]: 2025-09-13T01:34:39.082893Z INFO Daemon Daemon Primary interface is [eth0] Sep 13 01:34:39.100274 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Sep 13 01:34:39.100429 systemd[1]: Stopped systemd-networkd-wait-online.service. Sep 13 01:34:39.100483 systemd[1]: Stopping systemd-networkd-wait-online.service... Sep 13 01:34:39.100737 systemd[1]: Stopping systemd-networkd.service... Sep 13 01:34:39.105704 systemd-networkd[1242]: eth0: DHCPv6 lease lost Sep 13 01:34:39.106987 systemd[1]: systemd-networkd.service: Deactivated successfully. Sep 13 01:34:39.107153 systemd[1]: Stopped systemd-networkd.service. Sep 13 01:34:39.109019 systemd[1]: Starting systemd-networkd.service... Sep 13 01:34:39.137543 systemd-networkd[1625]: enP54719s1: Link UP Sep 13 01:34:39.137557 systemd-networkd[1625]: enP54719s1: Gained carrier Sep 13 01:34:39.138592 systemd-networkd[1625]: eth0: Link UP Sep 13 01:34:39.138603 systemd-networkd[1625]: eth0: Gained carrier Sep 13 01:34:39.139034 systemd-networkd[1625]: lo: Link UP Sep 13 01:34:39.139045 systemd-networkd[1625]: lo: Gained carrier Sep 13 01:34:39.139298 systemd-networkd[1625]: eth0: Gained IPv6LL Sep 13 01:34:39.140509 systemd-networkd[1625]: Enumeration completed Sep 13 01:34:39.140622 systemd[1]: Started systemd-networkd.service. Sep 13 01:34:39.142255 systemd[1]: Starting systemd-networkd-wait-online.service... Sep 13 01:34:39.142259 systemd-networkd[1625]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 13 01:34:39.148974 waagent[1564]: 2025-09-13T01:34:39.148826Z INFO Daemon Daemon Create user account if not exists Sep 13 01:34:39.154535 waagent[1564]: 2025-09-13T01:34:39.154462Z INFO Daemon Daemon User core already exists, skip useradd Sep 13 01:34:39.160439 waagent[1564]: 2025-09-13T01:34:39.160368Z INFO Daemon Daemon Configure sudoer Sep 13 01:34:39.160743 systemd-networkd[1625]: eth0: DHCPv4 address 10.200.20.27/24, gateway 10.200.20.1 acquired from 168.63.129.16 Sep 13 01:34:39.165613 systemd[1]: Finished systemd-networkd-wait-online.service. Sep 13 01:34:39.180082 waagent[1564]: 2025-09-13T01:34:39.179983Z INFO Daemon Daemon Configure sshd Sep 13 01:34:39.184363 waagent[1564]: 2025-09-13T01:34:39.184289Z INFO Daemon Daemon Deploy ssh public key. Sep 13 01:34:40.418630 waagent[1564]: 2025-09-13T01:34:40.418552Z INFO Daemon Daemon Provisioning complete Sep 13 01:34:40.435795 waagent[1564]: 2025-09-13T01:34:40.435733Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Sep 13 01:34:40.441895 waagent[1564]: 2025-09-13T01:34:40.441820Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Sep 13 01:34:40.452969 waagent[1564]: 2025-09-13T01:34:40.452891Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Sep 13 01:34:40.746849 waagent[1631]: 2025-09-13T01:34:40.746707Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Sep 13 01:34:40.747931 waagent[1631]: 2025-09-13T01:34:40.747879Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 13 01:34:40.748163 waagent[1631]: 2025-09-13T01:34:40.748117Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 13 01:34:40.760378 waagent[1631]: 2025-09-13T01:34:40.760316Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Sep 13 01:34:40.760624 waagent[1631]: 2025-09-13T01:34:40.760576Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Sep 13 01:34:40.816931 waagent[1631]: 2025-09-13T01:34:40.816800Z INFO ExtHandler ExtHandler Found private key matching thumbprint 99A7F35E0A17925A576E62356EED0EE2C2D0F507 Sep 13 01:34:40.817373 waagent[1631]: 2025-09-13T01:34:40.817323Z INFO ExtHandler ExtHandler Fetch goal state completed Sep 13 01:34:40.831167 waagent[1631]: 2025-09-13T01:34:40.831115Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 1c06a0da-d779-4092-b024-cdf053da9216 New eTag: 12374006405458008245] Sep 13 01:34:40.831869 waagent[1631]: 2025-09-13T01:34:40.831812Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Sep 13 01:34:40.951475 waagent[1631]: 2025-09-13T01:34:40.951341Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.8; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Sep 13 01:34:40.975931 waagent[1631]: 2025-09-13T01:34:40.975853Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1631 Sep 13 01:34:40.979728 waagent[1631]: 2025-09-13T01:34:40.979668Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.8', '', 'Flatcar Container Linux by Kinvolk'] Sep 13 01:34:40.981066 waagent[1631]: 2025-09-13T01:34:40.981011Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Sep 13 01:34:41.145065 waagent[1631]: 2025-09-13T01:34:41.145011Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Sep 13 01:34:41.145619 waagent[1631]: 2025-09-13T01:34:41.145566Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Sep 13 01:34:41.153247 waagent[1631]: 2025-09-13T01:34:41.153196Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Sep 13 01:34:41.153860 waagent[1631]: 2025-09-13T01:34:41.153803Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Sep 13 01:34:41.155107 waagent[1631]: 2025-09-13T01:34:41.155047Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Sep 13 01:34:41.156524 waagent[1631]: 2025-09-13T01:34:41.156458Z INFO ExtHandler ExtHandler Starting env monitor service. Sep 13 01:34:41.156807 waagent[1631]: 2025-09-13T01:34:41.156737Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 13 01:34:41.157338 waagent[1631]: 2025-09-13T01:34:41.157270Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 13 01:34:41.157949 waagent[1631]: 2025-09-13T01:34:41.157877Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Sep 13 01:34:41.158387 waagent[1631]: 2025-09-13T01:34:41.158328Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Sep 13 01:34:41.159226 waagent[1631]: 2025-09-13T01:34:41.159097Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Sep 13 01:34:41.159462 waagent[1631]: 2025-09-13T01:34:41.159399Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 13 01:34:41.159629 waagent[1631]: 2025-09-13T01:34:41.159572Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Sep 13 01:34:41.159888 waagent[1631]: 2025-09-13T01:34:41.159821Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Sep 13 01:34:41.159888 waagent[1631]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Sep 13 01:34:41.159888 waagent[1631]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Sep 13 01:34:41.159888 waagent[1631]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Sep 13 01:34:41.159888 waagent[1631]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Sep 13 01:34:41.159888 waagent[1631]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Sep 13 01:34:41.159888 waagent[1631]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Sep 13 01:34:41.162566 waagent[1631]: 2025-09-13T01:34:41.162400Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 13 01:34:41.163069 waagent[1631]: 2025-09-13T01:34:41.162992Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Sep 13 01:34:41.163448 waagent[1631]: 2025-09-13T01:34:41.163370Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Sep 13 01:34:41.163745 waagent[1631]: 2025-09-13T01:34:41.163670Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Sep 13 01:34:41.165094 waagent[1631]: 2025-09-13T01:34:41.165021Z INFO EnvHandler ExtHandler Configure routes Sep 13 01:34:41.166315 waagent[1631]: 2025-09-13T01:34:41.166253Z INFO EnvHandler ExtHandler Gateway:None Sep 13 01:34:41.166534 waagent[1631]: 2025-09-13T01:34:41.166488Z INFO EnvHandler ExtHandler Routes:None Sep 13 01:34:41.175216 waagent[1631]: 2025-09-13T01:34:41.175149Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Sep 13 01:34:41.176756 waagent[1631]: 2025-09-13T01:34:41.176691Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Sep 13 01:34:41.179390 waagent[1631]: 2025-09-13T01:34:41.179322Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Sep 13 01:34:41.246143 waagent[1631]: 2025-09-13T01:34:41.246061Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Sep 13 01:34:41.253051 waagent[1631]: 2025-09-13T01:34:41.252989Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1625' Sep 13 01:34:41.406328 waagent[1631]: 2025-09-13T01:34:41.406145Z INFO MonitorHandler ExtHandler Network interfaces: Sep 13 01:34:41.406328 waagent[1631]: Executing ['ip', '-a', '-o', 'link']: Sep 13 01:34:41.406328 waagent[1631]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Sep 13 01:34:41.406328 waagent[1631]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:bb:11:c1 brd ff:ff:ff:ff:ff:ff Sep 13 01:34:41.406328 waagent[1631]: 3: enP54719s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:bb:11:c1 brd ff:ff:ff:ff:ff:ff\ altname enP54719p0s2 Sep 13 01:34:41.406328 waagent[1631]: Executing ['ip', '-4', '-a', '-o', 'address']: Sep 13 01:34:41.406328 waagent[1631]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Sep 13 01:34:41.406328 waagent[1631]: 2: eth0 inet 10.200.20.27/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Sep 13 01:34:41.406328 waagent[1631]: Executing ['ip', '-6', '-a', '-o', 'address']: Sep 13 01:34:41.406328 waagent[1631]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Sep 13 01:34:41.406328 waagent[1631]: 2: eth0 inet6 fe80::222:48ff:febb:11c1/64 scope link \ valid_lft forever preferred_lft forever Sep 13 01:34:41.606340 waagent[1631]: 2025-09-13T01:34:41.606276Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.14.0.1 -- exiting Sep 13 01:34:42.457009 waagent[1564]: 2025-09-13T01:34:42.456886Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Sep 13 01:34:42.462335 waagent[1564]: 2025-09-13T01:34:42.462282Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.14.0.1 to be the latest agent Sep 13 01:34:43.765204 waagent[1660]: 2025-09-13T01:34:43.765112Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.14.0.1) Sep 13 01:34:43.766266 waagent[1660]: 2025-09-13T01:34:43.766207Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.8 Sep 13 01:34:43.766519 waagent[1660]: 2025-09-13T01:34:43.766469Z INFO ExtHandler ExtHandler Python: 3.9.16 Sep 13 01:34:43.766789 waagent[1660]: 2025-09-13T01:34:43.766736Z INFO ExtHandler ExtHandler CPU Arch: aarch64 Sep 13 01:34:43.781708 waagent[1660]: 2025-09-13T01:34:43.781589Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.8; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: aarch64; systemd: True; systemd_version: systemd 252 (252); LISDrivers: Absent; logrotate: logrotate 3.20.1; Sep 13 01:34:43.782240 waagent[1660]: 2025-09-13T01:34:43.782186Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 13 01:34:43.782510 waagent[1660]: 2025-09-13T01:34:43.782461Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 13 01:34:43.782885 waagent[1660]: 2025-09-13T01:34:43.782830Z INFO ExtHandler ExtHandler Initializing the goal state... Sep 13 01:34:43.796749 waagent[1660]: 2025-09-13T01:34:43.796680Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Sep 13 01:34:43.808511 waagent[1660]: 2025-09-13T01:34:43.808454Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.175 Sep 13 01:34:43.809706 waagent[1660]: 2025-09-13T01:34:43.809621Z INFO ExtHandler Sep 13 01:34:43.809988 waagent[1660]: 2025-09-13T01:34:43.809935Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: d561edac-c66b-42a6-aafc-1d2e5cf04071 eTag: 12374006405458008245 source: Fabric] Sep 13 01:34:43.810904 waagent[1660]: 2025-09-13T01:34:43.810843Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Sep 13 01:34:43.812337 waagent[1660]: 2025-09-13T01:34:43.812272Z INFO ExtHandler Sep 13 01:34:43.812591 waagent[1660]: 2025-09-13T01:34:43.812541Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Sep 13 01:34:43.819527 waagent[1660]: 2025-09-13T01:34:43.819477Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Sep 13 01:34:43.820167 waagent[1660]: 2025-09-13T01:34:43.820117Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Sep 13 01:34:43.839189 waagent[1660]: 2025-09-13T01:34:43.839131Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Sep 13 01:34:43.903644 waagent[1660]: 2025-09-13T01:34:43.903524Z INFO ExtHandler Downloaded certificate {'thumbprint': '99A7F35E0A17925A576E62356EED0EE2C2D0F507', 'hasPrivateKey': True} Sep 13 01:34:43.905279 waagent[1660]: 2025-09-13T01:34:43.905218Z INFO ExtHandler Fetch goal state from WireServer completed Sep 13 01:34:43.906341 waagent[1660]: 2025-09-13T01:34:43.906281Z INFO ExtHandler ExtHandler Goal state initialization completed. Sep 13 01:34:43.924972 waagent[1660]: 2025-09-13T01:34:43.924873Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.15 3 Sep 2024 (Library: OpenSSL 3.0.15 3 Sep 2024) Sep 13 01:34:43.933850 waagent[1660]: 2025-09-13T01:34:43.933756Z INFO ExtHandler ExtHandler Using iptables [version 1.8.8] to manage firewall rules Sep 13 01:34:43.937924 waagent[1660]: 2025-09-13T01:34:43.937830Z INFO ExtHandler ExtHandler Did not find a legacy firewall rule: ['iptables', '-w', '-t', 'security', '-C', 'OUTPUT', '-d', '168.63.129.16', '-p', 'tcp', '-m', 'conntrack', '--ctstate', 'INVALID,NEW', '-j', 'ACCEPT'] Sep 13 01:34:43.938253 waagent[1660]: 2025-09-13T01:34:43.938201Z INFO ExtHandler ExtHandler Checking state of the firewall Sep 13 01:34:44.138839 waagent[1660]: 2025-09-13T01:34:44.138709Z INFO ExtHandler ExtHandler Created firewall rules for Azure Fabric: Sep 13 01:34:44.138839 waagent[1660]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Sep 13 01:34:44.138839 waagent[1660]: pkts bytes target prot opt in out source destination Sep 13 01:34:44.138839 waagent[1660]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Sep 13 01:34:44.138839 waagent[1660]: pkts bytes target prot opt in out source destination Sep 13 01:34:44.138839 waagent[1660]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Sep 13 01:34:44.138839 waagent[1660]: pkts bytes target prot opt in out source destination Sep 13 01:34:44.138839 waagent[1660]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Sep 13 01:34:44.138839 waagent[1660]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Sep 13 01:34:44.138839 waagent[1660]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Sep 13 01:34:44.140012 waagent[1660]: 2025-09-13T01:34:44.139951Z INFO ExtHandler ExtHandler Setting up persistent firewall rules Sep 13 01:34:44.143308 waagent[1660]: 2025-09-13T01:34:44.143199Z INFO ExtHandler ExtHandler The firewalld service is not present on the system Sep 13 01:34:44.143582 waagent[1660]: 2025-09-13T01:34:44.143531Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Sep 13 01:34:44.143989 waagent[1660]: 2025-09-13T01:34:44.143927Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Sep 13 01:34:44.152784 waagent[1660]: 2025-09-13T01:34:44.152725Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Sep 13 01:34:44.153294 waagent[1660]: 2025-09-13T01:34:44.153238Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Sep 13 01:34:44.161469 waagent[1660]: 2025-09-13T01:34:44.161405Z INFO ExtHandler ExtHandler WALinuxAgent-2.14.0.1 running as process 1660 Sep 13 01:34:44.164834 waagent[1660]: 2025-09-13T01:34:44.164771Z INFO ExtHandler ExtHandler [CGI] Cgroups is not currently supported on ['flatcar', '3510.3.8', '', 'Flatcar Container Linux by Kinvolk'] Sep 13 01:34:44.165657 waagent[1660]: 2025-09-13T01:34:44.165591Z INFO ExtHandler ExtHandler [CGI] Agent will reset the quotas in case cgroup usage went from enabled to disabled Sep 13 01:34:44.166565 waagent[1660]: 2025-09-13T01:34:44.166504Z INFO ExtHandler ExtHandler [CGI] Agent cgroups enabled: False Sep 13 01:34:44.169339 waagent[1660]: 2025-09-13T01:34:44.169279Z INFO ExtHandler ExtHandler Signing certificate written to /var/lib/waagent/microsoft_root_certificate.pem Sep 13 01:34:44.169697 waagent[1660]: 2025-09-13T01:34:44.169623Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: 1. configuration enabled [True], 2. cgroups v1 enabled [False] OR cgroups v2 is in use and v2 resource limiting configuration enabled [False], 3. python supported: [True] Sep 13 01:34:44.171108 waagent[1660]: 2025-09-13T01:34:44.171039Z INFO ExtHandler ExtHandler Starting env monitor service. Sep 13 01:34:44.171618 waagent[1660]: 2025-09-13T01:34:44.171556Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 13 01:34:44.171914 waagent[1660]: 2025-09-13T01:34:44.171864Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 13 01:34:44.172570 waagent[1660]: 2025-09-13T01:34:44.172514Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Sep 13 01:34:44.173049 waagent[1660]: 2025-09-13T01:34:44.172993Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Sep 13 01:34:44.173049 waagent[1660]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Sep 13 01:34:44.173049 waagent[1660]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Sep 13 01:34:44.173049 waagent[1660]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Sep 13 01:34:44.173049 waagent[1660]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Sep 13 01:34:44.173049 waagent[1660]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Sep 13 01:34:44.173049 waagent[1660]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Sep 13 01:34:44.176251 waagent[1660]: 2025-09-13T01:34:44.176157Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Sep 13 01:34:44.176633 waagent[1660]: 2025-09-13T01:34:44.176550Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Sep 13 01:34:44.179546 waagent[1660]: 2025-09-13T01:34:44.179374Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Sep 13 01:34:44.179791 waagent[1660]: 2025-09-13T01:34:44.179717Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Sep 13 01:34:44.180035 waagent[1660]: 2025-09-13T01:34:44.179966Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Sep 13 01:34:44.180737 waagent[1660]: 2025-09-13T01:34:44.180675Z INFO EnvHandler ExtHandler Configure routes Sep 13 01:34:44.182307 waagent[1660]: 2025-09-13T01:34:44.182237Z INFO EnvHandler ExtHandler Gateway:None Sep 13 01:34:44.182476 waagent[1660]: 2025-09-13T01:34:44.182425Z INFO EnvHandler ExtHandler Routes:None Sep 13 01:34:44.186102 waagent[1660]: 2025-09-13T01:34:44.186022Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Sep 13 01:34:44.186409 waagent[1660]: 2025-09-13T01:34:44.186311Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Sep 13 01:34:44.186868 waagent[1660]: 2025-09-13T01:34:44.186805Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Sep 13 01:34:44.197204 waagent[1660]: 2025-09-13T01:34:44.197134Z INFO MonitorHandler ExtHandler Network interfaces: Sep 13 01:34:44.197204 waagent[1660]: Executing ['ip', '-a', '-o', 'link']: Sep 13 01:34:44.197204 waagent[1660]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Sep 13 01:34:44.197204 waagent[1660]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:bb:11:c1 brd ff:ff:ff:ff:ff:ff Sep 13 01:34:44.197204 waagent[1660]: 3: enP54719s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:bb:11:c1 brd ff:ff:ff:ff:ff:ff\ altname enP54719p0s2 Sep 13 01:34:44.197204 waagent[1660]: Executing ['ip', '-4', '-a', '-o', 'address']: Sep 13 01:34:44.197204 waagent[1660]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Sep 13 01:34:44.197204 waagent[1660]: 2: eth0 inet 10.200.20.27/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Sep 13 01:34:44.197204 waagent[1660]: Executing ['ip', '-6', '-a', '-o', 'address']: Sep 13 01:34:44.197204 waagent[1660]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Sep 13 01:34:44.197204 waagent[1660]: 2: eth0 inet6 fe80::222:48ff:febb:11c1/64 scope link \ valid_lft forever preferred_lft forever Sep 13 01:34:44.209367 waagent[1660]: 2025-09-13T01:34:44.209282Z INFO ExtHandler ExtHandler Downloading agent manifest Sep 13 01:34:44.227688 waagent[1660]: 2025-09-13T01:34:44.227580Z INFO ExtHandler ExtHandler Sep 13 01:34:44.229415 waagent[1660]: 2025-09-13T01:34:44.229346Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: f7db6fb3-c57d-43d0-879e-c2cb27152141 correlation 6fc0acc7-8fdd-43f4-aa4a-25a4afb52172 created: 2025-09-13T01:32:50.087898Z] Sep 13 01:34:44.233032 waagent[1660]: 2025-09-13T01:34:44.232959Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Sep 13 01:34:44.236454 waagent[1660]: 2025-09-13T01:34:44.236392Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 8 ms] Sep 13 01:34:44.255714 waagent[1660]: 2025-09-13T01:34:44.255586Z INFO EnvHandler ExtHandler Using iptables [version 1.8.8] to manage firewall rules Sep 13 01:34:44.260454 waagent[1660]: 2025-09-13T01:34:44.260394Z INFO ExtHandler ExtHandler Looking for existing remote access users. Sep 13 01:34:44.270347 waagent[1660]: 2025-09-13T01:34:44.270280Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Sep 13 01:34:44.272405 waagent[1660]: 2025-09-13T01:34:44.272344Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.14.0.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 9F217C88-EB2A-4F16-8D4D-D4BFBB54999B;UpdateGSErrors: 0;AutoUpdate: 1;UpdateMode: SelfUpdate;] Sep 13 01:34:45.593237 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Sep 13 01:34:45.593408 systemd[1]: Stopped kubelet.service. Sep 13 01:34:45.594783 systemd[1]: Starting kubelet.service... Sep 13 01:34:45.683494 systemd[1]: Started kubelet.service. Sep 13 01:34:45.807931 kubelet[1705]: E0913 01:34:45.807893 1705 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 01:34:45.810130 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 01:34:45.810259 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 01:34:55.843260 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Sep 13 01:34:55.843434 systemd[1]: Stopped kubelet.service. Sep 13 01:34:55.844773 systemd[1]: Starting kubelet.service... Sep 13 01:34:55.932144 systemd[1]: Started kubelet.service. Sep 13 01:34:56.060095 kubelet[1714]: E0913 01:34:56.060048 1714 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 01:34:56.062304 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 01:34:56.062418 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 01:34:58.609574 kernel: hv_balloon: Max. dynamic memory size: 4096 MB Sep 13 01:35:06.093255 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Sep 13 01:35:06.093423 systemd[1]: Stopped kubelet.service. Sep 13 01:35:06.094793 systemd[1]: Starting kubelet.service... Sep 13 01:35:06.182173 systemd[1]: Started kubelet.service. Sep 13 01:35:06.293755 kubelet[1723]: E0913 01:35:06.293698 1723 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 01:35:06.295861 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 01:35:06.295979 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 01:35:06.998569 systemd[1]: Created slice system-sshd.slice. Sep 13 01:35:09.793691 update_engine[1458]: I0913 01:35:09.590700 1458 update_attempter.cc:509] Updating boot flags... Sep 13 01:35:07.000019 systemd[1]: Started sshd@0-10.200.20.27:22-10.200.16.10:40024.service. Sep 13 01:35:10.523617 sshd[1729]: Accepted publickey for core from 10.200.16.10 port 40024 ssh2: RSA SHA256:2vdFvqmv97G7XTFyIQCFZZcqRFoIpW6ty3nYdUf/oyk Sep 13 01:35:10.544299 sshd[1729]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 01:35:10.548230 systemd[1]: Started session-3.scope. Sep 13 01:35:10.548633 systemd-logind[1457]: New session 3 of user core. Sep 13 01:35:10.925431 systemd[1]: Started sshd@1-10.200.20.27:22-10.200.16.10:36116.service. Sep 13 01:35:11.371498 sshd[1773]: Accepted publickey for core from 10.200.16.10 port 36116 ssh2: RSA SHA256:2vdFvqmv97G7XTFyIQCFZZcqRFoIpW6ty3nYdUf/oyk Sep 13 01:35:11.373076 sshd[1773]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 01:35:11.376693 systemd-logind[1457]: New session 4 of user core. Sep 13 01:35:11.377118 systemd[1]: Started session-4.scope. Sep 13 01:35:11.730255 sshd[1773]: pam_unix(sshd:session): session closed for user core Sep 13 01:35:11.732847 systemd[1]: sshd@1-10.200.20.27:22-10.200.16.10:36116.service: Deactivated successfully. Sep 13 01:35:11.733508 systemd[1]: session-4.scope: Deactivated successfully. Sep 13 01:35:11.734034 systemd-logind[1457]: Session 4 logged out. Waiting for processes to exit. Sep 13 01:35:11.734676 systemd-logind[1457]: Removed session 4. Sep 13 01:35:11.796101 systemd[1]: Started sshd@2-10.200.20.27:22-10.200.16.10:36124.service. Sep 13 01:35:12.214990 sshd[1779]: Accepted publickey for core from 10.200.16.10 port 36124 ssh2: RSA SHA256:2vdFvqmv97G7XTFyIQCFZZcqRFoIpW6ty3nYdUf/oyk Sep 13 01:35:12.216225 sshd[1779]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 01:35:12.219981 systemd-logind[1457]: New session 5 of user core. Sep 13 01:35:12.220368 systemd[1]: Started session-5.scope. Sep 13 01:35:12.526336 sshd[1779]: pam_unix(sshd:session): session closed for user core Sep 13 01:35:12.528781 systemd[1]: sshd@2-10.200.20.27:22-10.200.16.10:36124.service: Deactivated successfully. Sep 13 01:35:12.529420 systemd[1]: session-5.scope: Deactivated successfully. Sep 13 01:35:12.529953 systemd-logind[1457]: Session 5 logged out. Waiting for processes to exit. Sep 13 01:35:12.530767 systemd-logind[1457]: Removed session 5. Sep 13 01:35:12.596430 systemd[1]: Started sshd@3-10.200.20.27:22-10.200.16.10:36130.service. Sep 13 01:35:13.015057 sshd[1785]: Accepted publickey for core from 10.200.16.10 port 36130 ssh2: RSA SHA256:2vdFvqmv97G7XTFyIQCFZZcqRFoIpW6ty3nYdUf/oyk Sep 13 01:35:13.016279 sshd[1785]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 01:35:13.020033 systemd-logind[1457]: New session 6 of user core. Sep 13 01:35:13.020426 systemd[1]: Started session-6.scope. Sep 13 01:35:13.336534 sshd[1785]: pam_unix(sshd:session): session closed for user core Sep 13 01:35:13.339108 systemd[1]: sshd@3-10.200.20.27:22-10.200.16.10:36130.service: Deactivated successfully. Sep 13 01:35:13.340003 systemd[1]: session-6.scope: Deactivated successfully. Sep 13 01:35:13.340705 systemd-logind[1457]: Session 6 logged out. Waiting for processes to exit. Sep 13 01:35:13.341394 systemd-logind[1457]: Removed session 6. Sep 13 01:35:13.404845 systemd[1]: Started sshd@4-10.200.20.27:22-10.200.16.10:36138.service. Sep 13 01:35:13.812929 sshd[1791]: Accepted publickey for core from 10.200.16.10 port 36138 ssh2: RSA SHA256:2vdFvqmv97G7XTFyIQCFZZcqRFoIpW6ty3nYdUf/oyk Sep 13 01:35:13.814424 sshd[1791]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 01:35:13.818477 systemd[1]: Started session-7.scope. Sep 13 01:35:13.818994 systemd-logind[1457]: New session 7 of user core. Sep 13 01:35:14.453307 sudo[1794]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Sep 13 01:35:14.453533 sudo[1794]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 01:35:14.509850 dbus-daemon[1447]: avc: received setenforce notice (enforcing=1) Sep 13 01:35:14.511678 sudo[1794]: pam_unix(sudo:session): session closed for user root Sep 13 01:35:14.607182 sshd[1791]: pam_unix(sshd:session): session closed for user core Sep 13 01:35:14.609924 systemd[1]: sshd@4-10.200.20.27:22-10.200.16.10:36138.service: Deactivated successfully. Sep 13 01:35:14.610680 systemd[1]: session-7.scope: Deactivated successfully. Sep 13 01:35:14.611198 systemd-logind[1457]: Session 7 logged out. Waiting for processes to exit. Sep 13 01:35:14.611931 systemd-logind[1457]: Removed session 7. Sep 13 01:35:14.678794 systemd[1]: Started sshd@5-10.200.20.27:22-10.200.16.10:36152.service. Sep 13 01:35:15.097264 sshd[1798]: Accepted publickey for core from 10.200.16.10 port 36152 ssh2: RSA SHA256:2vdFvqmv97G7XTFyIQCFZZcqRFoIpW6ty3nYdUf/oyk Sep 13 01:35:15.098551 sshd[1798]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 01:35:15.102730 systemd-logind[1457]: New session 8 of user core. Sep 13 01:35:15.102731 systemd[1]: Started session-8.scope. Sep 13 01:35:15.338698 sudo[1802]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Sep 13 01:35:15.338920 sudo[1802]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 01:35:15.341267 sudo[1802]: pam_unix(sudo:session): session closed for user root Sep 13 01:35:15.345102 sudo[1801]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Sep 13 01:35:15.345291 sudo[1801]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 01:35:15.353164 systemd[1]: Stopping audit-rules.service... Sep 13 01:35:15.352000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 13 01:35:15.365143 auditctl[1805]: No rules Sep 13 01:35:15.365470 systemd[1]: audit-rules.service: Deactivated successfully. Sep 13 01:35:15.365631 systemd[1]: Stopped audit-rules.service. Sep 13 01:35:15.365719 kernel: audit: type=1305 audit(1757727315.352:211): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 13 01:35:15.352000 audit[1805]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffe7ea1f50 a2=420 a3=0 items=0 ppid=1 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:15.367060 systemd[1]: Starting audit-rules.service... Sep 13 01:35:15.352000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Sep 13 01:35:15.395004 kernel: audit: type=1300 audit(1757727315.352:211): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffe7ea1f50 a2=420 a3=0 items=0 ppid=1 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:15.395080 kernel: audit: type=1327 audit(1757727315.352:211): proctitle=2F7362696E2F617564697463746C002D44 Sep 13 01:35:15.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:15.410336 kernel: audit: type=1131 audit(1757727315.364:212): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:15.410589 augenrules[1822]: No rules Sep 13 01:35:15.411432 systemd[1]: Finished audit-rules.service. Sep 13 01:35:15.412602 sudo[1801]: pam_unix(sudo:session): session closed for user root Sep 13 01:35:15.409000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:15.410000 audit[1801]: USER_END pid=1801 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 01:35:15.428696 kernel: audit: type=1130 audit(1757727315.409:213): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:15.411000 audit[1801]: CRED_DISP pid=1801 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 01:35:15.461632 kernel: audit: type=1106 audit(1757727315.410:214): pid=1801 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 01:35:15.461773 kernel: audit: type=1104 audit(1757727315.411:215): pid=1801 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 01:35:15.507963 sshd[1798]: pam_unix(sshd:session): session closed for user core Sep 13 01:35:15.507000 audit[1798]: USER_END pid=1798 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:35:15.531955 systemd[1]: sshd@5-10.200.20.27:22-10.200.16.10:36152.service: Deactivated successfully. Sep 13 01:35:15.507000 audit[1798]: CRED_DISP pid=1798 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:35:15.550328 kernel: audit: type=1106 audit(1757727315.507:216): pid=1798 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:35:15.550395 kernel: audit: type=1104 audit(1757727315.507:217): pid=1798 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:35:15.532634 systemd[1]: session-8.scope: Deactivated successfully. Sep 13 01:35:15.530000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.27:22-10.200.16.10:36152 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:15.551163 systemd-logind[1457]: Session 8 logged out. Waiting for processes to exit. Sep 13 01:35:15.570338 systemd-logind[1457]: Removed session 8. Sep 13 01:35:15.570695 kernel: audit: type=1131 audit(1757727315.530:218): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.27:22-10.200.16.10:36152 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:15.574587 systemd[1]: Started sshd@6-10.200.20.27:22-10.200.16.10:36162.service. Sep 13 01:35:15.573000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.27:22-10.200.16.10:36162 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:15.982000 audit[1828]: USER_ACCT pid=1828 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:35:15.985008 sshd[1828]: Accepted publickey for core from 10.200.16.10 port 36162 ssh2: RSA SHA256:2vdFvqmv97G7XTFyIQCFZZcqRFoIpW6ty3nYdUf/oyk Sep 13 01:35:15.983000 audit[1828]: CRED_ACQ pid=1828 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:35:15.983000 audit[1828]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffec2b2cd0 a2=3 a3=1 items=0 ppid=1 pid=1828 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:15.983000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 01:35:15.985534 sshd[1828]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 01:35:15.989611 systemd[1]: Started session-9.scope. Sep 13 01:35:15.990678 systemd-logind[1457]: New session 9 of user core. Sep 13 01:35:15.992000 audit[1828]: USER_START pid=1828 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:35:15.994000 audit[1830]: CRED_ACQ pid=1830 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:35:16.219000 audit[1831]: USER_ACCT pid=1831 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 01:35:16.221256 sudo[1831]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Sep 13 01:35:16.219000 audit[1831]: CRED_REFR pid=1831 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 01:35:16.221470 sudo[1831]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 01:35:16.221000 audit[1831]: USER_START pid=1831 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 01:35:16.248582 systemd[1]: Starting coreos-metadata.service... Sep 13 01:35:16.341000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:16.341000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:16.343229 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 5. Sep 13 01:35:16.343474 systemd[1]: Stopped kubelet.service. Sep 13 01:35:16.344860 systemd[1]: Starting kubelet.service... Sep 13 01:35:16.360285 coreos-metadata[1835]: Sep 13 01:35:16.360 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Sep 13 01:35:16.363047 coreos-metadata[1835]: Sep 13 01:35:16.363 INFO Fetch successful Sep 13 01:35:16.363206 coreos-metadata[1835]: Sep 13 01:35:16.363 INFO Fetching http://168.63.129.16/machine/?comp=goalstate: Attempt #1 Sep 13 01:35:16.364881 coreos-metadata[1835]: Sep 13 01:35:16.364 INFO Fetch successful Sep 13 01:35:16.365212 coreos-metadata[1835]: Sep 13 01:35:16.365 INFO Fetching http://168.63.129.16/machine/622f1a1b-fa59-46c0-bb3c-0928fa959106/f00fcf9b%2D0019%2D4c89%2D8a0b%2Dbc164b9623d5.%5Fci%2D3510.3.8%2Dn%2D669f7473be?comp=config&type=sharedConfig&incarnation=1: Attempt #1 Sep 13 01:35:16.367065 coreos-metadata[1835]: Sep 13 01:35:16.367 INFO Fetch successful Sep 13 01:35:16.401227 coreos-metadata[1835]: Sep 13 01:35:16.401 INFO Fetching http://169.254.169.254/metadata/instance/compute/vmSize?api-version=2017-08-01&format=text: Attempt #1 Sep 13 01:35:16.411739 coreos-metadata[1835]: Sep 13 01:35:16.411 INFO Fetch successful Sep 13 01:35:16.419932 systemd[1]: Finished coreos-metadata.service. Sep 13 01:35:16.418000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:16.577000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:16.578818 systemd[1]: Started kubelet.service. Sep 13 01:35:16.614826 kubelet[1856]: E0913 01:35:16.614630 1856 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 01:35:16.616686 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 01:35:16.616806 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 01:35:16.615000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Sep 13 01:35:16.945753 systemd[1]: Stopped kubelet.service. Sep 13 01:35:16.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:16.944000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:16.947841 systemd[1]: Starting kubelet.service... Sep 13 01:35:16.976100 systemd[1]: Reloading. Sep 13 01:35:17.061349 /usr/lib/systemd/system-generators/torcx-generator[1899]: time="2025-09-13T01:35:17Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 13 01:35:17.062186 /usr/lib/systemd/system-generators/torcx-generator[1899]: time="2025-09-13T01:35:17Z" level=info msg="torcx already run" Sep 13 01:35:17.132229 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 13 01:35:17.132496 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 13 01:35:17.148716 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 13 01:35:17.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.224000 audit: BPF prog-id=41 op=LOAD Sep 13 01:35:17.224000 audit: BPF prog-id=35 op=UNLOAD Sep 13 01:35:17.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.225000 audit: BPF prog-id=42 op=LOAD Sep 13 01:35:17.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.225000 audit: BPF prog-id=43 op=LOAD Sep 13 01:35:17.225000 audit: BPF prog-id=36 op=UNLOAD Sep 13 01:35:17.225000 audit: BPF prog-id=37 op=UNLOAD Sep 13 01:35:17.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.226000 audit: BPF prog-id=44 op=LOAD Sep 13 01:35:17.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.227000 audit: BPF prog-id=45 op=LOAD Sep 13 01:35:17.227000 audit: BPF prog-id=24 op=UNLOAD Sep 13 01:35:17.227000 audit: BPF prog-id=25 op=UNLOAD Sep 13 01:35:17.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.229000 audit: BPF prog-id=46 op=LOAD Sep 13 01:35:17.229000 audit: BPF prog-id=34 op=UNLOAD Sep 13 01:35:17.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.230000 audit: BPF prog-id=47 op=LOAD Sep 13 01:35:17.230000 audit: BPF prog-id=40 op=UNLOAD Sep 13 01:35:17.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.231000 audit: BPF prog-id=48 op=LOAD Sep 13 01:35:17.231000 audit: BPF prog-id=33 op=UNLOAD Sep 13 01:35:17.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.233000 audit: BPF prog-id=49 op=LOAD Sep 13 01:35:17.233000 audit: BPF prog-id=38 op=UNLOAD Sep 13 01:35:17.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.235000 audit: BPF prog-id=50 op=LOAD Sep 13 01:35:17.235000 audit: BPF prog-id=27 op=UNLOAD Sep 13 01:35:17.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.236000 audit: BPF prog-id=51 op=LOAD Sep 13 01:35:17.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.236000 audit: BPF prog-id=52 op=LOAD Sep 13 01:35:17.236000 audit: BPF prog-id=28 op=UNLOAD Sep 13 01:35:17.236000 audit: BPF prog-id=29 op=UNLOAD Sep 13 01:35:17.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.237000 audit: BPF prog-id=53 op=LOAD Sep 13 01:35:17.237000 audit: BPF prog-id=30 op=UNLOAD Sep 13 01:35:17.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.238000 audit: BPF prog-id=54 op=LOAD Sep 13 01:35:17.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:17.238000 audit: BPF prog-id=55 op=LOAD Sep 13 01:35:17.238000 audit: BPF prog-id=31 op=UNLOAD Sep 13 01:35:17.238000 audit: BPF prog-id=32 op=UNLOAD Sep 13 01:35:17.265828 systemd[1]: Started kubelet.service. Sep 13 01:35:17.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:17.271245 systemd[1]: Stopping kubelet.service... Sep 13 01:35:17.271993 systemd[1]: kubelet.service: Deactivated successfully. Sep 13 01:35:17.272236 systemd[1]: Stopped kubelet.service. Sep 13 01:35:17.270000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:17.274427 systemd[1]: Starting kubelet.service... Sep 13 01:35:17.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:17.545534 systemd[1]: Started kubelet.service. Sep 13 01:35:17.658253 kubelet[1971]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 13 01:35:17.658253 kubelet[1971]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Sep 13 01:35:17.658253 kubelet[1971]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 13 01:35:17.658594 kubelet[1971]: I0913 01:35:17.658296 1971 server.go:212] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Sep 13 01:35:18.306908 kubelet[1971]: I0913 01:35:18.306870 1971 server.go:530] "Kubelet version" kubeletVersion="v1.33.0" Sep 13 01:35:18.306908 kubelet[1971]: I0913 01:35:18.306900 1971 server.go:532] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Sep 13 01:35:18.307130 kubelet[1971]: I0913 01:35:18.307110 1971 server.go:956] "Client rotation is on, will bootstrap in background" Sep 13 01:35:18.331240 kubelet[1971]: I0913 01:35:18.331216 1971 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Sep 13 01:35:18.340663 kubelet[1971]: E0913 01:35:18.340598 1971 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Sep 13 01:35:18.340663 kubelet[1971]: I0913 01:35:18.340645 1971 server.go:1423] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Sep 13 01:35:18.344974 kubelet[1971]: I0913 01:35:18.344950 1971 server.go:782] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Sep 13 01:35:18.346978 kubelet[1971]: I0913 01:35:18.346938 1971 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Sep 13 01:35:18.347232 kubelet[1971]: I0913 01:35:18.347072 1971 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.200.20.27","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"MemoryManagerPolicy":"None","MemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Sep 13 01:35:18.347353 kubelet[1971]: I0913 01:35:18.347342 1971 topology_manager.go:138] "Creating topology manager with none policy" Sep 13 01:35:18.347406 kubelet[1971]: I0913 01:35:18.347397 1971 container_manager_linux.go:303] "Creating device plugin manager" Sep 13 01:35:18.347581 kubelet[1971]: I0913 01:35:18.347569 1971 state_mem.go:36] "Initialized new in-memory state store" Sep 13 01:35:18.350758 kubelet[1971]: I0913 01:35:18.350740 1971 kubelet.go:480] "Attempting to sync node with API server" Sep 13 01:35:18.350867 kubelet[1971]: I0913 01:35:18.350855 1971 kubelet.go:375] "Adding static pod path" path="/etc/kubernetes/manifests" Sep 13 01:35:18.350943 kubelet[1971]: I0913 01:35:18.350933 1971 kubelet.go:386] "Adding apiserver pod source" Sep 13 01:35:18.352273 kubelet[1971]: I0913 01:35:18.352234 1971 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Sep 13 01:35:18.352707 kubelet[1971]: E0913 01:35:18.352689 1971 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:35:18.352814 kubelet[1971]: E0913 01:35:18.352800 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:35:18.357775 kubelet[1971]: I0913 01:35:18.357744 1971 kuberuntime_manager.go:279] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Sep 13 01:35:18.358453 kubelet[1971]: I0913 01:35:18.358424 1971 kubelet.go:935] "Not starting ClusterTrustBundle informer because we are in static kubelet mode or the ClusterTrustBundleProjection featuregate is disabled" Sep 13 01:35:18.358524 kubelet[1971]: W0913 01:35:18.358485 1971 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Sep 13 01:35:18.360359 kubelet[1971]: I0913 01:35:18.360337 1971 watchdog_linux.go:99] "Systemd watchdog is not enabled" Sep 13 01:35:18.360419 kubelet[1971]: I0913 01:35:18.360381 1971 server.go:1289] "Started kubelet" Sep 13 01:35:18.360876 kubelet[1971]: I0913 01:35:18.360844 1971 server.go:180] "Starting to listen" address="0.0.0.0" port=10250 Sep 13 01:35:18.361860 kubelet[1971]: I0913 01:35:18.361843 1971 server.go:317] "Adding debug handlers to kubelet server" Sep 13 01:35:18.363183 kubelet[1971]: I0913 01:35:18.363131 1971 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Sep 13 01:35:18.363465 kubelet[1971]: I0913 01:35:18.363442 1971 server.go:255] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Sep 13 01:35:18.367526 kubelet[1971]: E0913 01:35:18.367501 1971 kubelet.go:1600] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Sep 13 01:35:18.366000 audit[1971]: AVC avc: denied { mac_admin } for pid=1971 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:18.366000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 01:35:18.366000 audit[1971]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40006f88d0 a1=40007b0168 a2=40006f88a0 a3=25 items=0 ppid=1 pid=1971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:18.366000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 01:35:18.368155 kubelet[1971]: I0913 01:35:18.368130 1971 kubelet.go:1552] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Sep 13 01:35:18.366000 audit[1971]: AVC avc: denied { mac_admin } for pid=1971 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:18.366000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 01:35:18.366000 audit[1971]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40007b2040 a1=40007b0180 a2=40006f8960 a3=25 items=0 ppid=1 pid=1971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:18.366000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 01:35:18.368434 kubelet[1971]: I0913 01:35:18.368418 1971 kubelet.go:1556] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Sep 13 01:35:18.368560 kubelet[1971]: I0913 01:35:18.368548 1971 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Sep 13 01:35:18.368935 kubelet[1971]: I0913 01:35:18.368896 1971 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Sep 13 01:35:18.372794 kubelet[1971]: E0913 01:35:18.371757 1971 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.200.20.27.1864b3aee6de6bc4 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.200.20.27,UID:10.200.20.27,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:10.200.20.27,},FirstTimestamp:2025-09-13 01:35:18.360353732 +0000 UTC m=+0.810086673,LastTimestamp:2025-09-13 01:35:18.360353732 +0000 UTC m=+0.810086673,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.200.20.27,}" Sep 13 01:35:18.373035 kubelet[1971]: E0913 01:35:18.373003 1971 reflector.go:200] "Failed to watch" err="failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" Sep 13 01:35:18.373136 kubelet[1971]: E0913 01:35:18.373105 1971 reflector.go:200] "Failed to watch" err="failed to list *v1.Node: nodes \"10.200.20.27\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Node" Sep 13 01:35:18.373175 kubelet[1971]: E0913 01:35:18.373153 1971 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.27\" not found" Sep 13 01:35:18.373175 kubelet[1971]: I0913 01:35:18.373171 1971 volume_manager.go:297] "Starting Kubelet Volume Manager" Sep 13 01:35:18.373501 kubelet[1971]: I0913 01:35:18.373463 1971 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Sep 13 01:35:18.373554 kubelet[1971]: I0913 01:35:18.373522 1971 reconciler.go:26] "Reconciler: start to sync state" Sep 13 01:35:18.374512 kubelet[1971]: I0913 01:35:18.374490 1971 factory.go:223] Registration of the systemd container factory successfully Sep 13 01:35:18.374628 kubelet[1971]: I0913 01:35:18.374603 1971 factory.go:221] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Sep 13 01:35:18.376956 kubelet[1971]: I0913 01:35:18.376928 1971 factory.go:223] Registration of the containerd container factory successfully Sep 13 01:35:18.377000 audit[1988]: NETFILTER_CFG table=mangle:5 family=2 entries=2 op=nft_register_chain pid=1988 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:35:18.377000 audit[1988]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffff456f350 a2=0 a3=1 items=0 ppid=1971 pid=1988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:18.377000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 13 01:35:18.379000 audit[1989]: NETFILTER_CFG table=filter:6 family=2 entries=2 op=nft_register_chain pid=1989 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:35:18.379000 audit[1989]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffd6010ae0 a2=0 a3=1 items=0 ppid=1971 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:18.379000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 13 01:35:18.381000 audit[1991]: NETFILTER_CFG table=filter:7 family=2 entries=2 op=nft_register_chain pid=1991 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:35:18.381000 audit[1991]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe6304790 a2=0 a3=1 items=0 ppid=1971 pid=1991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:18.381000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 01:35:18.383000 audit[1993]: NETFILTER_CFG table=filter:8 family=2 entries=2 op=nft_register_chain pid=1993 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:35:18.383000 audit[1993]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffffac27cc0 a2=0 a3=1 items=0 ppid=1971 pid=1993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:18.383000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 01:35:18.398094 kubelet[1971]: E0913 01:35:18.398066 1971 reflector.go:200] "Failed to watch" err="failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User \"system:anonymous\" cannot list resource \"csidrivers\" in API group \"storage.k8s.io\" at the cluster scope" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" Sep 13 01:35:18.401038 kubelet[1971]: I0913 01:35:18.401020 1971 cpu_manager.go:221] "Starting CPU manager" policy="none" Sep 13 01:35:18.401127 kubelet[1971]: I0913 01:35:18.401113 1971 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Sep 13 01:35:18.401197 kubelet[1971]: I0913 01:35:18.401188 1971 state_mem.go:36] "Initialized new in-memory state store" Sep 13 01:35:18.407436 kubelet[1971]: I0913 01:35:18.407419 1971 policy_none.go:49] "None policy: Start" Sep 13 01:35:18.407535 kubelet[1971]: I0913 01:35:18.407524 1971 memory_manager.go:186] "Starting memorymanager" policy="None" Sep 13 01:35:18.407592 kubelet[1971]: I0913 01:35:18.407583 1971 state_mem.go:35] "Initializing new in-memory state store" Sep 13 01:35:18.413955 kubelet[1971]: E0913 01:35:18.413932 1971 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.200.20.27\" not found" node="10.200.20.27" Sep 13 01:35:18.415771 systemd[1]: Created slice kubepods.slice. Sep 13 01:35:18.420756 systemd[1]: Created slice kubepods-burstable.slice. Sep 13 01:35:18.423647 systemd[1]: Created slice kubepods-besteffort.slice. Sep 13 01:35:18.430278 kubelet[1971]: E0913 01:35:18.430253 1971 manager.go:517] "Failed to read data from checkpoint" err="checkpoint is not found" checkpoint="kubelet_internal_checkpoint" Sep 13 01:35:18.428000 audit[1971]: AVC avc: denied { mac_admin } for pid=1971 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:18.428000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 01:35:18.428000 audit[1971]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000e1e6f0 a1=4000e26708 a2=4000e1e6c0 a3=25 items=0 ppid=1 pid=1971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:18.428000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 01:35:18.430533 kubelet[1971]: E0913 01:35:18.430319 1971 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" path="/var/lib/kubelet/device-plugins/" Sep 13 01:35:18.430533 kubelet[1971]: I0913 01:35:18.430413 1971 eviction_manager.go:189] "Eviction manager: starting control loop" Sep 13 01:35:18.430533 kubelet[1971]: I0913 01:35:18.430423 1971 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Sep 13 01:35:18.431816 kubelet[1971]: I0913 01:35:18.431468 1971 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Sep 13 01:35:18.436260 kubelet[1971]: E0913 01:35:18.436232 1971 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Sep 13 01:35:18.436331 kubelet[1971]: E0913 01:35:18.436273 1971 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.200.20.27\" not found" Sep 13 01:35:18.532851 kubelet[1971]: I0913 01:35:18.532216 1971 kubelet_node_status.go:75] "Attempting to register node" node="10.200.20.27" Sep 13 01:35:18.540355 kubelet[1971]: I0913 01:35:18.540318 1971 kubelet_node_status.go:78] "Successfully registered node" node="10.200.20.27" Sep 13 01:35:18.540355 kubelet[1971]: E0913 01:35:18.540354 1971 kubelet_node_status.go:548] "Error updating node status, will retry" err="error getting node \"10.200.20.27\": node \"10.200.20.27\" not found" Sep 13 01:35:18.548000 audit[1999]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1999 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:35:18.548000 audit[1999]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffce8bca40 a2=0 a3=1 items=0 ppid=1971 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:18.548000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Sep 13 01:35:18.550605 kubelet[1971]: I0913 01:35:18.550570 1971 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv4" Sep 13 01:35:18.549000 audit[2002]: NETFILTER_CFG table=mangle:10 family=2 entries=1 op=nft_register_chain pid=2002 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:35:18.549000 audit[2002]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe0c8b3d0 a2=0 a3=1 items=0 ppid=1971 pid=2002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:18.549000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 13 01:35:18.550000 audit[2001]: NETFILTER_CFG table=mangle:11 family=10 entries=2 op=nft_register_chain pid=2001 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:35:18.550000 audit[2001]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd0f1c530 a2=0 a3=1 items=0 ppid=1971 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:18.550000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 13 01:35:18.550000 audit[2003]: NETFILTER_CFG table=nat:12 family=2 entries=2 op=nft_register_chain pid=2003 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:35:18.550000 audit[2003]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffc4e51b40 a2=0 a3=1 items=0 ppid=1971 pid=2003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:18.550000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 13 01:35:18.552887 kubelet[1971]: I0913 01:35:18.552872 1971 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv6" Sep 13 01:35:18.552985 kubelet[1971]: I0913 01:35:18.552976 1971 status_manager.go:230] "Starting to sync pod status with apiserver" Sep 13 01:35:18.553065 kubelet[1971]: I0913 01:35:18.553054 1971 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Sep 13 01:35:18.553127 kubelet[1971]: I0913 01:35:18.553118 1971 kubelet.go:2436] "Starting kubelet main sync loop" Sep 13 01:35:18.553276 kubelet[1971]: E0913 01:35:18.553264 1971 kubelet.go:2460] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Sep 13 01:35:18.551000 audit[2004]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_chain pid=2004 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:35:18.551000 audit[2004]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe7d57790 a2=0 a3=1 items=0 ppid=1971 pid=2004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:18.551000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 13 01:35:18.552000 audit[2005]: NETFILTER_CFG table=mangle:14 family=10 entries=1 op=nft_register_chain pid=2005 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:35:18.552000 audit[2005]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff00a3c50 a2=0 a3=1 items=0 ppid=1971 pid=2005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:18.552000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 13 01:35:18.553000 audit[2006]: NETFILTER_CFG table=nat:15 family=10 entries=2 op=nft_register_chain pid=2006 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:35:18.553000 audit[2006]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffd1faa8e0 a2=0 a3=1 items=0 ppid=1971 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:18.553000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 13 01:35:18.556000 audit[2007]: NETFILTER_CFG table=filter:16 family=10 entries=2 op=nft_register_chain pid=2007 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:35:18.556000 audit[2007]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc680f650 a2=0 a3=1 items=0 ppid=1971 pid=2007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:18.556000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 13 01:35:18.570015 kubelet[1971]: E0913 01:35:18.569990 1971 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.27\" not found" Sep 13 01:35:18.595103 sudo[1831]: pam_unix(sudo:session): session closed for user root Sep 13 01:35:18.593000 audit[1831]: USER_END pid=1831 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 01:35:18.593000 audit[1831]: CRED_DISP pid=1831 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 01:35:18.670879 kubelet[1971]: E0913 01:35:18.670839 1971 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.27\" not found" Sep 13 01:35:18.685279 sshd[1828]: pam_unix(sshd:session): session closed for user core Sep 13 01:35:18.684000 audit[1828]: USER_END pid=1828 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:35:18.684000 audit[1828]: CRED_DISP pid=1828 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Sep 13 01:35:18.687711 systemd[1]: sshd@6-10.200.20.27:22-10.200.16.10:36162.service: Deactivated successfully. Sep 13 01:35:18.686000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.27:22-10.200.16.10:36162 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 01:35:18.688358 systemd[1]: session-9.scope: Deactivated successfully. Sep 13 01:35:18.688930 systemd-logind[1457]: Session 9 logged out. Waiting for processes to exit. Sep 13 01:35:18.689854 systemd-logind[1457]: Removed session 9. Sep 13 01:35:18.771306 kubelet[1971]: E0913 01:35:18.771278 1971 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.27\" not found" Sep 13 01:35:18.872281 kubelet[1971]: E0913 01:35:18.872256 1971 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.27\" not found" Sep 13 01:35:18.973006 kubelet[1971]: E0913 01:35:18.972984 1971 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.27\" not found" Sep 13 01:35:19.073641 kubelet[1971]: E0913 01:35:19.073620 1971 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.27\" not found" Sep 13 01:35:19.174330 kubelet[1971]: E0913 01:35:19.174140 1971 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.27\" not found" Sep 13 01:35:19.274642 kubelet[1971]: E0913 01:35:19.274615 1971 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.27\" not found" Sep 13 01:35:19.309052 kubelet[1971]: I0913 01:35:19.309035 1971 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Sep 13 01:35:19.309277 kubelet[1971]: I0913 01:35:19.309255 1971 reflector.go:556] "Warning: watch ended with error" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" err="very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received" Sep 13 01:35:19.353311 kubelet[1971]: E0913 01:35:19.353290 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:35:19.375071 kubelet[1971]: E0913 01:35:19.375055 1971 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.27\" not found" Sep 13 01:35:19.476751 kubelet[1971]: I0913 01:35:19.476439 1971 kuberuntime_manager.go:1746] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Sep 13 01:35:19.476960 env[1468]: time="2025-09-13T01:35:19.476919377Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Sep 13 01:35:19.477348 kubelet[1971]: I0913 01:35:19.477330 1971 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Sep 13 01:35:20.354182 kubelet[1971]: E0913 01:35:20.354146 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:35:20.354182 kubelet[1971]: I0913 01:35:20.354157 1971 apiserver.go:52] "Watching apiserver" Sep 13 01:35:20.370954 systemd[1]: Created slice kubepods-besteffort-pod2292c087_03d9_401f_98c1_2e92c1527446.slice. Sep 13 01:35:20.371348 kubelet[1971]: E0913 01:35:20.371113 1971 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mblgz" podUID="9c5d7852-9b3f-42a7-8a36-2aa1283d8cc1" Sep 13 01:35:20.384035 kubelet[1971]: I0913 01:35:20.384012 1971 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Sep 13 01:35:20.385823 systemd[1]: Created slice kubepods-besteffort-pod8377bfe5_4b07_4100_b050_236f03f7d045.slice. Sep 13 01:35:20.482887 kubelet[1971]: I0913 01:35:20.482847 1971 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5htr2\" (UniqueName: \"kubernetes.io/projected/2292c087-03d9-401f-98c1-2e92c1527446-kube-api-access-5htr2\") pod \"calico-node-lmfgv\" (UID: \"2292c087-03d9-401f-98c1-2e92c1527446\") " pod="calico-system/calico-node-lmfgv" Sep 13 01:35:20.482887 kubelet[1971]: I0913 01:35:20.482888 1971 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/9c5d7852-9b3f-42a7-8a36-2aa1283d8cc1-registration-dir\") pod \"csi-node-driver-mblgz\" (UID: \"9c5d7852-9b3f-42a7-8a36-2aa1283d8cc1\") " pod="calico-system/csi-node-driver-mblgz" Sep 13 01:35:20.483058 kubelet[1971]: I0913 01:35:20.482908 1971 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/9c5d7852-9b3f-42a7-8a36-2aa1283d8cc1-varrun\") pod \"csi-node-driver-mblgz\" (UID: \"9c5d7852-9b3f-42a7-8a36-2aa1283d8cc1\") " pod="calico-system/csi-node-driver-mblgz" Sep 13 01:35:20.483058 kubelet[1971]: I0913 01:35:20.482924 1971 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/8377bfe5-4b07-4100-b050-236f03f7d045-xtables-lock\") pod \"kube-proxy-h5n64\" (UID: \"8377bfe5-4b07-4100-b050-236f03f7d045\") " pod="kube-system/kube-proxy-h5n64" Sep 13 01:35:20.483058 kubelet[1971]: I0913 01:35:20.482938 1971 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/2292c087-03d9-401f-98c1-2e92c1527446-lib-modules\") pod \"calico-node-lmfgv\" (UID: \"2292c087-03d9-401f-98c1-2e92c1527446\") " pod="calico-system/calico-node-lmfgv" Sep 13 01:35:20.483058 kubelet[1971]: I0913 01:35:20.482952 1971 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/2292c087-03d9-401f-98c1-2e92c1527446-policysync\") pod \"calico-node-lmfgv\" (UID: \"2292c087-03d9-401f-98c1-2e92c1527446\") " pod="calico-system/calico-node-lmfgv" Sep 13 01:35:20.483058 kubelet[1971]: I0913 01:35:20.482965 1971 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/2292c087-03d9-401f-98c1-2e92c1527446-var-run-calico\") pod \"calico-node-lmfgv\" (UID: \"2292c087-03d9-401f-98c1-2e92c1527446\") " pod="calico-system/calico-node-lmfgv" Sep 13 01:35:20.483173 kubelet[1971]: I0913 01:35:20.482978 1971 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/9c5d7852-9b3f-42a7-8a36-2aa1283d8cc1-socket-dir\") pod \"csi-node-driver-mblgz\" (UID: \"9c5d7852-9b3f-42a7-8a36-2aa1283d8cc1\") " pod="calico-system/csi-node-driver-mblgz" Sep 13 01:35:20.483173 kubelet[1971]: I0913 01:35:20.482992 1971 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nm8zv\" (UniqueName: \"kubernetes.io/projected/8377bfe5-4b07-4100-b050-236f03f7d045-kube-api-access-nm8zv\") pod \"kube-proxy-h5n64\" (UID: \"8377bfe5-4b07-4100-b050-236f03f7d045\") " pod="kube-system/kube-proxy-h5n64" Sep 13 01:35:20.483173 kubelet[1971]: I0913 01:35:20.483006 1971 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/2292c087-03d9-401f-98c1-2e92c1527446-cni-net-dir\") pod \"calico-node-lmfgv\" (UID: \"2292c087-03d9-401f-98c1-2e92c1527446\") " pod="calico-system/calico-node-lmfgv" Sep 13 01:35:20.483173 kubelet[1971]: I0913 01:35:20.483020 1971 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/2292c087-03d9-401f-98c1-2e92c1527446-flexvol-driver-host\") pod \"calico-node-lmfgv\" (UID: \"2292c087-03d9-401f-98c1-2e92c1527446\") " pod="calico-system/calico-node-lmfgv" Sep 13 01:35:20.483173 kubelet[1971]: I0913 01:35:20.483034 1971 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/2292c087-03d9-401f-98c1-2e92c1527446-node-certs\") pod \"calico-node-lmfgv\" (UID: \"2292c087-03d9-401f-98c1-2e92c1527446\") " pod="calico-system/calico-node-lmfgv" Sep 13 01:35:20.483281 kubelet[1971]: I0913 01:35:20.483047 1971 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/2292c087-03d9-401f-98c1-2e92c1527446-tigera-ca-bundle\") pod \"calico-node-lmfgv\" (UID: \"2292c087-03d9-401f-98c1-2e92c1527446\") " pod="calico-system/calico-node-lmfgv" Sep 13 01:35:20.483281 kubelet[1971]: I0913 01:35:20.483060 1971 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/2292c087-03d9-401f-98c1-2e92c1527446-var-lib-calico\") pod \"calico-node-lmfgv\" (UID: \"2292c087-03d9-401f-98c1-2e92c1527446\") " pod="calico-system/calico-node-lmfgv" Sep 13 01:35:20.483281 kubelet[1971]: I0913 01:35:20.483074 1971 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/9c5d7852-9b3f-42a7-8a36-2aa1283d8cc1-kubelet-dir\") pod \"csi-node-driver-mblgz\" (UID: \"9c5d7852-9b3f-42a7-8a36-2aa1283d8cc1\") " pod="calico-system/csi-node-driver-mblgz" Sep 13 01:35:20.483281 kubelet[1971]: I0913 01:35:20.483087 1971 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/8377bfe5-4b07-4100-b050-236f03f7d045-kube-proxy\") pod \"kube-proxy-h5n64\" (UID: \"8377bfe5-4b07-4100-b050-236f03f7d045\") " pod="kube-system/kube-proxy-h5n64" Sep 13 01:35:20.483281 kubelet[1971]: I0913 01:35:20.483100 1971 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/8377bfe5-4b07-4100-b050-236f03f7d045-lib-modules\") pod \"kube-proxy-h5n64\" (UID: \"8377bfe5-4b07-4100-b050-236f03f7d045\") " pod="kube-system/kube-proxy-h5n64" Sep 13 01:35:20.483403 kubelet[1971]: I0913 01:35:20.483117 1971 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/2292c087-03d9-401f-98c1-2e92c1527446-cni-bin-dir\") pod \"calico-node-lmfgv\" (UID: \"2292c087-03d9-401f-98c1-2e92c1527446\") " pod="calico-system/calico-node-lmfgv" Sep 13 01:35:20.483403 kubelet[1971]: I0913 01:35:20.483130 1971 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/2292c087-03d9-401f-98c1-2e92c1527446-cni-log-dir\") pod \"calico-node-lmfgv\" (UID: \"2292c087-03d9-401f-98c1-2e92c1527446\") " pod="calico-system/calico-node-lmfgv" Sep 13 01:35:20.483403 kubelet[1971]: I0913 01:35:20.483150 1971 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/2292c087-03d9-401f-98c1-2e92c1527446-xtables-lock\") pod \"calico-node-lmfgv\" (UID: \"2292c087-03d9-401f-98c1-2e92c1527446\") " pod="calico-system/calico-node-lmfgv" Sep 13 01:35:20.483403 kubelet[1971]: I0913 01:35:20.483165 1971 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-46nt2\" (UniqueName: \"kubernetes.io/projected/9c5d7852-9b3f-42a7-8a36-2aa1283d8cc1-kube-api-access-46nt2\") pod \"csi-node-driver-mblgz\" (UID: \"9c5d7852-9b3f-42a7-8a36-2aa1283d8cc1\") " pod="calico-system/csi-node-driver-mblgz" Sep 13 01:35:20.591661 kubelet[1971]: I0913 01:35:20.586472 1971 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Sep 13 01:35:20.591661 kubelet[1971]: E0913 01:35:20.591618 1971 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 01:35:20.591661 kubelet[1971]: W0913 01:35:20.591633 1971 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 01:35:20.591822 kubelet[1971]: E0913 01:35:20.591648 1971 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 01:35:20.591822 kubelet[1971]: E0913 01:35:20.591794 1971 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 01:35:20.591822 kubelet[1971]: W0913 01:35:20.591801 1971 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 01:35:20.591822 kubelet[1971]: E0913 01:35:20.591809 1971 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 01:35:20.591927 kubelet[1971]: E0913 01:35:20.591907 1971 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 01:35:20.591927 kubelet[1971]: W0913 01:35:20.591921 1971 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 01:35:20.591927 kubelet[1971]: E0913 01:35:20.591928 1971 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 01:35:20.592076 kubelet[1971]: E0913 01:35:20.592056 1971 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 01:35:20.592076 kubelet[1971]: W0913 01:35:20.592068 1971 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 01:35:20.592076 kubelet[1971]: E0913 01:35:20.592077 1971 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 01:35:20.592507 kubelet[1971]: E0913 01:35:20.592490 1971 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 01:35:20.592609 kubelet[1971]: W0913 01:35:20.592593 1971 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 01:35:20.592685 kubelet[1971]: E0913 01:35:20.592673 1971 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 01:35:20.592955 kubelet[1971]: E0913 01:35:20.592941 1971 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 01:35:20.593038 kubelet[1971]: W0913 01:35:20.593025 1971 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 01:35:20.593141 kubelet[1971]: E0913 01:35:20.593130 1971 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 01:35:20.593375 kubelet[1971]: E0913 01:35:20.593363 1971 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 01:35:20.593451 kubelet[1971]: W0913 01:35:20.593440 1971 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 01:35:20.593510 kubelet[1971]: E0913 01:35:20.593498 1971 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 01:35:20.598813 kubelet[1971]: E0913 01:35:20.598725 1971 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 01:35:20.599012 kubelet[1971]: W0913 01:35:20.598976 1971 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 01:35:20.599183 kubelet[1971]: E0913 01:35:20.599152 1971 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 01:35:20.599469 kubelet[1971]: E0913 01:35:20.599456 1971 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 01:35:20.599543 kubelet[1971]: W0913 01:35:20.599532 1971 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 01:35:20.599641 kubelet[1971]: E0913 01:35:20.599629 1971 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 01:35:20.600019 kubelet[1971]: E0913 01:35:20.600006 1971 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 01:35:20.600098 kubelet[1971]: W0913 01:35:20.600086 1971 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 01:35:20.600166 kubelet[1971]: E0913 01:35:20.600148 1971 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 01:35:20.600374 kubelet[1971]: E0913 01:35:20.600361 1971 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 01:35:20.600440 kubelet[1971]: W0913 01:35:20.600428 1971 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 01:35:20.600496 kubelet[1971]: E0913 01:35:20.600486 1971 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 01:35:20.606739 kubelet[1971]: E0913 01:35:20.605492 1971 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 01:35:20.606739 kubelet[1971]: W0913 01:35:20.605507 1971 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 01:35:20.606739 kubelet[1971]: E0913 01:35:20.605522 1971 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 01:35:20.610878 kubelet[1971]: E0913 01:35:20.610806 1971 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 01:35:20.610878 kubelet[1971]: W0913 01:35:20.610825 1971 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 01:35:20.610878 kubelet[1971]: E0913 01:35:20.610838 1971 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 01:35:20.684425 env[1468]: time="2025-09-13T01:35:20.683975462Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-lmfgv,Uid:2292c087-03d9-401f-98c1-2e92c1527446,Namespace:calico-system,Attempt:0,}" Sep 13 01:35:20.688337 env[1468]: time="2025-09-13T01:35:20.688303142Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-h5n64,Uid:8377bfe5-4b07-4100-b050-236f03f7d045,Namespace:kube-system,Attempt:0,}" Sep 13 01:35:21.354756 kubelet[1971]: E0913 01:35:21.354730 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:35:22.355584 kubelet[1971]: E0913 01:35:22.355535 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:35:22.553974 kubelet[1971]: E0913 01:35:22.553927 1971 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mblgz" podUID="9c5d7852-9b3f-42a7-8a36-2aa1283d8cc1" Sep 13 01:35:23.356518 kubelet[1971]: E0913 01:35:23.356475 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:35:24.357622 kubelet[1971]: E0913 01:35:24.357585 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:35:24.554718 kubelet[1971]: E0913 01:35:24.554404 1971 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mblgz" podUID="9c5d7852-9b3f-42a7-8a36-2aa1283d8cc1" Sep 13 01:35:24.567041 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2381503094.mount: Deactivated successfully. Sep 13 01:35:24.593592 env[1468]: time="2025-09-13T01:35:24.593536851Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:35:24.603749 env[1468]: time="2025-09-13T01:35:24.603705840Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:35:24.606962 env[1468]: time="2025-09-13T01:35:24.606937196Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:35:24.614531 env[1468]: time="2025-09-13T01:35:24.614160814Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:35:24.617020 env[1468]: time="2025-09-13T01:35:24.616987815Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:35:24.619416 env[1468]: time="2025-09-13T01:35:24.619385980Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:35:24.626995 env[1468]: time="2025-09-13T01:35:24.626963148Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:35:24.627612 env[1468]: time="2025-09-13T01:35:24.627583761Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:35:24.693264 env[1468]: time="2025-09-13T01:35:24.693146604Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 01:35:24.693264 env[1468]: time="2025-09-13T01:35:24.693240172Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 01:35:24.693939 env[1468]: time="2025-09-13T01:35:24.693250252Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 01:35:24.693939 env[1468]: time="2025-09-13T01:35:24.693521196Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/58cb38558015a65e467b49f67f51344aefdf9e927d09fe0d09a4996ac595ced9 pid=2040 runtime=io.containerd.runc.v2 Sep 13 01:35:24.696709 env[1468]: time="2025-09-13T01:35:24.695245503Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 01:35:24.696709 env[1468]: time="2025-09-13T01:35:24.695277106Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 01:35:24.696709 env[1468]: time="2025-09-13T01:35:24.695286786Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 01:35:24.696709 env[1468]: time="2025-09-13T01:35:24.695434399Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/275ad59520334231bbe3ead9cc7e0ca1d8346d55d40339328a520d3e4f67a052 pid=2047 runtime=io.containerd.runc.v2 Sep 13 01:35:24.706295 systemd[1]: Started cri-containerd-58cb38558015a65e467b49f67f51344aefdf9e927d09fe0d09a4996ac595ced9.scope. Sep 13 01:35:24.719269 systemd[1]: Started cri-containerd-275ad59520334231bbe3ead9cc7e0ca1d8346d55d40339328a520d3e4f67a052.scope. Sep 13 01:35:24.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.730313 kernel: kauditd_printk_skb: 246 callbacks suppressed Sep 13 01:35:24.730382 kernel: audit: type=1400 audit(1757727324.725:430): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.759787 kernel: audit: type=1400 audit(1757727324.725:431): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.780413 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Sep 13 01:35:24.780524 kernel: audit: type=1400 audit(1757727324.725:432): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.780556 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Sep 13 01:35:24.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.801941 kernel: audit: type=1400 audit(1757727324.725:433): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.802024 kernel: audit: backlog limit exceeded Sep 13 01:35:24.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.822148 kernel: audit: type=1400 audit(1757727324.725:434): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.838887 kernel: audit: type=1400 audit(1757727324.725:435): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.838955 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Sep 13 01:35:24.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.725000 audit: BPF prog-id=56 op=LOAD Sep 13 01:35:24.732000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.732000 audit[2062]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2040 pid=2062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:24.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538636233383535383031356136356534363762343966363766353133 Sep 13 01:35:24.732000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.732000 audit[2062]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2040 pid=2062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:24.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538636233383535383031356136356534363762343966363766353133 Sep 13 01:35:24.732000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.732000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.732000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.732000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.732000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.732000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.732000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.732000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.732000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.732000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.732000 audit: BPF prog-id=57 op=LOAD Sep 13 01:35:24.732000 audit[2062]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2040 pid=2062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:24.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538636233383535383031356136356534363762343966363766353133 Sep 13 01:35:24.745000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.745000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.745000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.745000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.745000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.745000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.745000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.745000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.745000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.745000 audit: BPF prog-id=58 op=LOAD Sep 13 01:35:24.745000 audit[2062]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2040 pid=2062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:24.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538636233383535383031356136356534363762343966363766353133 Sep 13 01:35:24.759000 audit: BPF prog-id=58 op=UNLOAD Sep 13 01:35:24.759000 audit: BPF prog-id=57 op=UNLOAD Sep 13 01:35:24.759000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.759000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.759000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.759000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.759000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.759000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.759000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.759000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.759000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.759000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.759000 audit: BPF prog-id=59 op=LOAD Sep 13 01:35:24.759000 audit[2062]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2040 pid=2062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:24.759000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538636233383535383031356136356534363762343966363766353133 Sep 13 01:35:24.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.845000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.845000 audit[2068]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2047 pid=2068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:24.845000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237356164353935323033333432333162626533656164396363376530 Sep 13 01:35:24.845000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.845000 audit[2068]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2047 pid=2068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:24.845000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237356164353935323033333432333162626533656164396363376530 Sep 13 01:35:24.846000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.846000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.846000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.846000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.846000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.846000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.846000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.846000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.846000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.846000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.846000 audit: BPF prog-id=61 op=LOAD Sep 13 01:35:24.846000 audit[2068]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2047 pid=2068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:24.846000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237356164353935323033333432333162626533656164396363376530 Sep 13 01:35:24.846000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.846000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.846000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.846000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.846000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.846000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.846000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.846000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.846000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.846000 audit: BPF prog-id=62 op=LOAD Sep 13 01:35:24.846000 audit[2068]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2047 pid=2068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:24.846000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237356164353935323033333432333162626533656164396363376530 Sep 13 01:35:24.846000 audit: BPF prog-id=62 op=UNLOAD Sep 13 01:35:24.846000 audit: BPF prog-id=61 op=UNLOAD Sep 13 01:35:24.846000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.846000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.846000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.846000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.846000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.846000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.846000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.846000 audit[2068]: AVC avc: denied { perfmon } for pid=2068 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.846000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.846000 audit[2068]: AVC avc: denied { bpf } for pid=2068 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:24.846000 audit: BPF prog-id=63 op=LOAD Sep 13 01:35:24.846000 audit[2068]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2047 pid=2068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:24.846000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237356164353935323033333432333162626533656164396363376530 Sep 13 01:35:24.860291 env[1468]: time="2025-09-13T01:35:24.860245923Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-lmfgv,Uid:2292c087-03d9-401f-98c1-2e92c1527446,Namespace:calico-system,Attempt:0,} returns sandbox id \"275ad59520334231bbe3ead9cc7e0ca1d8346d55d40339328a520d3e4f67a052\"" Sep 13 01:35:24.862691 env[1468]: time="2025-09-13T01:35:24.862643608Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\"" Sep 13 01:35:24.867343 env[1468]: time="2025-09-13T01:35:24.867251602Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-h5n64,Uid:8377bfe5-4b07-4100-b050-236f03f7d045,Namespace:kube-system,Attempt:0,} returns sandbox id \"58cb38558015a65e467b49f67f51344aefdf9e927d09fe0d09a4996ac595ced9\"" Sep 13 01:35:25.357787 kubelet[1971]: E0913 01:35:25.357757 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:35:25.972573 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3860590385.mount: Deactivated successfully. Sep 13 01:35:26.112101 env[1468]: time="2025-09-13T01:35:26.112063557Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:35:26.117865 env[1468]: time="2025-09-13T01:35:26.117835544Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:29e6f31ad72882b1b817dd257df6b7981e4d7d31d872b7fe2cf102c6e2af27a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:35:26.121254 env[1468]: time="2025-09-13T01:35:26.121232018Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:35:26.132802 env[1468]: time="2025-09-13T01:35:26.132765270Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:81bdfcd9dbd36624dc35354e8c181c75631ba40e6c7df5820f5f56cea36f0ef9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:35:26.133321 env[1468]: time="2025-09-13T01:35:26.133295153Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\" returns image reference \"sha256:29e6f31ad72882b1b817dd257df6b7981e4d7d31d872b7fe2cf102c6e2af27a5\"" Sep 13 01:35:26.135204 env[1468]: time="2025-09-13T01:35:26.135173065Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.5\"" Sep 13 01:35:26.141105 env[1468]: time="2025-09-13T01:35:26.141077462Z" level=info msg="CreateContainer within sandbox \"275ad59520334231bbe3ead9cc7e0ca1d8346d55d40339328a520d3e4f67a052\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Sep 13 01:35:26.162771 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount933440423.mount: Deactivated successfully. Sep 13 01:35:26.178144 env[1468]: time="2025-09-13T01:35:26.178100454Z" level=info msg="CreateContainer within sandbox \"275ad59520334231bbe3ead9cc7e0ca1d8346d55d40339328a520d3e4f67a052\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"e1442b9c8b03b9151413096bdb37b75196bc8c8924a2fee3d294010d8f98ac05\"" Sep 13 01:35:26.179095 env[1468]: time="2025-09-13T01:35:26.179072053Z" level=info msg="StartContainer for \"e1442b9c8b03b9151413096bdb37b75196bc8c8924a2fee3d294010d8f98ac05\"" Sep 13 01:35:26.193000 systemd[1]: Started cri-containerd-e1442b9c8b03b9151413096bdb37b75196bc8c8924a2fee3d294010d8f98ac05.scope. Sep 13 01:35:26.207000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:26.207000 audit[2117]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2047 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:26.207000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531343432623963386230336239313531343133303936626462333762 Sep 13 01:35:26.207000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:26.207000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:26.207000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:26.207000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:26.207000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:26.207000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:26.207000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:26.207000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:26.207000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:26.207000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:26.207000 audit: BPF prog-id=64 op=LOAD Sep 13 01:35:26.207000 audit[2117]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2047 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:26.207000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531343432623963386230336239313531343133303936626462333762 Sep 13 01:35:26.207000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:26.207000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:26.207000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:26.207000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:26.207000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:26.207000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:26.207000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:26.207000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:26.207000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:26.207000 audit: BPF prog-id=65 op=LOAD Sep 13 01:35:26.207000 audit[2117]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2047 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:26.207000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531343432623963386230336239313531343133303936626462333762 Sep 13 01:35:26.208000 audit: BPF prog-id=65 op=UNLOAD Sep 13 01:35:26.208000 audit: BPF prog-id=64 op=UNLOAD Sep 13 01:35:26.208000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:26.208000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:26.208000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:26.208000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:26.208000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:26.208000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:26.208000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:26.208000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:26.208000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:26.208000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:26.208000 audit: BPF prog-id=66 op=LOAD Sep 13 01:35:26.208000 audit[2117]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2047 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:26.208000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531343432623963386230336239313531343133303936626462333762 Sep 13 01:35:26.231530 systemd[1]: cri-containerd-e1442b9c8b03b9151413096bdb37b75196bc8c8924a2fee3d294010d8f98ac05.scope: Deactivated successfully. Sep 13 01:35:26.233012 env[1468]: time="2025-09-13T01:35:26.232966328Z" level=info msg="StartContainer for \"e1442b9c8b03b9151413096bdb37b75196bc8c8924a2fee3d294010d8f98ac05\" returns successfully" Sep 13 01:35:26.235000 audit: BPF prog-id=66 op=UNLOAD Sep 13 01:35:26.358153 kubelet[1971]: E0913 01:35:26.358115 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:35:26.363130 env[1468]: time="2025-09-13T01:35:26.363087604Z" level=info msg="shim disconnected" id=e1442b9c8b03b9151413096bdb37b75196bc8c8924a2fee3d294010d8f98ac05 Sep 13 01:35:26.363130 env[1468]: time="2025-09-13T01:35:26.363130567Z" level=warning msg="cleaning up after shim disconnected" id=e1442b9c8b03b9151413096bdb37b75196bc8c8924a2fee3d294010d8f98ac05 namespace=k8s.io Sep 13 01:35:26.363254 env[1468]: time="2025-09-13T01:35:26.363140408Z" level=info msg="cleaning up dead shim" Sep 13 01:35:26.370113 env[1468]: time="2025-09-13T01:35:26.370075049Z" level=warning msg="cleanup warnings time=\"2025-09-13T01:35:26Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2155 runtime=io.containerd.runc.v2\n" Sep 13 01:35:26.554343 kubelet[1971]: E0913 01:35:26.554239 1971 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mblgz" podUID="9c5d7852-9b3f-42a7-8a36-2aa1283d8cc1" Sep 13 01:35:27.358571 kubelet[1971]: E0913 01:35:27.358490 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:35:27.452028 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3583137299.mount: Deactivated successfully. Sep 13 01:35:27.974940 env[1468]: time="2025-09-13T01:35:27.974886156Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:35:27.982876 env[1468]: time="2025-09-13T01:35:27.982837781Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:021a8d45ab0c346664e47d95595ff5180ce90a22a681ea27904c65ae90788e70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:35:27.988789 env[1468]: time="2025-09-13T01:35:27.988761767Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:35:27.992057 env[1468]: time="2025-09-13T01:35:27.992032944Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:71445ec84ad98bd52a7784865a9d31b1b50b56092d3f7699edc39eefd71befe1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:35:27.992385 env[1468]: time="2025-09-13T01:35:27.992358370Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.5\" returns image reference \"sha256:021a8d45ab0c346664e47d95595ff5180ce90a22a681ea27904c65ae90788e70\"" Sep 13 01:35:27.994814 env[1468]: time="2025-09-13T01:35:27.994777040Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\"" Sep 13 01:35:28.000071 env[1468]: time="2025-09-13T01:35:28.000044054Z" level=info msg="CreateContainer within sandbox \"58cb38558015a65e467b49f67f51344aefdf9e927d09fe0d09a4996ac595ced9\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Sep 13 01:35:28.023225 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2785650977.mount: Deactivated successfully. Sep 13 01:35:28.028080 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1787716374.mount: Deactivated successfully. Sep 13 01:35:28.045162 env[1468]: time="2025-09-13T01:35:28.045110621Z" level=info msg="CreateContainer within sandbox \"58cb38558015a65e467b49f67f51344aefdf9e927d09fe0d09a4996ac595ced9\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"5862881862086485552712eb2c8611a6f6b507cb3cd4193fbefa784da2d6fd22\"" Sep 13 01:35:28.045951 env[1468]: time="2025-09-13T01:35:28.045925323Z" level=info msg="StartContainer for \"5862881862086485552712eb2c8611a6f6b507cb3cd4193fbefa784da2d6fd22\"" Sep 13 01:35:28.068713 systemd[1]: Started cri-containerd-5862881862086485552712eb2c8611a6f6b507cb3cd4193fbefa784da2d6fd22.scope. Sep 13 01:35:28.083000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:28.083000 audit[2179]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bf5a0 a2=3c a3=0 items=0 ppid=2040 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.083000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538363238383138363230383634383535353237313265623263383631 Sep 13 01:35:28.083000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:28.083000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:28.083000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:28.083000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:28.083000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:28.083000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:28.083000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:28.083000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:28.083000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:28.083000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:28.083000 audit: BPF prog-id=67 op=LOAD Sep 13 01:35:28.083000 audit[2179]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bf8e0 a2=78 a3=0 items=0 ppid=2040 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.083000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538363238383138363230383634383535353237313265623263383631 Sep 13 01:35:28.083000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:28.083000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:28.083000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:28.083000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:28.083000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:28.083000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:28.083000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:28.083000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:28.083000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:28.083000 audit: BPF prog-id=68 op=LOAD Sep 13 01:35:28.083000 audit[2179]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bf670 a2=78 a3=0 items=0 ppid=2040 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.083000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538363238383138363230383634383535353237313265623263383631 Sep 13 01:35:28.083000 audit: BPF prog-id=68 op=UNLOAD Sep 13 01:35:28.083000 audit: BPF prog-id=67 op=UNLOAD Sep 13 01:35:28.083000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:28.083000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:28.083000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:28.083000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:28.083000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:28.083000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:28.083000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:28.083000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:28.083000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:28.083000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:28.083000 audit: BPF prog-id=69 op=LOAD Sep 13 01:35:28.083000 audit[2179]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bfb40 a2=78 a3=0 items=0 ppid=2040 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.083000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538363238383138363230383634383535353237313265623263383631 Sep 13 01:35:28.106295 env[1468]: time="2025-09-13T01:35:28.106251216Z" level=info msg="StartContainer for \"5862881862086485552712eb2c8611a6f6b507cb3cd4193fbefa784da2d6fd22\" returns successfully" Sep 13 01:35:28.233000 audit[2240]: NETFILTER_CFG table=mangle:17 family=10 entries=1 op=nft_register_chain pid=2240 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:35:28.233000 audit[2240]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe6845cb0 a2=0 a3=1 items=0 ppid=2190 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.233000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 13 01:35:28.233000 audit[2239]: NETFILTER_CFG table=mangle:18 family=2 entries=1 op=nft_register_chain pid=2239 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:35:28.233000 audit[2239]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdc132790 a2=0 a3=1 items=0 ppid=2190 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.233000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 13 01:35:28.236000 audit[2246]: NETFILTER_CFG table=nat:19 family=10 entries=1 op=nft_register_chain pid=2246 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:35:28.236000 audit[2246]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff5ab2500 a2=0 a3=1 items=0 ppid=2190 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.236000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 13 01:35:28.237000 audit[2247]: NETFILTER_CFG table=nat:20 family=2 entries=1 op=nft_register_chain pid=2247 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:35:28.237000 audit[2247]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff77b6640 a2=0 a3=1 items=0 ppid=2190 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.237000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 13 01:35:28.238000 audit[2248]: NETFILTER_CFG table=filter:21 family=10 entries=1 op=nft_register_chain pid=2248 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:35:28.238000 audit[2248]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff6b5c380 a2=0 a3=1 items=0 ppid=2190 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.238000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 13 01:35:28.239000 audit[2249]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_chain pid=2249 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:35:28.239000 audit[2249]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff4f15350 a2=0 a3=1 items=0 ppid=2190 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.239000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 13 01:35:28.334000 audit[2250]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2250 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:35:28.334000 audit[2250]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffffd9d6fc0 a2=0 a3=1 items=0 ppid=2190 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.334000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 13 01:35:28.336000 audit[2252]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2252 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:35:28.336000 audit[2252]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffcb06f460 a2=0 a3=1 items=0 ppid=2190 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.336000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Sep 13 01:35:28.339000 audit[2255]: NETFILTER_CFG table=filter:25 family=2 entries=2 op=nft_register_chain pid=2255 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:35:28.339000 audit[2255]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffca53e320 a2=0 a3=1 items=0 ppid=2190 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.339000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Sep 13 01:35:28.340000 audit[2256]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_chain pid=2256 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:35:28.340000 audit[2256]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc8cef160 a2=0 a3=1 items=0 ppid=2190 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.340000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 13 01:35:28.342000 audit[2258]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2258 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:35:28.342000 audit[2258]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff76f0790 a2=0 a3=1 items=0 ppid=2190 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.342000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 13 01:35:28.344000 audit[2259]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2259 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:35:28.344000 audit[2259]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc058be20 a2=0 a3=1 items=0 ppid=2190 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.344000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 13 01:35:28.346000 audit[2261]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2261 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:35:28.346000 audit[2261]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffffcb4c760 a2=0 a3=1 items=0 ppid=2190 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.346000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 13 01:35:28.350000 audit[2264]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2264 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:35:28.350000 audit[2264]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffded2e300 a2=0 a3=1 items=0 ppid=2190 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.350000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Sep 13 01:35:28.352000 audit[2265]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_chain pid=2265 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:35:28.352000 audit[2265]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff0866320 a2=0 a3=1 items=0 ppid=2190 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.352000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 13 01:35:28.354000 audit[2267]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2267 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:35:28.354000 audit[2267]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffffe9e2dd0 a2=0 a3=1 items=0 ppid=2190 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.354000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 13 01:35:28.355000 audit[2268]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_chain pid=2268 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:35:28.355000 audit[2268]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe5300660 a2=0 a3=1 items=0 ppid=2190 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.355000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 13 01:35:28.357000 audit[2270]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_rule pid=2270 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:35:28.357000 audit[2270]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdfd98bd0 a2=0 a3=1 items=0 ppid=2190 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.357000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 13 01:35:28.358952 kubelet[1971]: E0913 01:35:28.358882 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:35:28.361000 audit[2273]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_rule pid=2273 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:35:28.361000 audit[2273]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff3b18340 a2=0 a3=1 items=0 ppid=2190 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.361000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 13 01:35:28.365000 audit[2276]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_rule pid=2276 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:35:28.365000 audit[2276]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd7e52d50 a2=0 a3=1 items=0 ppid=2190 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.365000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 13 01:35:28.366000 audit[2277]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2277 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:35:28.366000 audit[2277]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd67bcf90 a2=0 a3=1 items=0 ppid=2190 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.366000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 13 01:35:28.369000 audit[2279]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2279 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:35:28.369000 audit[2279]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=fffff59881d0 a2=0 a3=1 items=0 ppid=2190 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.369000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 01:35:28.464000 audit[2283]: NETFILTER_CFG table=nat:39 family=2 entries=2 op=nft_register_chain pid=2283 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:35:28.464000 audit[2283]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffdd391d60 a2=0 a3=1 items=0 ppid=2190 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.464000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 01:35:28.466000 audit[2284]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2284 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:35:28.466000 audit[2284]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcbca3a10 a2=0 a3=1 items=0 ppid=2190 pid=2284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.466000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 13 01:35:28.468000 audit[2286]: NETFILTER_CFG table=nat:41 family=2 entries=2 op=nft_register_chain pid=2286 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 01:35:28.468000 audit[2286]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffcd7fb790 a2=0 a3=1 items=0 ppid=2190 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.468000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 13 01:35:28.515000 audit[2292]: NETFILTER_CFG table=filter:42 family=2 entries=5 op=nft_register_rule pid=2292 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:35:28.515000 audit[2292]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffea9c4b40 a2=0 a3=1 items=0 ppid=2190 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.515000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:35:28.553691 kubelet[1971]: E0913 01:35:28.553601 1971 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mblgz" podUID="9c5d7852-9b3f-42a7-8a36-2aa1283d8cc1" Sep 13 01:35:28.590583 kubelet[1971]: I0913 01:35:28.590518 1971 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-h5n64" podStartSLOduration=7.467823451 podStartE2EDuration="10.590503083s" podCreationTimestamp="2025-09-13 01:35:18 +0000 UTC" firstStartedPulling="2025-09-13 01:35:24.870876832 +0000 UTC m=+7.320609733" lastFinishedPulling="2025-09-13 01:35:27.993556424 +0000 UTC m=+10.443289365" observedRunningTime="2025-09-13 01:35:28.589624096 +0000 UTC m=+11.039357077" watchObservedRunningTime="2025-09-13 01:35:28.590503083 +0000 UTC m=+11.040236024" Sep 13 01:35:28.656000 audit[2292]: NETFILTER_CFG table=nat:43 family=2 entries=79 op=nft_register_chain pid=2292 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:35:28.656000 audit[2292]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=38092 a0=3 a1=ffffea9c4b40 a2=0 a3=1 items=0 ppid=2190 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.656000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:35:28.693000 audit[2300]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2300 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:35:28.693000 audit[2300]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffffc56fcc0 a2=0 a3=1 items=0 ppid=2190 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.693000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 13 01:35:28.696000 audit[2302]: NETFILTER_CFG table=filter:45 family=10 entries=2 op=nft_register_chain pid=2302 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:35:28.696000 audit[2302]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffffa41c490 a2=0 a3=1 items=0 ppid=2190 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.696000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Sep 13 01:35:28.700000 audit[2305]: NETFILTER_CFG table=filter:46 family=10 entries=2 op=nft_register_chain pid=2305 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:35:28.700000 audit[2305]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffe5085070 a2=0 a3=1 items=0 ppid=2190 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.700000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Sep 13 01:35:28.701000 audit[2306]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_chain pid=2306 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:35:28.701000 audit[2306]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffeb281710 a2=0 a3=1 items=0 ppid=2190 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.701000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 13 01:35:28.703000 audit[2308]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_rule pid=2308 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:35:28.703000 audit[2308]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff9e362a0 a2=0 a3=1 items=0 ppid=2190 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.703000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 13 01:35:28.705000 audit[2309]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2309 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:35:28.705000 audit[2309]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcde01230 a2=0 a3=1 items=0 ppid=2190 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.705000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 13 01:35:28.707000 audit[2311]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2311 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:35:28.707000 audit[2311]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe2b0a060 a2=0 a3=1 items=0 ppid=2190 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.707000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Sep 13 01:35:28.711000 audit[2314]: NETFILTER_CFG table=filter:51 family=10 entries=2 op=nft_register_chain pid=2314 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:35:28.711000 audit[2314]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffc12344b0 a2=0 a3=1 items=0 ppid=2190 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.711000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 13 01:35:28.712000 audit[2315]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_chain pid=2315 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:35:28.712000 audit[2315]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff45ee4d0 a2=0 a3=1 items=0 ppid=2190 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.712000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 13 01:35:28.714000 audit[2317]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2317 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:35:28.714000 audit[2317]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff64b0030 a2=0 a3=1 items=0 ppid=2190 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.714000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 13 01:35:28.715000 audit[2318]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_chain pid=2318 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:35:28.715000 audit[2318]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe6cd86e0 a2=0 a3=1 items=0 ppid=2190 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.715000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 13 01:35:28.717000 audit[2320]: NETFILTER_CFG table=filter:55 family=10 entries=1 op=nft_register_rule pid=2320 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:35:28.717000 audit[2320]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff5c82b50 a2=0 a3=1 items=0 ppid=2190 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.717000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 13 01:35:28.720000 audit[2323]: NETFILTER_CFG table=filter:56 family=10 entries=1 op=nft_register_rule pid=2323 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:35:28.720000 audit[2323]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd13ee3d0 a2=0 a3=1 items=0 ppid=2190 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.720000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 13 01:35:28.724000 audit[2326]: NETFILTER_CFG table=filter:57 family=10 entries=1 op=nft_register_rule pid=2326 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:35:28.724000 audit[2326]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff6f218c0 a2=0 a3=1 items=0 ppid=2190 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.724000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Sep 13 01:35:28.726000 audit[2327]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2327 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:35:28.726000 audit[2327]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc2b84a00 a2=0 a3=1 items=0 ppid=2190 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.726000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 13 01:35:28.728000 audit[2329]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2329 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:35:28.728000 audit[2329]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffc7a92d10 a2=0 a3=1 items=0 ppid=2190 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.728000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 01:35:28.731000 audit[2332]: NETFILTER_CFG table=nat:60 family=10 entries=2 op=nft_register_chain pid=2332 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:35:28.731000 audit[2332]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffdbfcbc80 a2=0 a3=1 items=0 ppid=2190 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.731000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 01:35:28.733000 audit[2333]: NETFILTER_CFG table=nat:61 family=10 entries=1 op=nft_register_chain pid=2333 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:35:28.733000 audit[2333]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd997ab30 a2=0 a3=1 items=0 ppid=2190 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.733000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 13 01:35:28.735000 audit[2335]: NETFILTER_CFG table=nat:62 family=10 entries=2 op=nft_register_chain pid=2335 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:35:28.735000 audit[2335]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=fffff20b0640 a2=0 a3=1 items=0 ppid=2190 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.735000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 13 01:35:28.736000 audit[2336]: NETFILTER_CFG table=filter:63 family=10 entries=1 op=nft_register_chain pid=2336 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:35:28.736000 audit[2336]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdf9b3670 a2=0 a3=1 items=0 ppid=2190 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.736000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 13 01:35:28.738000 audit[2338]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_rule pid=2338 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:35:28.738000 audit[2338]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe43cfcc0 a2=0 a3=1 items=0 ppid=2190 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.738000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 01:35:28.740000 audit[2341]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_rule pid=2341 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 01:35:28.740000 audit[2341]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffecbdb700 a2=0 a3=1 items=0 ppid=2190 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.740000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 01:35:28.743000 audit[2343]: NETFILTER_CFG table=filter:66 family=10 entries=3 op=nft_register_rule pid=2343 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 13 01:35:28.743000 audit[2343]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2088 a0=3 a1=fffff4a67740 a2=0 a3=1 items=0 ppid=2190 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.743000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:35:28.743000 audit[2343]: NETFILTER_CFG table=nat:67 family=10 entries=7 op=nft_register_chain pid=2343 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 13 01:35:28.743000 audit[2343]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=fffff4a67740 a2=0 a3=1 items=0 ppid=2190 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:28.743000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:35:29.359012 kubelet[1971]: E0913 01:35:29.358954 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:35:30.360024 kubelet[1971]: E0913 01:35:30.359985 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:35:30.555247 kubelet[1971]: E0913 01:35:30.555196 1971 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mblgz" podUID="9c5d7852-9b3f-42a7-8a36-2aa1283d8cc1" Sep 13 01:35:30.758256 env[1468]: time="2025-09-13T01:35:30.758137056Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:35:30.771523 env[1468]: time="2025-09-13T01:35:30.771472741Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7077a1dc632ee598cbfa626f9e3c9bca5b20c0d1e1e557995890125b2e8d2e23,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:35:30.775241 env[1468]: time="2025-09-13T01:35:30.775209132Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:35:30.787084 env[1468]: time="2025-09-13T01:35:30.787045868Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:73d1e391050490d54e5bee8ff2b1a50a8be1746c98dc530361b00e8c0ab63f87,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:35:30.787745 env[1468]: time="2025-09-13T01:35:30.787720797Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\" returns image reference \"sha256:7077a1dc632ee598cbfa626f9e3c9bca5b20c0d1e1e557995890125b2e8d2e23\"" Sep 13 01:35:30.795000 env[1468]: time="2025-09-13T01:35:30.794960721Z" level=info msg="CreateContainer within sandbox \"275ad59520334231bbe3ead9cc7e0ca1d8346d55d40339328a520d3e4f67a052\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Sep 13 01:35:30.818460 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1108520951.mount: Deactivated successfully. Sep 13 01:35:30.834555 env[1468]: time="2025-09-13T01:35:30.834507783Z" level=info msg="CreateContainer within sandbox \"275ad59520334231bbe3ead9cc7e0ca1d8346d55d40339328a520d3e4f67a052\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"f43bbb9278e611fddc8d05a36146794a0d913771ddb7c48b58cbabd6e6bae1ae\"" Sep 13 01:35:30.835291 env[1468]: time="2025-09-13T01:35:30.835265918Z" level=info msg="StartContainer for \"f43bbb9278e611fddc8d05a36146794a0d913771ddb7c48b58cbabd6e6bae1ae\"" Sep 13 01:35:30.856977 systemd[1]: run-containerd-runc-k8s.io-f43bbb9278e611fddc8d05a36146794a0d913771ddb7c48b58cbabd6e6bae1ae-runc.ehMZsC.mount: Deactivated successfully. Sep 13 01:35:30.858356 systemd[1]: Started cri-containerd-f43bbb9278e611fddc8d05a36146794a0d913771ddb7c48b58cbabd6e6bae1ae.scope. Sep 13 01:35:30.871000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:30.878389 kernel: kauditd_printk_skb: 348 callbacks suppressed Sep 13 01:35:30.878458 kernel: audit: type=1400 audit(1757727330.871:528): avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:30.871000 audit[2351]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2047 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:30.923737 kernel: audit: type=1300 audit(1757727330.871:528): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2047 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:30.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634336262623932373865363131666464633864303561333631343637 Sep 13 01:35:30.953647 kernel: audit: type=1327 audit(1757727330.871:528): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634336262623932373865363131666464633864303561333631343637 Sep 13 01:35:30.871000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:30.971659 kernel: audit: type=1400 audit(1757727330.871:529): avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:30.871000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:30.992686 kernel: audit: type=1400 audit(1757727330.871:529): avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:30.871000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:31.011111 kernel: audit: type=1400 audit(1757727330.871:529): avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:30.871000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:31.029405 kernel: audit: type=1400 audit(1757727330.871:529): avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:31.029646 env[1468]: time="2025-09-13T01:35:31.029591292Z" level=info msg="StartContainer for \"f43bbb9278e611fddc8d05a36146794a0d913771ddb7c48b58cbabd6e6bae1ae\" returns successfully" Sep 13 01:35:30.871000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:31.047624 kernel: audit: type=1400 audit(1757727330.871:529): avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:30.871000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:31.069718 kernel: audit: type=1400 audit(1757727330.871:529): avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:30.871000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:31.089359 kernel: audit: type=1400 audit(1757727330.871:529): avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:30.871000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:30.871000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:30.871000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:30.871000 audit: BPF prog-id=70 op=LOAD Sep 13 01:35:30.871000 audit[2351]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2047 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:30.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634336262623932373865363131666464633864303561333631343637 Sep 13 01:35:30.871000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:30.871000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:30.871000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:30.871000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:30.871000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:30.871000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:30.871000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:30.871000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:30.871000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:30.871000 audit: BPF prog-id=71 op=LOAD Sep 13 01:35:30.871000 audit[2351]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2047 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:30.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634336262623932373865363131666464633864303561333631343637 Sep 13 01:35:30.871000 audit: BPF prog-id=71 op=UNLOAD Sep 13 01:35:30.871000 audit: BPF prog-id=70 op=UNLOAD Sep 13 01:35:30.871000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:30.871000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:30.871000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:30.871000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:30.871000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:30.871000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:30.871000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:30.871000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:30.871000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:30.871000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:30.871000 audit: BPF prog-id=72 op=LOAD Sep 13 01:35:30.871000 audit[2351]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2047 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:30.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634336262623932373865363131666464633864303561333631343637 Sep 13 01:35:31.361065 kubelet[1971]: E0913 01:35:31.361040 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:35:32.361731 kubelet[1971]: E0913 01:35:32.361692 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:35:32.553524 kubelet[1971]: E0913 01:35:32.553490 1971 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mblgz" podUID="9c5d7852-9b3f-42a7-8a36-2aa1283d8cc1" Sep 13 01:35:33.362473 kubelet[1971]: E0913 01:35:33.362433 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:35:33.408724 env[1468]: time="2025-09-13T01:35:33.408675376Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 13 01:35:33.411481 systemd[1]: cri-containerd-f43bbb9278e611fddc8d05a36146794a0d913771ddb7c48b58cbabd6e6bae1ae.scope: Deactivated successfully. Sep 13 01:35:33.414000 audit: BPF prog-id=72 op=UNLOAD Sep 13 01:35:33.428423 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-f43bbb9278e611fddc8d05a36146794a0d913771ddb7c48b58cbabd6e6bae1ae-rootfs.mount: Deactivated successfully. Sep 13 01:35:33.448748 kubelet[1971]: I0913 01:35:33.447782 1971 kubelet_node_status.go:501] "Fast updating node status as it just became ready" Sep 13 01:35:33.842566 env[1468]: time="2025-09-13T01:35:33.842451675Z" level=info msg="shim disconnected" id=f43bbb9278e611fddc8d05a36146794a0d913771ddb7c48b58cbabd6e6bae1ae Sep 13 01:35:33.842755 env[1468]: time="2025-09-13T01:35:33.842735174Z" level=warning msg="cleaning up after shim disconnected" id=f43bbb9278e611fddc8d05a36146794a0d913771ddb7c48b58cbabd6e6bae1ae namespace=k8s.io Sep 13 01:35:33.842821 env[1468]: time="2025-09-13T01:35:33.842808059Z" level=info msg="cleaning up dead shim" Sep 13 01:35:33.849645 env[1468]: time="2025-09-13T01:35:33.849607472Z" level=warning msg="cleanup warnings time=\"2025-09-13T01:35:33Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2391 runtime=io.containerd.runc.v2\n" Sep 13 01:35:34.363687 kubelet[1971]: E0913 01:35:34.363628 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:35:34.558946 systemd[1]: Created slice kubepods-besteffort-pod9c5d7852_9b3f_42a7_8a36_2aa1283d8cc1.slice. Sep 13 01:35:34.561262 env[1468]: time="2025-09-13T01:35:34.561229717Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-mblgz,Uid:9c5d7852-9b3f-42a7-8a36-2aa1283d8cc1,Namespace:calico-system,Attempt:0,}" Sep 13 01:35:34.586221 env[1468]: time="2025-09-13T01:35:34.584674599Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\"" Sep 13 01:35:34.642399 env[1468]: time="2025-09-13T01:35:34.641975441Z" level=error msg="Failed to destroy network for sandbox \"c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 01:35:34.644022 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2-shm.mount: Deactivated successfully. Sep 13 01:35:34.645083 env[1468]: time="2025-09-13T01:35:34.645048960Z" level=error msg="encountered an error cleaning up failed sandbox \"c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 01:35:34.645206 env[1468]: time="2025-09-13T01:35:34.645180369Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-mblgz,Uid:9c5d7852-9b3f-42a7-8a36-2aa1283d8cc1,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 01:35:34.645516 kubelet[1971]: E0913 01:35:34.645472 1971 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 01:35:34.645588 kubelet[1971]: E0913 01:35:34.645544 1971 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-mblgz" Sep 13 01:35:34.645588 kubelet[1971]: E0913 01:35:34.645565 1971 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-mblgz" Sep 13 01:35:34.645642 kubelet[1971]: E0913 01:35:34.645613 1971 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-mblgz_calico-system(9c5d7852-9b3f-42a7-8a36-2aa1283d8cc1)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-mblgz_calico-system(9c5d7852-9b3f-42a7-8a36-2aa1283d8cc1)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-mblgz" podUID="9c5d7852-9b3f-42a7-8a36-2aa1283d8cc1" Sep 13 01:35:35.363952 kubelet[1971]: E0913 01:35:35.363909 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:35:35.600784 kubelet[1971]: I0913 01:35:35.600712 1971 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2" Sep 13 01:35:35.601762 env[1468]: time="2025-09-13T01:35:35.601723180Z" level=info msg="StopPodSandbox for \"c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2\"" Sep 13 01:35:35.645699 env[1468]: time="2025-09-13T01:35:35.645365100Z" level=error msg="StopPodSandbox for \"c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2\" failed" error="failed to destroy network for sandbox \"c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 01:35:35.646075 kubelet[1971]: E0913 01:35:35.646027 1971 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2" Sep 13 01:35:35.646157 kubelet[1971]: E0913 01:35:35.646095 1971 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2"} Sep 13 01:35:35.646157 kubelet[1971]: E0913 01:35:35.646144 1971 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9c5d7852-9b3f-42a7-8a36-2aa1283d8cc1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 01:35:35.646242 kubelet[1971]: E0913 01:35:35.646166 1971 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9c5d7852-9b3f-42a7-8a36-2aa1283d8cc1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-mblgz" podUID="9c5d7852-9b3f-42a7-8a36-2aa1283d8cc1" Sep 13 01:35:36.364252 kubelet[1971]: E0913 01:35:36.364214 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:35:37.365442 kubelet[1971]: E0913 01:35:37.365272 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:35:38.351217 kubelet[1971]: E0913 01:35:38.351181 1971 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:35:38.365605 kubelet[1971]: E0913 01:35:38.365568 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:35:38.432969 systemd[1]: Created slice kubepods-besteffort-pode38003c9_a05d_42fc_bab0_1c8de9b2837f.slice. Sep 13 01:35:38.513258 kubelet[1971]: I0913 01:35:38.513217 1971 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-psvz2\" (UniqueName: \"kubernetes.io/projected/e38003c9-a05d-42fc-bab0-1c8de9b2837f-kube-api-access-psvz2\") pod \"nginx-deployment-7fcdb87857-2lblc\" (UID: \"e38003c9-a05d-42fc-bab0-1c8de9b2837f\") " pod="default/nginx-deployment-7fcdb87857-2lblc" Sep 13 01:35:38.738131 env[1468]: time="2025-09-13T01:35:38.737726297Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-2lblc,Uid:e38003c9-a05d-42fc-bab0-1c8de9b2837f,Namespace:default,Attempt:0,}" Sep 13 01:35:38.856761 env[1468]: time="2025-09-13T01:35:38.856698525Z" level=error msg="Failed to destroy network for sandbox \"704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 01:35:38.858328 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4-shm.mount: Deactivated successfully. Sep 13 01:35:38.859696 env[1468]: time="2025-09-13T01:35:38.859155908Z" level=error msg="encountered an error cleaning up failed sandbox \"704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 01:35:38.859696 env[1468]: time="2025-09-13T01:35:38.859213592Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-2lblc,Uid:e38003c9-a05d-42fc-bab0-1c8de9b2837f,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 01:35:38.860636 kubelet[1971]: E0913 01:35:38.859952 1971 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 01:35:38.860636 kubelet[1971]: E0913 01:35:38.860019 1971 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-2lblc" Sep 13 01:35:38.860636 kubelet[1971]: E0913 01:35:38.860041 1971 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-2lblc" Sep 13 01:35:38.860812 kubelet[1971]: E0913 01:35:38.860095 1971 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-7fcdb87857-2lblc_default(e38003c9-a05d-42fc-bab0-1c8de9b2837f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-7fcdb87857-2lblc_default(e38003c9-a05d-42fc-bab0-1c8de9b2837f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-2lblc" podUID="e38003c9-a05d-42fc-bab0-1c8de9b2837f" Sep 13 01:35:39.365724 kubelet[1971]: E0913 01:35:39.365647 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:35:39.607180 kubelet[1971]: I0913 01:35:39.606469 1971 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4" Sep 13 01:35:39.607315 env[1468]: time="2025-09-13T01:35:39.606986983Z" level=info msg="StopPodSandbox for \"704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4\"" Sep 13 01:35:39.649741 env[1468]: time="2025-09-13T01:35:39.649607927Z" level=error msg="StopPodSandbox for \"704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4\" failed" error="failed to destroy network for sandbox \"704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 01:35:39.650150 kubelet[1971]: E0913 01:35:39.649989 1971 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4" Sep 13 01:35:39.650150 kubelet[1971]: E0913 01:35:39.650046 1971 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4"} Sep 13 01:35:39.650150 kubelet[1971]: E0913 01:35:39.650091 1971 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e38003c9-a05d-42fc-bab0-1c8de9b2837f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 01:35:39.650150 kubelet[1971]: E0913 01:35:39.650124 1971 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e38003c9-a05d-42fc-bab0-1c8de9b2837f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-2lblc" podUID="e38003c9-a05d-42fc-bab0-1c8de9b2837f" Sep 13 01:35:39.842071 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2013924415.mount: Deactivated successfully. Sep 13 01:35:39.902950 env[1468]: time="2025-09-13T01:35:39.902838812Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:35:39.910378 env[1468]: time="2025-09-13T01:35:39.910338199Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b8abd2140fc4464ed664d225fe38e5b90bbfcf62996b484b0fc0e0537b6a4a9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:35:39.914877 env[1468]: time="2025-09-13T01:35:39.914851296Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:35:39.919014 env[1468]: time="2025-09-13T01:35:39.918990971Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:bcb8146fcaeced1e1c88fad3eaa697f1680746bd23c3e7e8d4535bc484c6f2a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:35:39.919335 env[1468]: time="2025-09-13T01:35:39.919307509Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\" returns image reference \"sha256:2b8abd2140fc4464ed664d225fe38e5b90bbfcf62996b484b0fc0e0537b6a4a9\"" Sep 13 01:35:39.937335 env[1468]: time="2025-09-13T01:35:39.937287212Z" level=info msg="CreateContainer within sandbox \"275ad59520334231bbe3ead9cc7e0ca1d8346d55d40339328a520d3e4f67a052\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Sep 13 01:35:39.975932 env[1468]: time="2025-09-13T01:35:39.975857406Z" level=info msg="CreateContainer within sandbox \"275ad59520334231bbe3ead9cc7e0ca1d8346d55d40339328a520d3e4f67a052\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"f0dcab693e9f7563a44c5881ed72cc4de44ed527bcb5fe9d3df008be65fe5bb6\"" Sep 13 01:35:39.976382 env[1468]: time="2025-09-13T01:35:39.976356674Z" level=info msg="StartContainer for \"f0dcab693e9f7563a44c5881ed72cc4de44ed527bcb5fe9d3df008be65fe5bb6\"" Sep 13 01:35:39.991973 systemd[1]: Started cri-containerd-f0dcab693e9f7563a44c5881ed72cc4de44ed527bcb5fe9d3df008be65fe5bb6.scope. Sep 13 01:35:40.031741 kernel: kauditd_printk_skb: 34 callbacks suppressed Sep 13 01:35:40.031868 kernel: audit: type=1400 audit(1757727340.009:535): avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:40.009000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:40.009000 audit[2502]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=2047 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:40.058453 kernel: audit: type=1300 audit(1757727340.009:535): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=2047 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:40.058550 kernel: audit: type=1327 audit(1757727340.009:535): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630646361623639336539663735363361343463353838316564373263 Sep 13 01:35:40.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630646361623639336539663735363361343463353838316564373263 Sep 13 01:35:40.009000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:40.098970 kernel: audit: type=1400 audit(1757727340.009:536): avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:40.009000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:40.116046 kernel: audit: type=1400 audit(1757727340.009:536): avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:40.009000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:40.133229 kernel: audit: type=1400 audit(1757727340.009:536): avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:40.009000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:40.152641 kernel: audit: type=1400 audit(1757727340.009:536): avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:40.009000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:40.164534 env[1468]: time="2025-09-13T01:35:40.164492337Z" level=info msg="StartContainer for \"f0dcab693e9f7563a44c5881ed72cc4de44ed527bcb5fe9d3df008be65fe5bb6\" returns successfully" Sep 13 01:35:40.170953 kernel: audit: type=1400 audit(1757727340.009:536): avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:40.009000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:40.189209 kernel: audit: type=1400 audit(1757727340.009:536): avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:40.009000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:40.209362 kernel: audit: type=1400 audit(1757727340.009:536): avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:40.009000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:40.009000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:40.009000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:40.009000 audit: BPF prog-id=73 op=LOAD Sep 13 01:35:40.009000 audit[2502]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=2047 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:40.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630646361623639336539663735363361343463353838316564373263 Sep 13 01:35:40.014000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:40.014000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:40.014000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:40.014000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:40.014000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:40.014000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:40.014000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:40.014000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:40.014000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:40.014000 audit: BPF prog-id=74 op=LOAD Sep 13 01:35:40.014000 audit[2502]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=2047 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:40.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630646361623639336539663735363361343463353838316564373263 Sep 13 01:35:40.031000 audit: BPF prog-id=74 op=UNLOAD Sep 13 01:35:40.031000 audit: BPF prog-id=73 op=UNLOAD Sep 13 01:35:40.031000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:40.031000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:40.031000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:40.031000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:40.031000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:40.031000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:40.031000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:40.031000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:40.031000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:40.031000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:40.031000 audit: BPF prog-id=75 op=LOAD Sep 13 01:35:40.031000 audit[2502]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=2047 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:40.031000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630646361623639336539663735363361343463353838316564373263 Sep 13 01:35:40.365981 kubelet[1971]: E0913 01:35:40.365949 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:35:40.590444 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Sep 13 01:35:40.590594 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Sep 13 01:35:41.367069 kubelet[1971]: E0913 01:35:41.367030 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:35:41.884000 audit[2618]: AVC avc: denied { write } for pid=2618 comm="tee" name="fd" dev="proc" ino=18082 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 01:35:41.884000 audit[2618]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd42eb7d3 a2=241 a3=1b6 items=1 ppid=2564 pid=2618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:41.884000 audit: CWD cwd="/etc/service/enabled/bird6/log" Sep 13 01:35:41.884000 audit: PATH item=0 name="/dev/fd/63" inode=18067 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:35:41.887000 audit[2615]: AVC avc: denied { write } for pid=2615 comm="tee" name="fd" dev="proc" ino=17251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 01:35:41.887000 audit[2615]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffeee527d4 a2=241 a3=1b6 items=1 ppid=2565 pid=2615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:41.887000 audit: CWD cwd="/etc/service/enabled/bird/log" Sep 13 01:35:41.887000 audit: PATH item=0 name="/dev/fd/63" inode=18066 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:35:41.887000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 01:35:41.884000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 01:35:41.891000 audit[2624]: AVC avc: denied { write } for pid=2624 comm="tee" name="fd" dev="proc" ino=18086 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 01:35:41.891000 audit[2624]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdff497d3 a2=241 a3=1b6 items=1 ppid=2568 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:41.891000 audit: CWD cwd="/etc/service/enabled/felix/log" Sep 13 01:35:41.891000 audit: PATH item=0 name="/dev/fd/63" inode=18078 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:35:41.891000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 01:35:41.892000 audit[2630]: AVC avc: denied { write } for pid=2630 comm="tee" name="fd" dev="proc" ino=17256 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 01:35:41.895000 audit[2632]: AVC avc: denied { write } for pid=2632 comm="tee" name="fd" dev="proc" ino=18090 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 01:35:41.895000 audit[2632]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff3d207d5 a2=241 a3=1b6 items=1 ppid=2570 pid=2632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:41.895000 audit: CWD cwd="/etc/service/enabled/cni/log" Sep 13 01:35:41.895000 audit: PATH item=0 name="/dev/fd/63" inode=17248 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:35:41.895000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 01:35:41.895000 audit[2627]: AVC avc: denied { write } for pid=2627 comm="tee" name="fd" dev="proc" ino=17259 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 01:35:41.892000 audit[2630]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc26fb7c4 a2=241 a3=1b6 items=1 ppid=2573 pid=2630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:41.892000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Sep 13 01:35:41.892000 audit: PATH item=0 name="/dev/fd/63" inode=17245 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:35:41.892000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 01:35:41.895000 audit[2627]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc547d7d3 a2=241 a3=1b6 items=1 ppid=2577 pid=2627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:41.895000 audit: CWD cwd="/etc/service/enabled/confd/log" Sep 13 01:35:41.895000 audit: PATH item=0 name="/dev/fd/63" inode=18079 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:35:41.895000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 01:35:41.928000 audit[2635]: AVC avc: denied { write } for pid=2635 comm="tee" name="fd" dev="proc" ino=17264 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 01:35:41.928000 audit[2635]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe92177c3 a2=241 a3=1b6 items=1 ppid=2579 pid=2635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:41.928000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Sep 13 01:35:41.928000 audit: PATH item=0 name="/dev/fd/63" inode=17253 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:35:41.928000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 01:35:42.093000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.093000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.093000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.093000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.093000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.093000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.093000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.093000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.093000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.093000 audit: BPF prog-id=76 op=LOAD Sep 13 01:35:42.093000 audit[2658]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffeb72f608 a2=98 a3=ffffeb72f5f8 items=0 ppid=2569 pid=2658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.093000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 01:35:42.093000 audit: BPF prog-id=76 op=UNLOAD Sep 13 01:35:42.093000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.093000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.093000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.093000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.093000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.093000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.093000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.093000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.093000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.093000 audit: BPF prog-id=77 op=LOAD Sep 13 01:35:42.093000 audit[2658]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffeb72f4b8 a2=74 a3=95 items=0 ppid=2569 pid=2658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.093000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 01:35:42.093000 audit: BPF prog-id=77 op=UNLOAD Sep 13 01:35:42.093000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.093000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.093000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.093000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.093000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.093000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.093000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.093000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.093000 audit[2658]: AVC avc: denied { bpf } for pid=2658 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.093000 audit: BPF prog-id=78 op=LOAD Sep 13 01:35:42.093000 audit[2658]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffeb72f4e8 a2=40 a3=ffffeb72f518 items=0 ppid=2569 pid=2658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.093000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 01:35:42.093000 audit: BPF prog-id=78 op=UNLOAD Sep 13 01:35:42.093000 audit[2658]: AVC avc: denied { perfmon } for pid=2658 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.093000 audit[2658]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=ffffeb72f600 a2=50 a3=0 items=0 ppid=2569 pid=2658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.093000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 01:35:42.096000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.096000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.096000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.096000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.096000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.096000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.096000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.096000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.096000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.096000 audit: BPF prog-id=79 op=LOAD Sep 13 01:35:42.096000 audit[2663]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd89214b8 a2=98 a3=ffffd89214a8 items=0 ppid=2569 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.096000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:35:42.096000 audit: BPF prog-id=79 op=UNLOAD Sep 13 01:35:42.097000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.097000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.097000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.097000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.097000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.097000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.097000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.097000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.097000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.097000 audit: BPF prog-id=80 op=LOAD Sep 13 01:35:42.097000 audit[2663]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd8921148 a2=74 a3=95 items=0 ppid=2569 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.097000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:35:42.097000 audit: BPF prog-id=80 op=UNLOAD Sep 13 01:35:42.097000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.097000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.097000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.097000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.097000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.097000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.097000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.097000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.097000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.097000 audit: BPF prog-id=81 op=LOAD Sep 13 01:35:42.097000 audit[2663]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd89211a8 a2=94 a3=2 items=0 ppid=2569 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.097000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:35:42.098000 audit: BPF prog-id=81 op=UNLOAD Sep 13 01:35:42.191000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.191000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.191000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.191000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.191000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.191000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.191000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.191000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.191000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.191000 audit: BPF prog-id=82 op=LOAD Sep 13 01:35:42.191000 audit[2663]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd8921168 a2=40 a3=ffffd8921198 items=0 ppid=2569 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.191000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:35:42.193000 audit: BPF prog-id=82 op=UNLOAD Sep 13 01:35:42.193000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.193000 audit[2663]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffd8921280 a2=50 a3=0 items=0 ppid=2569 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.193000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:35:42.201000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.201000 audit[2663]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd89211d8 a2=28 a3=ffffd8921308 items=0 ppid=2569 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.201000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:35:42.201000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.201000 audit[2663]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd8921208 a2=28 a3=ffffd8921338 items=0 ppid=2569 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.201000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:35:42.201000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.201000 audit[2663]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd89210b8 a2=28 a3=ffffd89211e8 items=0 ppid=2569 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.201000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:35:42.201000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.201000 audit[2663]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd8921228 a2=28 a3=ffffd8921358 items=0 ppid=2569 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.201000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:35:42.201000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.201000 audit[2663]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd8921208 a2=28 a3=ffffd8921338 items=0 ppid=2569 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.201000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:35:42.201000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.201000 audit[2663]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd89211f8 a2=28 a3=ffffd8921328 items=0 ppid=2569 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.201000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:35:42.201000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.201000 audit[2663]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd8921228 a2=28 a3=ffffd8921358 items=0 ppid=2569 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.201000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:35:42.201000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.201000 audit[2663]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd8921208 a2=28 a3=ffffd8921338 items=0 ppid=2569 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.201000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:35:42.201000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.201000 audit[2663]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd8921228 a2=28 a3=ffffd8921358 items=0 ppid=2569 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.201000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:35:42.201000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.201000 audit[2663]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd89211f8 a2=28 a3=ffffd8921328 items=0 ppid=2569 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.201000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:35:42.201000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.201000 audit[2663]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd8921278 a2=28 a3=ffffd89213b8 items=0 ppid=2569 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.201000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:35:42.201000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.201000 audit[2663]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffd8920fb0 a2=50 a3=0 items=0 ppid=2569 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.201000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:35:42.201000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.201000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.201000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.201000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.201000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.201000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.201000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.201000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.201000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.201000 audit: BPF prog-id=83 op=LOAD Sep 13 01:35:42.201000 audit[2663]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffd8920fb8 a2=94 a3=5 items=0 ppid=2569 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.201000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:35:42.202000 audit: BPF prog-id=83 op=UNLOAD Sep 13 01:35:42.202000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.202000 audit[2663]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffd89210c0 a2=50 a3=0 items=0 ppid=2569 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.202000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:35:42.202000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.202000 audit[2663]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffd8921208 a2=4 a3=3 items=0 ppid=2569 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.202000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:35:42.202000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.202000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.202000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.202000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.202000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.202000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.202000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.202000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.202000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.202000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.202000 audit[2663]: AVC avc: denied { confidentiality } for pid=2663 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:35:42.202000 audit[2663]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd89211e8 a2=94 a3=6 items=0 ppid=2569 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.202000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:35:42.202000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.202000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.202000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.202000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.202000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.202000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.202000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.202000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.202000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.202000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.202000 audit[2663]: AVC avc: denied { confidentiality } for pid=2663 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:35:42.202000 audit[2663]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd89209b8 a2=94 a3=83 items=0 ppid=2569 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.202000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:35:42.202000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.202000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.202000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.202000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.202000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.202000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.202000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.202000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.202000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.202000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.202000 audit[2663]: AVC avc: denied { confidentiality } for pid=2663 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:35:42.202000 audit[2663]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd89209b8 a2=94 a3=83 items=0 ppid=2569 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.202000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 01:35:42.210000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.210000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.210000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.210000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.210000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.210000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.210000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.210000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.210000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.210000 audit: BPF prog-id=84 op=LOAD Sep 13 01:35:42.210000 audit[2672]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcd895f48 a2=98 a3=ffffcd895f38 items=0 ppid=2569 pid=2672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.210000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 13 01:35:42.210000 audit: BPF prog-id=84 op=UNLOAD Sep 13 01:35:42.210000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.210000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.210000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.210000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.210000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.210000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.210000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.210000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.210000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.210000 audit: BPF prog-id=85 op=LOAD Sep 13 01:35:42.210000 audit[2672]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcd895df8 a2=74 a3=95 items=0 ppid=2569 pid=2672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.210000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 13 01:35:42.210000 audit: BPF prog-id=85 op=UNLOAD Sep 13 01:35:42.210000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.210000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.210000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.210000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.210000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.210000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.210000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.210000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.210000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.210000 audit: BPF prog-id=86 op=LOAD Sep 13 01:35:42.210000 audit[2672]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcd895e28 a2=40 a3=ffffcd895e58 items=0 ppid=2569 pid=2672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.210000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 13 01:35:42.210000 audit: BPF prog-id=86 op=UNLOAD Sep 13 01:35:42.357799 systemd-networkd[1625]: vxlan.calico: Link UP Sep 13 01:35:42.357810 systemd-networkd[1625]: vxlan.calico: Gained carrier Sep 13 01:35:42.368177 kubelet[1971]: E0913 01:35:42.368121 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:35:42.403000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.403000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.403000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.403000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.403000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.403000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.403000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.403000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.403000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.403000 audit: BPF prog-id=87 op=LOAD Sep 13 01:35:42.403000 audit[2699]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdb7183f8 a2=98 a3=ffffdb7183e8 items=0 ppid=2569 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.403000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:35:42.404000 audit: BPF prog-id=87 op=UNLOAD Sep 13 01:35:42.404000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.404000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.404000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.404000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.404000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.404000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.404000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.404000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.404000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.404000 audit: BPF prog-id=88 op=LOAD Sep 13 01:35:42.404000 audit[2699]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdb7180d8 a2=74 a3=95 items=0 ppid=2569 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.404000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:35:42.406000 audit: BPF prog-id=88 op=UNLOAD Sep 13 01:35:42.406000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.406000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.406000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.406000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.406000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.406000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.406000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.406000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.406000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.406000 audit: BPF prog-id=89 op=LOAD Sep 13 01:35:42.406000 audit[2699]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdb718138 a2=94 a3=2 items=0 ppid=2569 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.406000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:35:42.406000 audit: BPF prog-id=89 op=UNLOAD Sep 13 01:35:42.406000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.406000 audit[2699]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdb718168 a2=28 a3=ffffdb718298 items=0 ppid=2569 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.406000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:35:42.406000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.406000 audit[2699]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdb718198 a2=28 a3=ffffdb7182c8 items=0 ppid=2569 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.406000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:35:42.406000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.406000 audit[2699]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdb718048 a2=28 a3=ffffdb718178 items=0 ppid=2569 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.406000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:35:42.406000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.406000 audit[2699]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdb7181b8 a2=28 a3=ffffdb7182e8 items=0 ppid=2569 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.406000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:35:42.406000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.406000 audit[2699]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdb718198 a2=28 a3=ffffdb7182c8 items=0 ppid=2569 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.406000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:35:42.406000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.406000 audit[2699]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdb718188 a2=28 a3=ffffdb7182b8 items=0 ppid=2569 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.406000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:35:42.406000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.406000 audit[2699]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdb7181b8 a2=28 a3=ffffdb7182e8 items=0 ppid=2569 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.406000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:35:42.406000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.406000 audit[2699]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdb718198 a2=28 a3=ffffdb7182c8 items=0 ppid=2569 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.406000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:35:42.406000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.406000 audit[2699]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdb7181b8 a2=28 a3=ffffdb7182e8 items=0 ppid=2569 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.406000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:35:42.406000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.406000 audit[2699]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdb718188 a2=28 a3=ffffdb7182b8 items=0 ppid=2569 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.406000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:35:42.406000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.406000 audit[2699]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdb718208 a2=28 a3=ffffdb718348 items=0 ppid=2569 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.406000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:35:42.406000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.406000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.406000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.406000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.406000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.406000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.406000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.406000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.406000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.406000 audit: BPF prog-id=90 op=LOAD Sep 13 01:35:42.406000 audit[2699]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffdb718028 a2=40 a3=ffffdb718058 items=0 ppid=2569 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.406000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:35:42.406000 audit: BPF prog-id=90 op=UNLOAD Sep 13 01:35:42.407000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.407000 audit[2699]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffdb718050 a2=50 a3=0 items=0 ppid=2569 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.407000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:35:42.407000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.407000 audit[2699]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffdb718050 a2=50 a3=0 items=0 ppid=2569 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.407000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:35:42.407000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.407000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.407000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.407000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.407000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.407000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.407000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.407000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.407000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.407000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.407000 audit: BPF prog-id=91 op=LOAD Sep 13 01:35:42.407000 audit[2699]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffdb7177b8 a2=94 a3=2 items=0 ppid=2569 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.407000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:35:42.407000 audit: BPF prog-id=91 op=UNLOAD Sep 13 01:35:42.407000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.407000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.407000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.407000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.407000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.407000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.407000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.407000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.407000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.407000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.407000 audit: BPF prog-id=92 op=LOAD Sep 13 01:35:42.407000 audit[2699]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffdb717948 a2=94 a3=30 items=0 ppid=2569 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.407000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 01:35:42.411000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.411000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.411000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.411000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.411000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.411000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.411000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.411000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.411000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.411000 audit: BPF prog-id=93 op=LOAD Sep 13 01:35:42.411000 audit[2703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffef4ad3e8 a2=98 a3=ffffef4ad3d8 items=0 ppid=2569 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.411000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:35:42.411000 audit: BPF prog-id=93 op=UNLOAD Sep 13 01:35:42.411000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.411000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.411000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.411000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.411000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.411000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.411000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.411000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.411000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.411000 audit: BPF prog-id=94 op=LOAD Sep 13 01:35:42.411000 audit[2703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffef4ad078 a2=74 a3=95 items=0 ppid=2569 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.411000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:35:42.411000 audit: BPF prog-id=94 op=UNLOAD Sep 13 01:35:42.411000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.411000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.411000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.411000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.411000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.411000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.411000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.411000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.411000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.411000 audit: BPF prog-id=95 op=LOAD Sep 13 01:35:42.411000 audit[2703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffef4ad0d8 a2=94 a3=2 items=0 ppid=2569 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.411000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:35:42.411000 audit: BPF prog-id=95 op=UNLOAD Sep 13 01:35:42.510000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.510000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.510000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.510000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.510000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.510000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.510000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.510000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.510000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.510000 audit: BPF prog-id=96 op=LOAD Sep 13 01:35:42.510000 audit[2703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffef4ad098 a2=40 a3=ffffef4ad0c8 items=0 ppid=2569 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.510000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:35:42.513000 audit: BPF prog-id=96 op=UNLOAD Sep 13 01:35:42.513000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.513000 audit[2703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffef4ad1b0 a2=50 a3=0 items=0 ppid=2569 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.513000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:35:42.521000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.521000 audit[2703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffef4ad108 a2=28 a3=ffffef4ad238 items=0 ppid=2569 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.521000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:35:42.521000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.521000 audit[2703]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffef4ad138 a2=28 a3=ffffef4ad268 items=0 ppid=2569 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.521000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:35:42.522000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.522000 audit[2703]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffef4acfe8 a2=28 a3=ffffef4ad118 items=0 ppid=2569 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.522000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:35:42.522000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.522000 audit[2703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffef4ad158 a2=28 a3=ffffef4ad288 items=0 ppid=2569 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.522000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:35:42.522000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.522000 audit[2703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffef4ad138 a2=28 a3=ffffef4ad268 items=0 ppid=2569 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.522000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:35:42.522000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.522000 audit[2703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffef4ad128 a2=28 a3=ffffef4ad258 items=0 ppid=2569 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.522000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:35:42.522000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.522000 audit[2703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffef4ad158 a2=28 a3=ffffef4ad288 items=0 ppid=2569 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.522000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:35:42.522000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.522000 audit[2703]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffef4ad138 a2=28 a3=ffffef4ad268 items=0 ppid=2569 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.522000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:35:42.522000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.522000 audit[2703]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffef4ad158 a2=28 a3=ffffef4ad288 items=0 ppid=2569 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.522000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:35:42.522000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.522000 audit[2703]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffef4ad128 a2=28 a3=ffffef4ad258 items=0 ppid=2569 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.522000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:35:42.522000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.522000 audit[2703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffef4ad1a8 a2=28 a3=ffffef4ad2e8 items=0 ppid=2569 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.522000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:35:42.522000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.522000 audit[2703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffef4acee0 a2=50 a3=0 items=0 ppid=2569 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.522000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:35:42.522000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.522000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.522000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.522000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.522000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.522000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.522000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.522000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.522000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.522000 audit: BPF prog-id=97 op=LOAD Sep 13 01:35:42.522000 audit[2703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffef4acee8 a2=94 a3=5 items=0 ppid=2569 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.522000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:35:42.522000 audit: BPF prog-id=97 op=UNLOAD Sep 13 01:35:42.522000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.522000 audit[2703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffef4acff0 a2=50 a3=0 items=0 ppid=2569 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.522000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:35:42.522000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.522000 audit[2703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffef4ad138 a2=4 a3=3 items=0 ppid=2569 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.522000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:35:42.522000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.522000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.522000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.522000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.522000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.522000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.522000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.522000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.522000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.522000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.522000 audit[2703]: AVC avc: denied { confidentiality } for pid=2703 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:35:42.522000 audit[2703]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffef4ad118 a2=94 a3=6 items=0 ppid=2569 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.522000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:35:42.522000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.522000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.522000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.522000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.522000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.522000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.522000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.522000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.522000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.522000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.522000 audit[2703]: AVC avc: denied { confidentiality } for pid=2703 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:35:42.522000 audit[2703]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffef4ac8e8 a2=94 a3=83 items=0 ppid=2569 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.522000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:35:42.522000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.522000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.522000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.522000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.522000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.522000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.522000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.522000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.522000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.522000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.522000 audit[2703]: AVC avc: denied { confidentiality } for pid=2703 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:35:42.522000 audit[2703]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffef4ac8e8 a2=94 a3=83 items=0 ppid=2569 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.522000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:35:42.523000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.523000 audit[2703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffef4ae328 a2=10 a3=ffffef4ae418 items=0 ppid=2569 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.523000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:35:42.523000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.523000 audit[2703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffef4ae1e8 a2=10 a3=ffffef4ae2d8 items=0 ppid=2569 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.523000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:35:42.523000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.523000 audit[2703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffef4ae158 a2=10 a3=ffffef4ae2d8 items=0 ppid=2569 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.523000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:35:42.523000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:42.523000 audit[2703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffef4ae158 a2=10 a3=ffffef4ae2d8 items=0 ppid=2569 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.523000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 01:35:42.528000 audit: BPF prog-id=92 op=UNLOAD Sep 13 01:35:42.704000 audit[2728]: NETFILTER_CFG table=mangle:68 family=2 entries=16 op=nft_register_chain pid=2728 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 01:35:42.704000 audit[2728]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffe4da3470 a2=0 a3=ffffbf0c0fa8 items=0 ppid=2569 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.704000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 01:35:42.746000 audit[2727]: NETFILTER_CFG table=nat:69 family=2 entries=15 op=nft_register_chain pid=2727 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 01:35:42.746000 audit[2727]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffccd5e520 a2=0 a3=ffff9b099fa8 items=0 ppid=2569 pid=2727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.746000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 01:35:42.746000 audit[2729]: NETFILTER_CFG table=filter:70 family=2 entries=39 op=nft_register_chain pid=2729 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 01:35:42.746000 audit[2729]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=fffffbde1820 a2=0 a3=ffff8bb8efa8 items=0 ppid=2569 pid=2729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.746000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 01:35:42.772000 audit[2726]: NETFILTER_CFG table=raw:71 family=2 entries=21 op=nft_register_chain pid=2726 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 01:35:42.772000 audit[2726]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=ffffca68fca0 a2=0 a3=ffffbee7dfa8 items=0 ppid=2569 pid=2726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:42.772000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 01:35:43.368273 kubelet[1971]: E0913 01:35:43.368222 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:35:43.494779 systemd-networkd[1625]: vxlan.calico: Gained IPv6LL Sep 13 01:35:44.368897 kubelet[1971]: E0913 01:35:44.368851 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:35:45.369500 kubelet[1971]: E0913 01:35:45.369454 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:35:46.370149 kubelet[1971]: E0913 01:35:46.370117 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:35:47.307837 kubelet[1971]: I0913 01:35:47.307803 1971 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Sep 13 01:35:47.371280 kubelet[1971]: E0913 01:35:47.371238 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:35:47.389430 kubelet[1971]: I0913 01:35:47.389100 1971 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-lmfgv" podStartSLOduration=14.330602607 podStartE2EDuration="29.389083194s" podCreationTimestamp="2025-09-13 01:35:18 +0000 UTC" firstStartedPulling="2025-09-13 01:35:24.861853061 +0000 UTC m=+7.311586002" lastFinishedPulling="2025-09-13 01:35:39.920333688 +0000 UTC m=+22.370066589" observedRunningTime="2025-09-13 01:35:40.635331872 +0000 UTC m=+23.085064813" watchObservedRunningTime="2025-09-13 01:35:47.389083194 +0000 UTC m=+29.838816135" Sep 13 01:35:47.555098 env[1468]: time="2025-09-13T01:35:47.554961887Z" level=info msg="StopPodSandbox for \"c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2\"" Sep 13 01:35:47.638056 env[1468]: 2025-09-13 01:35:47.602 [INFO][2799] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2" Sep 13 01:35:47.638056 env[1468]: 2025-09-13 01:35:47.602 [INFO][2799] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2" iface="eth0" netns="/var/run/netns/cni-6b934e00-4b16-d3d4-3376-47bb18b98211" Sep 13 01:35:47.638056 env[1468]: 2025-09-13 01:35:47.603 [INFO][2799] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2" iface="eth0" netns="/var/run/netns/cni-6b934e00-4b16-d3d4-3376-47bb18b98211" Sep 13 01:35:47.638056 env[1468]: 2025-09-13 01:35:47.603 [INFO][2799] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2" iface="eth0" netns="/var/run/netns/cni-6b934e00-4b16-d3d4-3376-47bb18b98211" Sep 13 01:35:47.638056 env[1468]: 2025-09-13 01:35:47.603 [INFO][2799] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2" Sep 13 01:35:47.638056 env[1468]: 2025-09-13 01:35:47.603 [INFO][2799] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2" Sep 13 01:35:47.638056 env[1468]: 2025-09-13 01:35:47.623 [INFO][2806] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2" HandleID="k8s-pod-network.c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2" Workload="10.200.20.27-k8s-csi--node--driver--mblgz-eth0" Sep 13 01:35:47.638056 env[1468]: 2025-09-13 01:35:47.623 [INFO][2806] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 01:35:47.638056 env[1468]: 2025-09-13 01:35:47.623 [INFO][2806] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 01:35:47.638056 env[1468]: 2025-09-13 01:35:47.633 [WARNING][2806] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2" HandleID="k8s-pod-network.c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2" Workload="10.200.20.27-k8s-csi--node--driver--mblgz-eth0" Sep 13 01:35:47.638056 env[1468]: 2025-09-13 01:35:47.633 [INFO][2806] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2" HandleID="k8s-pod-network.c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2" Workload="10.200.20.27-k8s-csi--node--driver--mblgz-eth0" Sep 13 01:35:47.638056 env[1468]: 2025-09-13 01:35:47.634 [INFO][2806] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 01:35:47.638056 env[1468]: 2025-09-13 01:35:47.636 [INFO][2799] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2" Sep 13 01:35:47.638619 env[1468]: time="2025-09-13T01:35:47.638589126Z" level=info msg="TearDown network for sandbox \"c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2\" successfully" Sep 13 01:35:47.638712 env[1468]: time="2025-09-13T01:35:47.638695410Z" level=info msg="StopPodSandbox for \"c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2\" returns successfully" Sep 13 01:35:47.641259 env[1468]: time="2025-09-13T01:35:47.640303085Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-mblgz,Uid:9c5d7852-9b3f-42a7-8a36-2aa1283d8cc1,Namespace:calico-system,Attempt:1,}" Sep 13 01:35:47.640725 systemd[1]: run-netns-cni\x2d6b934e00\x2d4b16\x2dd3d4\x2d3376\x2d47bb18b98211.mount: Deactivated successfully. Sep 13 01:35:47.793722 systemd-networkd[1625]: cali86d706c5e89: Link UP Sep 13 01:35:47.803980 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 01:35:47.804092 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali86d706c5e89: link becomes ready Sep 13 01:35:47.806809 systemd-networkd[1625]: cali86d706c5e89: Gained carrier Sep 13 01:35:47.813779 env[1468]: 2025-09-13 01:35:47.714 [INFO][2812] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.27-k8s-csi--node--driver--mblgz-eth0 csi-node-driver- calico-system 9c5d7852-9b3f-42a7-8a36-2aa1283d8cc1 1467 0 2025-09-13 01:35:18 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:6c96d95cc7 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.200.20.27 csi-node-driver-mblgz eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali86d706c5e89 [] [] }} ContainerID="3d11b55d96f7a5802e9da92f4876716a87058e1e428e8a4e60485a66e9af9540" Namespace="calico-system" Pod="csi-node-driver-mblgz" WorkloadEndpoint="10.200.20.27-k8s-csi--node--driver--mblgz-" Sep 13 01:35:47.813779 env[1468]: 2025-09-13 01:35:47.714 [INFO][2812] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="3d11b55d96f7a5802e9da92f4876716a87058e1e428e8a4e60485a66e9af9540" Namespace="calico-system" Pod="csi-node-driver-mblgz" WorkloadEndpoint="10.200.20.27-k8s-csi--node--driver--mblgz-eth0" Sep 13 01:35:47.813779 env[1468]: 2025-09-13 01:35:47.737 [INFO][2827] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3d11b55d96f7a5802e9da92f4876716a87058e1e428e8a4e60485a66e9af9540" HandleID="k8s-pod-network.3d11b55d96f7a5802e9da92f4876716a87058e1e428e8a4e60485a66e9af9540" Workload="10.200.20.27-k8s-csi--node--driver--mblgz-eth0" Sep 13 01:35:47.813779 env[1468]: 2025-09-13 01:35:47.737 [INFO][2827] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="3d11b55d96f7a5802e9da92f4876716a87058e1e428e8a4e60485a66e9af9540" HandleID="k8s-pod-network.3d11b55d96f7a5802e9da92f4876716a87058e1e428e8a4e60485a66e9af9540" Workload="10.200.20.27-k8s-csi--node--driver--mblgz-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002aa1b0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.200.20.27", "pod":"csi-node-driver-mblgz", "timestamp":"2025-09-13 01:35:47.737132216 +0000 UTC"}, Hostname:"10.200.20.27", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 01:35:47.813779 env[1468]: 2025-09-13 01:35:47.737 [INFO][2827] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 01:35:47.813779 env[1468]: 2025-09-13 01:35:47.737 [INFO][2827] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 01:35:47.813779 env[1468]: 2025-09-13 01:35:47.737 [INFO][2827] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.27' Sep 13 01:35:47.813779 env[1468]: 2025-09-13 01:35:47.748 [INFO][2827] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.3d11b55d96f7a5802e9da92f4876716a87058e1e428e8a4e60485a66e9af9540" host="10.200.20.27" Sep 13 01:35:47.813779 env[1468]: 2025-09-13 01:35:47.753 [INFO][2827] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.20.27" Sep 13 01:35:47.813779 env[1468]: 2025-09-13 01:35:47.761 [INFO][2827] ipam/ipam.go 511: Trying affinity for 192.168.76.192/26 host="10.200.20.27" Sep 13 01:35:47.813779 env[1468]: 2025-09-13 01:35:47.763 [INFO][2827] ipam/ipam.go 158: Attempting to load block cidr=192.168.76.192/26 host="10.200.20.27" Sep 13 01:35:47.813779 env[1468]: 2025-09-13 01:35:47.765 [INFO][2827] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.76.192/26 host="10.200.20.27" Sep 13 01:35:47.813779 env[1468]: 2025-09-13 01:35:47.765 [INFO][2827] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.76.192/26 handle="k8s-pod-network.3d11b55d96f7a5802e9da92f4876716a87058e1e428e8a4e60485a66e9af9540" host="10.200.20.27" Sep 13 01:35:47.813779 env[1468]: 2025-09-13 01:35:47.767 [INFO][2827] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.3d11b55d96f7a5802e9da92f4876716a87058e1e428e8a4e60485a66e9af9540 Sep 13 01:35:47.813779 env[1468]: 2025-09-13 01:35:47.776 [INFO][2827] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.76.192/26 handle="k8s-pod-network.3d11b55d96f7a5802e9da92f4876716a87058e1e428e8a4e60485a66e9af9540" host="10.200.20.27" Sep 13 01:35:47.813779 env[1468]: 2025-09-13 01:35:47.782 [INFO][2827] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.76.193/26] block=192.168.76.192/26 handle="k8s-pod-network.3d11b55d96f7a5802e9da92f4876716a87058e1e428e8a4e60485a66e9af9540" host="10.200.20.27" Sep 13 01:35:47.813779 env[1468]: 2025-09-13 01:35:47.782 [INFO][2827] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.76.193/26] handle="k8s-pod-network.3d11b55d96f7a5802e9da92f4876716a87058e1e428e8a4e60485a66e9af9540" host="10.200.20.27" Sep 13 01:35:47.813779 env[1468]: 2025-09-13 01:35:47.782 [INFO][2827] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 01:35:47.813779 env[1468]: 2025-09-13 01:35:47.782 [INFO][2827] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.76.193/26] IPv6=[] ContainerID="3d11b55d96f7a5802e9da92f4876716a87058e1e428e8a4e60485a66e9af9540" HandleID="k8s-pod-network.3d11b55d96f7a5802e9da92f4876716a87058e1e428e8a4e60485a66e9af9540" Workload="10.200.20.27-k8s-csi--node--driver--mblgz-eth0" Sep 13 01:35:47.814296 env[1468]: 2025-09-13 01:35:47.787 [INFO][2812] cni-plugin/k8s.go 418: Populated endpoint ContainerID="3d11b55d96f7a5802e9da92f4876716a87058e1e428e8a4e60485a66e9af9540" Namespace="calico-system" Pod="csi-node-driver-mblgz" WorkloadEndpoint="10.200.20.27-k8s-csi--node--driver--mblgz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.27-k8s-csi--node--driver--mblgz-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"9c5d7852-9b3f-42a7-8a36-2aa1283d8cc1", ResourceVersion:"1467", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 1, 35, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.27", ContainerID:"", Pod:"csi-node-driver-mblgz", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.76.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali86d706c5e89", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 01:35:47.814296 env[1468]: 2025-09-13 01:35:47.787 [INFO][2812] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.76.193/32] ContainerID="3d11b55d96f7a5802e9da92f4876716a87058e1e428e8a4e60485a66e9af9540" Namespace="calico-system" Pod="csi-node-driver-mblgz" WorkloadEndpoint="10.200.20.27-k8s-csi--node--driver--mblgz-eth0" Sep 13 01:35:47.814296 env[1468]: 2025-09-13 01:35:47.788 [INFO][2812] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali86d706c5e89 ContainerID="3d11b55d96f7a5802e9da92f4876716a87058e1e428e8a4e60485a66e9af9540" Namespace="calico-system" Pod="csi-node-driver-mblgz" WorkloadEndpoint="10.200.20.27-k8s-csi--node--driver--mblgz-eth0" Sep 13 01:35:47.814296 env[1468]: 2025-09-13 01:35:47.790 [INFO][2812] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="3d11b55d96f7a5802e9da92f4876716a87058e1e428e8a4e60485a66e9af9540" Namespace="calico-system" Pod="csi-node-driver-mblgz" WorkloadEndpoint="10.200.20.27-k8s-csi--node--driver--mblgz-eth0" Sep 13 01:35:47.814296 env[1468]: 2025-09-13 01:35:47.790 [INFO][2812] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="3d11b55d96f7a5802e9da92f4876716a87058e1e428e8a4e60485a66e9af9540" Namespace="calico-system" Pod="csi-node-driver-mblgz" WorkloadEndpoint="10.200.20.27-k8s-csi--node--driver--mblgz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.27-k8s-csi--node--driver--mblgz-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"9c5d7852-9b3f-42a7-8a36-2aa1283d8cc1", ResourceVersion:"1467", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 1, 35, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.27", ContainerID:"3d11b55d96f7a5802e9da92f4876716a87058e1e428e8a4e60485a66e9af9540", Pod:"csi-node-driver-mblgz", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.76.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali86d706c5e89", MAC:"fe:cc:88:64:a7:49", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 01:35:47.814296 env[1468]: 2025-09-13 01:35:47.804 [INFO][2812] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="3d11b55d96f7a5802e9da92f4876716a87058e1e428e8a4e60485a66e9af9540" Namespace="calico-system" Pod="csi-node-driver-mblgz" WorkloadEndpoint="10.200.20.27-k8s-csi--node--driver--mblgz-eth0" Sep 13 01:35:47.836986 env[1468]: time="2025-09-13T01:35:47.836828720Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 01:35:47.836986 env[1468]: time="2025-09-13T01:35:47.836865362Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 01:35:47.836986 env[1468]: time="2025-09-13T01:35:47.836874962Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 01:35:47.837178 env[1468]: time="2025-09-13T01:35:47.837103253Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3d11b55d96f7a5802e9da92f4876716a87058e1e428e8a4e60485a66e9af9540 pid=2857 runtime=io.containerd.runc.v2 Sep 13 01:35:47.847682 systemd[1]: Started cri-containerd-3d11b55d96f7a5802e9da92f4876716a87058e1e428e8a4e60485a66e9af9540.scope. Sep 13 01:35:47.882014 kernel: kauditd_printk_skb: 590 callbacks suppressed Sep 13 01:35:47.882114 kernel: audit: type=1400 audit(1757727347.859:650): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:47.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:47.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:47.899672 kernel: audit: type=1400 audit(1757727347.859:651): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:47.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:47.916508 kernel: audit: type=1400 audit(1757727347.859:652): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:47.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:47.933269 kernel: audit: type=1400 audit(1757727347.859:653): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:47.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:47.949776 kernel: audit: type=1400 audit(1757727347.859:654): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:47.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:47.967420 kernel: audit: type=1400 audit(1757727347.859:655): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:47.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:47.985772 kernel: audit: type=1400 audit(1757727347.859:656): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:47.986413 env[1468]: time="2025-09-13T01:35:47.986197808Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-mblgz,Uid:9c5d7852-9b3f-42a7-8a36-2aa1283d8cc1,Namespace:calico-system,Attempt:1,} returns sandbox id \"3d11b55d96f7a5802e9da92f4876716a87058e1e428e8a4e60485a66e9af9540\"" Sep 13 01:35:47.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:47.987996 env[1468]: time="2025-09-13T01:35:47.987971930Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\"" Sep 13 01:35:47.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:48.021322 kernel: audit: type=1400 audit(1757727347.859:657): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:48.021396 kernel: audit: type=1400 audit(1757727347.859:658): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:47.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:48.037553 kernel: audit: type=1400 audit(1757727347.859:659): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:47.859000 audit: BPF prog-id=98 op=LOAD Sep 13 01:35:47.859000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:47.859000 audit[2868]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=2857 pid=2868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:47.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364313162353564393666376135383032653964613932663438373637 Sep 13 01:35:47.859000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:47.859000 audit[2868]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=2857 pid=2868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:47.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364313162353564393666376135383032653964613932663438373637 Sep 13 01:35:47.859000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:47.859000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:47.859000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:47.859000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:47.859000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:47.859000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:47.859000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:47.859000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:47.859000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:47.859000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:47.859000 audit: BPF prog-id=99 op=LOAD Sep 13 01:35:47.859000 audit[2868]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=2857 pid=2868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:47.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364313162353564393666376135383032653964613932663438373637 Sep 13 01:35:47.864000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:47.864000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:47.864000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:47.864000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:47.864000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:47.864000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:47.864000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:47.864000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:47.864000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:47.864000 audit: BPF prog-id=100 op=LOAD Sep 13 01:35:47.864000 audit[2868]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=2857 pid=2868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:47.864000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364313162353564393666376135383032653964613932663438373637 Sep 13 01:35:47.881000 audit: BPF prog-id=100 op=UNLOAD Sep 13 01:35:47.881000 audit: BPF prog-id=99 op=UNLOAD Sep 13 01:35:47.881000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:47.881000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:47.881000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:47.881000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:47.881000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:47.881000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:47.881000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:47.881000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:47.881000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:47.881000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:47.881000 audit: BPF prog-id=101 op=LOAD Sep 13 01:35:47.881000 audit[2868]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=2857 pid=2868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:47.881000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364313162353564393666376135383032653964613932663438373637 Sep 13 01:35:47.855000 audit[2848]: NETFILTER_CFG table=filter:72 family=2 entries=38 op=nft_register_chain pid=2848 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 01:35:47.855000 audit[2848]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21364 a0=3 a1=ffffc91aa730 a2=0 a3=ffff959fafa8 items=0 ppid=2569 pid=2848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:47.855000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 01:35:48.372112 kubelet[1971]: E0913 01:35:48.372064 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:35:49.127446 systemd-networkd[1625]: cali86d706c5e89: Gained IPv6LL Sep 13 01:35:49.373136 kubelet[1971]: E0913 01:35:49.373095 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:35:49.937831 env[1468]: time="2025-09-13T01:35:49.937787575Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:35:49.943565 env[1468]: time="2025-09-13T01:35:49.943529349Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5e2b30128ce4b607acd97d3edef62ce1a90be0259903090a51c360adbe4a8f3b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:35:49.946935 env[1468]: time="2025-09-13T01:35:49.946910258Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:35:49.952419 env[1468]: time="2025-09-13T01:35:49.952396340Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:f22c88018d8b58c4ef0052f594b216a13bd6852166ac131a538c5ab2fba23bb2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:35:49.952881 env[1468]: time="2025-09-13T01:35:49.952855800Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\" returns image reference \"sha256:5e2b30128ce4b607acd97d3edef62ce1a90be0259903090a51c360adbe4a8f3b\"" Sep 13 01:35:49.960422 env[1468]: time="2025-09-13T01:35:49.960392173Z" level=info msg="CreateContainer within sandbox \"3d11b55d96f7a5802e9da92f4876716a87058e1e428e8a4e60485a66e9af9540\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Sep 13 01:35:49.987357 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2818777787.mount: Deactivated successfully. Sep 13 01:35:50.001877 env[1468]: time="2025-09-13T01:35:50.001834522Z" level=info msg="CreateContainer within sandbox \"3d11b55d96f7a5802e9da92f4876716a87058e1e428e8a4e60485a66e9af9540\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"2f1efa759329be7da186f1c51199ee4c1ccf212d359e761db1f5cbf609d237e6\"" Sep 13 01:35:50.002483 env[1468]: time="2025-09-13T01:35:50.002460229Z" level=info msg="StartContainer for \"2f1efa759329be7da186f1c51199ee4c1ccf212d359e761db1f5cbf609d237e6\"" Sep 13 01:35:50.025157 systemd[1]: run-containerd-runc-k8s.io-2f1efa759329be7da186f1c51199ee4c1ccf212d359e761db1f5cbf609d237e6-runc.JGNhxE.mount: Deactivated successfully. Sep 13 01:35:50.026542 systemd[1]: Started cri-containerd-2f1efa759329be7da186f1c51199ee4c1ccf212d359e761db1f5cbf609d237e6.scope. Sep 13 01:35:50.037000 audit[2901]: AVC avc: denied { perfmon } for pid=2901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:50.037000 audit[2901]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=2857 pid=2901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:50.037000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266316566613735393332396265376461313836663163353131393965 Sep 13 01:35:50.037000 audit[2901]: AVC avc: denied { bpf } for pid=2901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:50.037000 audit[2901]: AVC avc: denied { bpf } for pid=2901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:50.037000 audit[2901]: AVC avc: denied { bpf } for pid=2901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:50.037000 audit[2901]: AVC avc: denied { perfmon } for pid=2901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:50.037000 audit[2901]: AVC avc: denied { perfmon } for pid=2901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:50.037000 audit[2901]: AVC avc: denied { perfmon } for pid=2901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:50.037000 audit[2901]: AVC avc: denied { perfmon } for pid=2901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:50.037000 audit[2901]: AVC avc: denied { perfmon } for pid=2901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:50.037000 audit[2901]: AVC avc: denied { bpf } for pid=2901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:50.037000 audit[2901]: AVC avc: denied { bpf } for pid=2901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:50.037000 audit: BPF prog-id=102 op=LOAD Sep 13 01:35:50.037000 audit[2901]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=2857 pid=2901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:50.037000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266316566613735393332396265376461313836663163353131393965 Sep 13 01:35:50.037000 audit[2901]: AVC avc: denied { bpf } for pid=2901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:50.037000 audit[2901]: AVC avc: denied { bpf } for pid=2901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:50.037000 audit[2901]: AVC avc: denied { perfmon } for pid=2901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:50.037000 audit[2901]: AVC avc: denied { perfmon } for pid=2901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:50.037000 audit[2901]: AVC avc: denied { perfmon } for pid=2901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:50.037000 audit[2901]: AVC avc: denied { perfmon } for pid=2901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:50.037000 audit[2901]: AVC avc: denied { perfmon } for pid=2901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:50.037000 audit[2901]: AVC avc: denied { bpf } for pid=2901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:50.037000 audit[2901]: AVC avc: denied { bpf } for pid=2901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:50.037000 audit: BPF prog-id=103 op=LOAD Sep 13 01:35:50.037000 audit[2901]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=2857 pid=2901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:50.037000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266316566613735393332396265376461313836663163353131393965 Sep 13 01:35:50.037000 audit: BPF prog-id=103 op=UNLOAD Sep 13 01:35:50.037000 audit: BPF prog-id=102 op=UNLOAD Sep 13 01:35:50.037000 audit[2901]: AVC avc: denied { bpf } for pid=2901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:50.037000 audit[2901]: AVC avc: denied { bpf } for pid=2901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:50.037000 audit[2901]: AVC avc: denied { bpf } for pid=2901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:50.037000 audit[2901]: AVC avc: denied { perfmon } for pid=2901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:50.037000 audit[2901]: AVC avc: denied { perfmon } for pid=2901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:50.037000 audit[2901]: AVC avc: denied { perfmon } for pid=2901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:50.037000 audit[2901]: AVC avc: denied { perfmon } for pid=2901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:50.037000 audit[2901]: AVC avc: denied { perfmon } for pid=2901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:50.037000 audit[2901]: AVC avc: denied { bpf } for pid=2901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:50.037000 audit[2901]: AVC avc: denied { bpf } for pid=2901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:50.037000 audit: BPF prog-id=104 op=LOAD Sep 13 01:35:50.037000 audit[2901]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=2857 pid=2901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:50.037000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266316566613735393332396265376461313836663163353131393965 Sep 13 01:35:50.056787 env[1468]: time="2025-09-13T01:35:50.056747048Z" level=info msg="StartContainer for \"2f1efa759329be7da186f1c51199ee4c1ccf212d359e761db1f5cbf609d237e6\" returns successfully" Sep 13 01:35:50.058161 env[1468]: time="2025-09-13T01:35:50.058136028Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\"" Sep 13 01:35:50.374062 kubelet[1971]: E0913 01:35:50.374028 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:35:51.375097 kubelet[1971]: E0913 01:35:51.375055 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:35:51.722672 env[1468]: time="2025-09-13T01:35:51.722546944Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:35:51.728002 env[1468]: time="2025-09-13T01:35:51.727963852Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a319b5bdc1001e98875b68e2943279adb74bcb19d09f1db857bc27959a078a65,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:35:51.731883 env[1468]: time="2025-09-13T01:35:51.731856055Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:35:51.735794 env[1468]: time="2025-09-13T01:35:51.735759459Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:731ab232ca708102ab332340b1274d5cd656aa896ecc5368ee95850b811df86f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:35:51.736451 env[1468]: time="2025-09-13T01:35:51.736412647Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\" returns image reference \"sha256:a319b5bdc1001e98875b68e2943279adb74bcb19d09f1db857bc27959a078a65\"" Sep 13 01:35:51.744857 env[1468]: time="2025-09-13T01:35:51.744808280Z" level=info msg="CreateContainer within sandbox \"3d11b55d96f7a5802e9da92f4876716a87058e1e428e8a4e60485a66e9af9540\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Sep 13 01:35:51.769431 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount412100125.mount: Deactivated successfully. Sep 13 01:35:51.786511 env[1468]: time="2025-09-13T01:35:51.786456751Z" level=info msg="CreateContainer within sandbox \"3d11b55d96f7a5802e9da92f4876716a87058e1e428e8a4e60485a66e9af9540\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"f61e6e7e0c60c4d6570be4edb78b15f1d84a1985945e7d26aa3a64bbf63bd91a\"" Sep 13 01:35:51.787443 env[1468]: time="2025-09-13T01:35:51.787409991Z" level=info msg="StartContainer for \"f61e6e7e0c60c4d6570be4edb78b15f1d84a1985945e7d26aa3a64bbf63bd91a\"" Sep 13 01:35:51.806298 systemd[1]: Started cri-containerd-f61e6e7e0c60c4d6570be4edb78b15f1d84a1985945e7d26aa3a64bbf63bd91a.scope. Sep 13 01:35:51.821000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:51.821000 audit[2937]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2857 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:51.821000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636316536653765306336306334643635373062653465646237386231 Sep 13 01:35:51.822000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:51.822000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:51.822000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:51.822000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:51.822000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:51.822000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:51.822000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:51.822000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:51.822000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:51.822000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:51.822000 audit: BPF prog-id=105 op=LOAD Sep 13 01:35:51.822000 audit[2937]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2857 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:51.822000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636316536653765306336306334643635373062653465646237386231 Sep 13 01:35:51.822000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:51.822000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:51.822000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:51.822000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:51.822000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:51.822000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:51.822000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:51.822000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:51.822000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:51.822000 audit: BPF prog-id=106 op=LOAD Sep 13 01:35:51.822000 audit[2937]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2857 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:51.822000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636316536653765306336306334643635373062653465646237386231 Sep 13 01:35:51.823000 audit: BPF prog-id=106 op=UNLOAD Sep 13 01:35:51.823000 audit: BPF prog-id=105 op=UNLOAD Sep 13 01:35:51.823000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:51.823000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:51.823000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:51.823000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:51.823000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:51.823000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:51.823000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:51.823000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:51.823000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:51.823000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:51.823000 audit: BPF prog-id=107 op=LOAD Sep 13 01:35:51.823000 audit[2937]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2857 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:51.823000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636316536653765306336306334643635373062653465646237386231 Sep 13 01:35:51.841212 env[1468]: time="2025-09-13T01:35:51.841153571Z" level=info msg="StartContainer for \"f61e6e7e0c60c4d6570be4edb78b15f1d84a1985945e7d26aa3a64bbf63bd91a\" returns successfully" Sep 13 01:35:52.376785 kubelet[1971]: E0913 01:35:52.376723 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:35:52.450794 kubelet[1971]: I0913 01:35:52.450509 1971 csi_plugin.go:106] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Sep 13 01:35:52.450794 kubelet[1971]: I0913 01:35:52.450540 1971 csi_plugin.go:119] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Sep 13 01:35:52.554396 env[1468]: time="2025-09-13T01:35:52.554354886Z" level=info msg="StopPodSandbox for \"704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4\"" Sep 13 01:35:52.638698 env[1468]: 2025-09-13 01:35:52.599 [INFO][2977] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4" Sep 13 01:35:52.638698 env[1468]: 2025-09-13 01:35:52.600 [INFO][2977] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4" iface="eth0" netns="/var/run/netns/cni-b56accf5-c2ff-f89a-b525-3274dc0754b4" Sep 13 01:35:52.638698 env[1468]: 2025-09-13 01:35:52.600 [INFO][2977] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4" iface="eth0" netns="/var/run/netns/cni-b56accf5-c2ff-f89a-b525-3274dc0754b4" Sep 13 01:35:52.638698 env[1468]: 2025-09-13 01:35:52.601 [INFO][2977] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4" iface="eth0" netns="/var/run/netns/cni-b56accf5-c2ff-f89a-b525-3274dc0754b4" Sep 13 01:35:52.638698 env[1468]: 2025-09-13 01:35:52.601 [INFO][2977] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4" Sep 13 01:35:52.638698 env[1468]: 2025-09-13 01:35:52.601 [INFO][2977] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4" Sep 13 01:35:52.638698 env[1468]: 2025-09-13 01:35:52.620 [INFO][2984] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4" HandleID="k8s-pod-network.704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4" Workload="10.200.20.27-k8s-nginx--deployment--7fcdb87857--2lblc-eth0" Sep 13 01:35:52.638698 env[1468]: 2025-09-13 01:35:52.620 [INFO][2984] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 01:35:52.638698 env[1468]: 2025-09-13 01:35:52.620 [INFO][2984] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 01:35:52.638698 env[1468]: 2025-09-13 01:35:52.629 [WARNING][2984] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4" HandleID="k8s-pod-network.704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4" Workload="10.200.20.27-k8s-nginx--deployment--7fcdb87857--2lblc-eth0" Sep 13 01:35:52.638698 env[1468]: 2025-09-13 01:35:52.629 [INFO][2984] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4" HandleID="k8s-pod-network.704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4" Workload="10.200.20.27-k8s-nginx--deployment--7fcdb87857--2lblc-eth0" Sep 13 01:35:52.638698 env[1468]: 2025-09-13 01:35:52.631 [INFO][2984] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 01:35:52.638698 env[1468]: 2025-09-13 01:35:52.635 [INFO][2977] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4" Sep 13 01:35:52.638698 env[1468]: time="2025-09-13T01:35:52.637836992Z" level=info msg="TearDown network for sandbox \"704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4\" successfully" Sep 13 01:35:52.638698 env[1468]: time="2025-09-13T01:35:52.637873794Z" level=info msg="StopPodSandbox for \"704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4\" returns successfully" Sep 13 01:35:52.639534 systemd[1]: run-netns-cni\x2db56accf5\x2dc2ff\x2df89a\x2db525\x2d3274dc0754b4.mount: Deactivated successfully. Sep 13 01:35:52.640764 env[1468]: time="2025-09-13T01:35:52.640732871Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-2lblc,Uid:e38003c9-a05d-42fc-bab0-1c8de9b2837f,Namespace:default,Attempt:1,}" Sep 13 01:35:52.650298 kubelet[1971]: I0913 01:35:52.650091 1971 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-mblgz" podStartSLOduration=30.899677572999998 podStartE2EDuration="34.650075655s" podCreationTimestamp="2025-09-13 01:35:18 +0000 UTC" firstStartedPulling="2025-09-13 01:35:47.987381982 +0000 UTC m=+30.437114923" lastFinishedPulling="2025-09-13 01:35:51.737780104 +0000 UTC m=+34.187513005" observedRunningTime="2025-09-13 01:35:52.649313864 +0000 UTC m=+35.099046805" watchObservedRunningTime="2025-09-13 01:35:52.650075655 +0000 UTC m=+35.099808596" Sep 13 01:35:52.895753 systemd-networkd[1625]: cali4dbfba3bc7f: Link UP Sep 13 01:35:52.909503 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 01:35:52.909610 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4dbfba3bc7f: link becomes ready Sep 13 01:35:52.909930 systemd-networkd[1625]: cali4dbfba3bc7f: Gained carrier Sep 13 01:35:52.922088 env[1468]: 2025-09-13 01:35:52.795 [INFO][2995] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.27-k8s-nginx--deployment--7fcdb87857--2lblc-eth0 nginx-deployment-7fcdb87857- default e38003c9-a05d-42fc-bab0-1c8de9b2837f 1496 0 2025-09-13 01:35:38 +0000 UTC map[app:nginx pod-template-hash:7fcdb87857 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.27 nginx-deployment-7fcdb87857-2lblc eth0 default [] [] [kns.default ksa.default.default] cali4dbfba3bc7f [] [] }} ContainerID="17d8b09315f4f43239b4c60591b027d1d01699b9add276278cd6e579f36bf68f" Namespace="default" Pod="nginx-deployment-7fcdb87857-2lblc" WorkloadEndpoint="10.200.20.27-k8s-nginx--deployment--7fcdb87857--2lblc-" Sep 13 01:35:52.922088 env[1468]: 2025-09-13 01:35:52.795 [INFO][2995] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="17d8b09315f4f43239b4c60591b027d1d01699b9add276278cd6e579f36bf68f" Namespace="default" Pod="nginx-deployment-7fcdb87857-2lblc" WorkloadEndpoint="10.200.20.27-k8s-nginx--deployment--7fcdb87857--2lblc-eth0" Sep 13 01:35:52.922088 env[1468]: 2025-09-13 01:35:52.818 [INFO][3009] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="17d8b09315f4f43239b4c60591b027d1d01699b9add276278cd6e579f36bf68f" HandleID="k8s-pod-network.17d8b09315f4f43239b4c60591b027d1d01699b9add276278cd6e579f36bf68f" Workload="10.200.20.27-k8s-nginx--deployment--7fcdb87857--2lblc-eth0" Sep 13 01:35:52.922088 env[1468]: 2025-09-13 01:35:52.818 [INFO][3009] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="17d8b09315f4f43239b4c60591b027d1d01699b9add276278cd6e579f36bf68f" HandleID="k8s-pod-network.17d8b09315f4f43239b4c60591b027d1d01699b9add276278cd6e579f36bf68f" Workload="10.200.20.27-k8s-nginx--deployment--7fcdb87857--2lblc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d3640), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.27", "pod":"nginx-deployment-7fcdb87857-2lblc", "timestamp":"2025-09-13 01:35:52.818750458 +0000 UTC"}, Hostname:"10.200.20.27", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 01:35:52.922088 env[1468]: 2025-09-13 01:35:52.819 [INFO][3009] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 01:35:52.922088 env[1468]: 2025-09-13 01:35:52.819 [INFO][3009] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 01:35:52.922088 env[1468]: 2025-09-13 01:35:52.819 [INFO][3009] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.27' Sep 13 01:35:52.922088 env[1468]: 2025-09-13 01:35:52.832 [INFO][3009] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.17d8b09315f4f43239b4c60591b027d1d01699b9add276278cd6e579f36bf68f" host="10.200.20.27" Sep 13 01:35:52.922088 env[1468]: 2025-09-13 01:35:52.844 [INFO][3009] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.20.27" Sep 13 01:35:52.922088 env[1468]: 2025-09-13 01:35:52.859 [INFO][3009] ipam/ipam.go 511: Trying affinity for 192.168.76.192/26 host="10.200.20.27" Sep 13 01:35:52.922088 env[1468]: 2025-09-13 01:35:52.863 [INFO][3009] ipam/ipam.go 158: Attempting to load block cidr=192.168.76.192/26 host="10.200.20.27" Sep 13 01:35:52.922088 env[1468]: 2025-09-13 01:35:52.867 [INFO][3009] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.76.192/26 host="10.200.20.27" Sep 13 01:35:52.922088 env[1468]: 2025-09-13 01:35:52.867 [INFO][3009] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.76.192/26 handle="k8s-pod-network.17d8b09315f4f43239b4c60591b027d1d01699b9add276278cd6e579f36bf68f" host="10.200.20.27" Sep 13 01:35:52.922088 env[1468]: 2025-09-13 01:35:52.870 [INFO][3009] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.17d8b09315f4f43239b4c60591b027d1d01699b9add276278cd6e579f36bf68f Sep 13 01:35:52.922088 env[1468]: 2025-09-13 01:35:52.882 [INFO][3009] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.76.192/26 handle="k8s-pod-network.17d8b09315f4f43239b4c60591b027d1d01699b9add276278cd6e579f36bf68f" host="10.200.20.27" Sep 13 01:35:52.922088 env[1468]: 2025-09-13 01:35:52.891 [INFO][3009] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.76.194/26] block=192.168.76.192/26 handle="k8s-pod-network.17d8b09315f4f43239b4c60591b027d1d01699b9add276278cd6e579f36bf68f" host="10.200.20.27" Sep 13 01:35:52.922088 env[1468]: 2025-09-13 01:35:52.891 [INFO][3009] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.76.194/26] handle="k8s-pod-network.17d8b09315f4f43239b4c60591b027d1d01699b9add276278cd6e579f36bf68f" host="10.200.20.27" Sep 13 01:35:52.922088 env[1468]: 2025-09-13 01:35:52.891 [INFO][3009] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 01:35:52.922088 env[1468]: 2025-09-13 01:35:52.891 [INFO][3009] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.76.194/26] IPv6=[] ContainerID="17d8b09315f4f43239b4c60591b027d1d01699b9add276278cd6e579f36bf68f" HandleID="k8s-pod-network.17d8b09315f4f43239b4c60591b027d1d01699b9add276278cd6e579f36bf68f" Workload="10.200.20.27-k8s-nginx--deployment--7fcdb87857--2lblc-eth0" Sep 13 01:35:52.922944 env[1468]: 2025-09-13 01:35:52.893 [INFO][2995] cni-plugin/k8s.go 418: Populated endpoint ContainerID="17d8b09315f4f43239b4c60591b027d1d01699b9add276278cd6e579f36bf68f" Namespace="default" Pod="nginx-deployment-7fcdb87857-2lblc" WorkloadEndpoint="10.200.20.27-k8s-nginx--deployment--7fcdb87857--2lblc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.27-k8s-nginx--deployment--7fcdb87857--2lblc-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"e38003c9-a05d-42fc-bab0-1c8de9b2837f", ResourceVersion:"1496", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 1, 35, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.27", ContainerID:"", Pod:"nginx-deployment-7fcdb87857-2lblc", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.76.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali4dbfba3bc7f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 01:35:52.922944 env[1468]: 2025-09-13 01:35:52.893 [INFO][2995] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.76.194/32] ContainerID="17d8b09315f4f43239b4c60591b027d1d01699b9add276278cd6e579f36bf68f" Namespace="default" Pod="nginx-deployment-7fcdb87857-2lblc" WorkloadEndpoint="10.200.20.27-k8s-nginx--deployment--7fcdb87857--2lblc-eth0" Sep 13 01:35:52.922944 env[1468]: 2025-09-13 01:35:52.893 [INFO][2995] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali4dbfba3bc7f ContainerID="17d8b09315f4f43239b4c60591b027d1d01699b9add276278cd6e579f36bf68f" Namespace="default" Pod="nginx-deployment-7fcdb87857-2lblc" WorkloadEndpoint="10.200.20.27-k8s-nginx--deployment--7fcdb87857--2lblc-eth0" Sep 13 01:35:52.922944 env[1468]: 2025-09-13 01:35:52.910 [INFO][2995] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="17d8b09315f4f43239b4c60591b027d1d01699b9add276278cd6e579f36bf68f" Namespace="default" Pod="nginx-deployment-7fcdb87857-2lblc" WorkloadEndpoint="10.200.20.27-k8s-nginx--deployment--7fcdb87857--2lblc-eth0" Sep 13 01:35:52.922944 env[1468]: 2025-09-13 01:35:52.910 [INFO][2995] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="17d8b09315f4f43239b4c60591b027d1d01699b9add276278cd6e579f36bf68f" Namespace="default" Pod="nginx-deployment-7fcdb87857-2lblc" WorkloadEndpoint="10.200.20.27-k8s-nginx--deployment--7fcdb87857--2lblc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.27-k8s-nginx--deployment--7fcdb87857--2lblc-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"e38003c9-a05d-42fc-bab0-1c8de9b2837f", ResourceVersion:"1496", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 1, 35, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.27", ContainerID:"17d8b09315f4f43239b4c60591b027d1d01699b9add276278cd6e579f36bf68f", Pod:"nginx-deployment-7fcdb87857-2lblc", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.76.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali4dbfba3bc7f", MAC:"86:6c:85:2a:4d:be", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 01:35:52.922944 env[1468]: 2025-09-13 01:35:52.920 [INFO][2995] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="17d8b09315f4f43239b4c60591b027d1d01699b9add276278cd6e579f36bf68f" Namespace="default" Pod="nginx-deployment-7fcdb87857-2lblc" WorkloadEndpoint="10.200.20.27-k8s-nginx--deployment--7fcdb87857--2lblc-eth0" Sep 13 01:35:52.934000 audit[3034]: NETFILTER_CFG table=filter:73 family=2 entries=42 op=nft_register_chain pid=3034 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 01:35:52.941453 env[1468]: time="2025-09-13T01:35:52.941395812Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 01:35:52.941580 kernel: kauditd_printk_skb: 136 callbacks suppressed Sep 13 01:35:52.941624 kernel: audit: type=1325 audit(1757727352.934:681): table=filter:73 family=2 entries=42 op=nft_register_chain pid=3034 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 01:35:52.941786 env[1468]: time="2025-09-13T01:35:52.941758387Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 01:35:52.941904 env[1468]: time="2025-09-13T01:35:52.941882632Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 01:35:52.942127 env[1468]: time="2025-09-13T01:35:52.942098281Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/17d8b09315f4f43239b4c60591b027d1d01699b9add276278cd6e579f36bf68f pid=3036 runtime=io.containerd.runc.v2 Sep 13 01:35:52.934000 audit[3034]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22512 a0=3 a1=fffff61aa770 a2=0 a3=ffff8de08fa8 items=0 ppid=2569 pid=3034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:52.934000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 01:35:53.001245 kernel: audit: type=1300 audit(1757727352.934:681): arch=c00000b7 syscall=211 success=yes exit=22512 a0=3 a1=fffff61aa770 a2=0 a3=ffff8de08fa8 items=0 ppid=2569 pid=3034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:53.001372 kernel: audit: type=1327 audit(1757727352.934:681): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 01:35:53.008238 systemd[1]: Started cri-containerd-17d8b09315f4f43239b4c60591b027d1d01699b9add276278cd6e579f36bf68f.scope. Sep 13 01:35:53.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:53.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:53.036731 kernel: audit: type=1400 audit(1757727353.017:682): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:53.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:53.053748 kernel: audit: type=1400 audit(1757727353.018:683): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:53.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:53.094318 kernel: audit: type=1400 audit(1757727353.018:684): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:53.094393 kernel: audit: type=1400 audit(1757727353.018:685): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:53.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:53.112016 kernel: audit: type=1400 audit(1757727353.018:686): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:53.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:53.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:53.151754 kernel: audit: type=1400 audit(1757727353.018:687): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:53.151864 kernel: audit: type=1400 audit(1757727353.018:688): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:53.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:53.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:53.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:53.035000 audit: BPF prog-id=108 op=LOAD Sep 13 01:35:53.035000 audit[3045]: AVC avc: denied { bpf } for pid=3045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:53.035000 audit[3045]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=3036 pid=3045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:53.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137643862303933313566346634333233396234633630353931623032 Sep 13 01:35:53.035000 audit[3045]: AVC avc: denied { perfmon } for pid=3045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:53.035000 audit[3045]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3036 pid=3045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:53.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137643862303933313566346634333233396234633630353931623032 Sep 13 01:35:53.035000 audit[3045]: AVC avc: denied { bpf } for pid=3045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:53.035000 audit[3045]: AVC avc: denied { bpf } for pid=3045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:53.035000 audit[3045]: AVC avc: denied { bpf } for pid=3045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:53.035000 audit[3045]: AVC avc: denied { perfmon } for pid=3045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:53.035000 audit[3045]: AVC avc: denied { perfmon } for pid=3045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:53.035000 audit[3045]: AVC avc: denied { perfmon } for pid=3045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:53.035000 audit[3045]: AVC avc: denied { perfmon } for pid=3045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:53.035000 audit[3045]: AVC avc: denied { perfmon } for pid=3045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:53.035000 audit[3045]: AVC avc: denied { bpf } for pid=3045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:53.035000 audit[3045]: AVC avc: denied { bpf } for pid=3045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:53.035000 audit: BPF prog-id=109 op=LOAD Sep 13 01:35:53.035000 audit[3045]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3036 pid=3045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:53.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137643862303933313566346634333233396234633630353931623032 Sep 13 01:35:53.051000 audit[3045]: AVC avc: denied { bpf } for pid=3045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:53.051000 audit[3045]: AVC avc: denied { bpf } for pid=3045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:53.051000 audit[3045]: AVC avc: denied { perfmon } for pid=3045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:53.051000 audit[3045]: AVC avc: denied { perfmon } for pid=3045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:53.051000 audit[3045]: AVC avc: denied { perfmon } for pid=3045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:53.051000 audit[3045]: AVC avc: denied { perfmon } for pid=3045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:53.051000 audit[3045]: AVC avc: denied { perfmon } for pid=3045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:53.051000 audit[3045]: AVC avc: denied { bpf } for pid=3045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:53.051000 audit[3045]: AVC avc: denied { bpf } for pid=3045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:53.051000 audit: BPF prog-id=110 op=LOAD Sep 13 01:35:53.051000 audit[3045]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3036 pid=3045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:53.051000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137643862303933313566346634333233396234633630353931623032 Sep 13 01:35:53.051000 audit: BPF prog-id=110 op=UNLOAD Sep 13 01:35:53.051000 audit: BPF prog-id=109 op=UNLOAD Sep 13 01:35:53.051000 audit[3045]: AVC avc: denied { bpf } for pid=3045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:53.051000 audit[3045]: AVC avc: denied { bpf } for pid=3045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:53.051000 audit[3045]: AVC avc: denied { bpf } for pid=3045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:53.051000 audit[3045]: AVC avc: denied { perfmon } for pid=3045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:53.051000 audit[3045]: AVC avc: denied { perfmon } for pid=3045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:53.051000 audit[3045]: AVC avc: denied { perfmon } for pid=3045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:53.051000 audit[3045]: AVC avc: denied { perfmon } for pid=3045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:53.051000 audit[3045]: AVC avc: denied { perfmon } for pid=3045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:53.051000 audit[3045]: AVC avc: denied { bpf } for pid=3045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:53.051000 audit[3045]: AVC avc: denied { bpf } for pid=3045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:53.051000 audit: BPF prog-id=111 op=LOAD Sep 13 01:35:53.051000 audit[3045]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3036 pid=3045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:53.051000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137643862303933313566346634333233396234633630353931623032 Sep 13 01:35:53.157479 env[1468]: time="2025-09-13T01:35:53.157434489Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-2lblc,Uid:e38003c9-a05d-42fc-bab0-1c8de9b2837f,Namespace:default,Attempt:1,} returns sandbox id \"17d8b09315f4f43239b4c60591b027d1d01699b9add276278cd6e579f36bf68f\"" Sep 13 01:35:53.159021 env[1468]: time="2025-09-13T01:35:53.158977231Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Sep 13 01:35:53.377298 kubelet[1971]: E0913 01:35:53.377257 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:35:54.054798 systemd-networkd[1625]: cali4dbfba3bc7f: Gained IPv6LL Sep 13 01:35:54.378255 kubelet[1971]: E0913 01:35:54.378201 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:35:55.378740 kubelet[1971]: E0913 01:35:55.378700 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:35:55.976186 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount933075330.mount: Deactivated successfully. Sep 13 01:35:56.378825 kubelet[1971]: E0913 01:35:56.378791 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:35:57.379361 kubelet[1971]: E0913 01:35:57.379322 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:35:58.154441 env[1468]: time="2025-09-13T01:35:58.154396383Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:35:58.160097 env[1468]: time="2025-09-13T01:35:58.160064545Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9fddf21fd9c2634e7bf6e633e36b0fb227f6cd5fbe1b3334a16de3ab50f31e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:35:58.164982 env[1468]: time="2025-09-13T01:35:58.164953439Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:35:58.186794 env[1468]: time="2025-09-13T01:35:58.186733576Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:883ca821a91fc20bcde818eeee4e1ed55ef63a020d6198ecd5a03af5a4eac530,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:35:58.187877 env[1468]: time="2025-09-13T01:35:58.187845096Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:9fddf21fd9c2634e7bf6e633e36b0fb227f6cd5fbe1b3334a16de3ab50f31e5e\"" Sep 13 01:35:58.294492 env[1468]: time="2025-09-13T01:35:58.294433898Z" level=info msg="CreateContainer within sandbox \"17d8b09315f4f43239b4c60591b027d1d01699b9add276278cd6e579f36bf68f\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Sep 13 01:35:58.351936 kubelet[1971]: E0913 01:35:58.351898 1971 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:35:58.380323 kubelet[1971]: E0913 01:35:58.380284 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:35:58.668868 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2267702207.mount: Deactivated successfully. Sep 13 01:35:58.681341 env[1468]: time="2025-09-13T01:35:58.681293137Z" level=info msg="CreateContainer within sandbox \"17d8b09315f4f43239b4c60591b027d1d01699b9add276278cd6e579f36bf68f\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"7422b63aaeafaa66b12fe81719feaeb5e8cac421d6365aef362fa52b8e44aa1c\"" Sep 13 01:35:58.681847 env[1468]: time="2025-09-13T01:35:58.681817395Z" level=info msg="StartContainer for \"7422b63aaeafaa66b12fe81719feaeb5e8cac421d6365aef362fa52b8e44aa1c\"" Sep 13 01:35:58.698560 systemd[1]: Started cri-containerd-7422b63aaeafaa66b12fe81719feaeb5e8cac421d6365aef362fa52b8e44aa1c.scope. Sep 13 01:35:58.715677 kernel: kauditd_printk_skb: 50 callbacks suppressed Sep 13 01:35:58.715790 kernel: audit: type=1400 audit(1757727358.709:700): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:58.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:58.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:58.750100 kernel: audit: type=1400 audit(1757727358.709:701): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:58.750213 kernel: audit: type=1400 audit(1757727358.709:702): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:58.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:58.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:58.783991 kernel: audit: type=1400 audit(1757727358.709:703): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:58.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:58.801902 kernel: audit: type=1400 audit(1757727358.709:704): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:58.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:58.819929 kernel: audit: type=1400 audit(1757727358.709:705): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:58.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:58.838024 kernel: audit: type=1400 audit(1757727358.709:706): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:58.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:58.856448 kernel: audit: type=1400 audit(1757727358.709:707): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:58.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:58.873815 kernel: audit: type=1400 audit(1757727358.709:708): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:58.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:58.893000 kernel: audit: type=1400 audit(1757727358.714:709): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:58.714000 audit: BPF prog-id=112 op=LOAD Sep 13 01:35:58.732000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:58.732000 audit[3086]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=3036 pid=3086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:58.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734323262363361616561666161363662313266653831373139666561 Sep 13 01:35:58.732000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:58.732000 audit[3086]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3036 pid=3086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:58.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734323262363361616561666161363662313266653831373139666561 Sep 13 01:35:58.732000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:58.732000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:58.732000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:58.732000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:58.732000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:58.732000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:58.732000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:58.732000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:58.732000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:58.732000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:58.732000 audit: BPF prog-id=113 op=LOAD Sep 13 01:35:58.732000 audit[3086]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3036 pid=3086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:58.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734323262363361616561666161363662313266653831373139666561 Sep 13 01:35:58.749000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:58.749000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:58.749000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:58.749000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:58.749000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:58.749000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:58.749000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:58.749000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:58.749000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:58.749000 audit: BPF prog-id=114 op=LOAD Sep 13 01:35:58.749000 audit[3086]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3036 pid=3086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:58.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734323262363361616561666161363662313266653831373139666561 Sep 13 01:35:58.766000 audit: BPF prog-id=114 op=UNLOAD Sep 13 01:35:58.766000 audit: BPF prog-id=113 op=UNLOAD Sep 13 01:35:58.766000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:58.766000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:58.766000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:58.766000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:58.766000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:58.766000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:58.766000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:58.766000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:58.766000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:58.766000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:35:58.766000 audit: BPF prog-id=115 op=LOAD Sep 13 01:35:58.766000 audit[3086]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3036 pid=3086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:35:58.766000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734323262363361616561666161363662313266653831373139666561 Sep 13 01:35:58.896141 env[1468]: time="2025-09-13T01:35:58.896102239Z" level=info msg="StartContainer for \"7422b63aaeafaa66b12fe81719feaeb5e8cac421d6365aef362fa52b8e44aa1c\" returns successfully" Sep 13 01:35:59.381413 kubelet[1971]: E0913 01:35:59.381379 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:36:00.382230 kubelet[1971]: E0913 01:36:00.382196 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:36:01.382891 kubelet[1971]: E0913 01:36:01.382856 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:36:02.383181 kubelet[1971]: E0913 01:36:02.383146 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:36:03.383883 kubelet[1971]: E0913 01:36:03.383845 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:36:04.384280 kubelet[1971]: E0913 01:36:04.384239 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:36:05.384465 kubelet[1971]: E0913 01:36:05.384432 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:36:05.963358 kubelet[1971]: I0913 01:36:05.963291 1971 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-7fcdb87857-2lblc" podStartSLOduration=22.932349499 podStartE2EDuration="27.963275159s" podCreationTimestamp="2025-09-13 01:35:38 +0000 UTC" firstStartedPulling="2025-09-13 01:35:53.158558334 +0000 UTC m=+35.608291275" lastFinishedPulling="2025-09-13 01:35:58.189483994 +0000 UTC m=+40.639216935" observedRunningTime="2025-09-13 01:35:59.66232032 +0000 UTC m=+42.112053261" watchObservedRunningTime="2025-09-13 01:36:05.963275159 +0000 UTC m=+48.413008100" Sep 13 01:36:05.965000 audit[3143]: NETFILTER_CFG table=filter:74 family=2 entries=20 op=nft_register_rule pid=3143 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:36:05.987800 kernel: kauditd_printk_skb: 47 callbacks suppressed Sep 13 01:36:05.987868 kernel: audit: type=1325 audit(1757727365.965:718): table=filter:74 family=2 entries=20 op=nft_register_rule pid=3143 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:36:05.987890 kernel: audit: type=1300 audit(1757727365.965:718): arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffe3a4a6a0 a2=0 a3=1 items=0 ppid=2190 pid=3143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:36:05.965000 audit[3143]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffe3a4a6a0 a2=0 a3=1 items=0 ppid=2190 pid=3143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:36:05.965000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:36:06.030800 kernel: audit: type=1327 audit(1757727365.965:718): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:36:05.988000 audit[3143]: NETFILTER_CFG table=nat:75 family=2 entries=26 op=nft_register_rule pid=3143 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:36:06.045484 kernel: audit: type=1325 audit(1757727365.988:719): table=nat:75 family=2 entries=26 op=nft_register_rule pid=3143 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:36:05.988000 audit[3143]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8076 a0=3 a1=ffffe3a4a6a0 a2=0 a3=1 items=0 ppid=2190 pid=3143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:36:06.072807 kernel: audit: type=1300 audit(1757727365.988:719): arch=c00000b7 syscall=211 success=yes exit=8076 a0=3 a1=ffffe3a4a6a0 a2=0 a3=1 items=0 ppid=2190 pid=3143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:36:05.988000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:36:06.086987 kernel: audit: type=1327 audit(1757727365.988:719): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:36:06.090825 systemd[1]: Created slice kubepods-besteffort-pod538f2abd_070f_4a1c_b4c4_01aa89be16ed.slice. Sep 13 01:36:06.094000 audit[3147]: NETFILTER_CFG table=filter:76 family=2 entries=32 op=nft_register_rule pid=3147 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:36:06.094000 audit[3147]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffd276f740 a2=0 a3=1 items=0 ppid=2190 pid=3147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:36:06.135934 kernel: audit: type=1325 audit(1757727366.094:720): table=filter:76 family=2 entries=32 op=nft_register_rule pid=3147 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:36:06.136027 kernel: audit: type=1300 audit(1757727366.094:720): arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffd276f740 a2=0 a3=1 items=0 ppid=2190 pid=3147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:36:06.136065 kernel: audit: type=1327 audit(1757727366.094:720): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:36:06.094000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:36:06.136000 audit[3147]: NETFILTER_CFG table=nat:77 family=2 entries=26 op=nft_register_rule pid=3147 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:36:06.162702 kernel: audit: type=1325 audit(1757727366.136:721): table=nat:77 family=2 entries=26 op=nft_register_rule pid=3147 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:36:06.136000 audit[3147]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8076 a0=3 a1=ffffd276f740 a2=0 a3=1 items=0 ppid=2190 pid=3147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:36:06.136000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:36:06.186057 kubelet[1971]: I0913 01:36:06.186026 1971 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-99blp\" (UniqueName: \"kubernetes.io/projected/538f2abd-070f-4a1c-b4c4-01aa89be16ed-kube-api-access-99blp\") pod \"nfs-server-provisioner-0\" (UID: \"538f2abd-070f-4a1c-b4c4-01aa89be16ed\") " pod="default/nfs-server-provisioner-0" Sep 13 01:36:06.186241 kubelet[1971]: I0913 01:36:06.186226 1971 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/538f2abd-070f-4a1c-b4c4-01aa89be16ed-data\") pod \"nfs-server-provisioner-0\" (UID: \"538f2abd-070f-4a1c-b4c4-01aa89be16ed\") " pod="default/nfs-server-provisioner-0" Sep 13 01:36:06.385297 kubelet[1971]: E0913 01:36:06.385267 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:36:06.394158 env[1468]: time="2025-09-13T01:36:06.394104554Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:538f2abd-070f-4a1c-b4c4-01aa89be16ed,Namespace:default,Attempt:0,}" Sep 13 01:36:06.535343 systemd-networkd[1625]: cali60e51b789ff: Link UP Sep 13 01:36:06.541943 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 01:36:06.550784 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Sep 13 01:36:06.550535 systemd-networkd[1625]: cali60e51b789ff: Gained carrier Sep 13 01:36:06.570029 env[1468]: 2025-09-13 01:36:06.463 [INFO][3149] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.27-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 538f2abd-070f-4a1c-b4c4-01aa89be16ed 1555 0 2025-09-13 01:36:05 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.200.20.27 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="98a129c3b2946148b9554717b74662d8507efe7ccad7e39486bd395cff9abc3f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.27-k8s-nfs--server--provisioner--0-" Sep 13 01:36:06.570029 env[1468]: 2025-09-13 01:36:06.464 [INFO][3149] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="98a129c3b2946148b9554717b74662d8507efe7ccad7e39486bd395cff9abc3f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.27-k8s-nfs--server--provisioner--0-eth0" Sep 13 01:36:06.570029 env[1468]: 2025-09-13 01:36:06.485 [INFO][3163] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="98a129c3b2946148b9554717b74662d8507efe7ccad7e39486bd395cff9abc3f" HandleID="k8s-pod-network.98a129c3b2946148b9554717b74662d8507efe7ccad7e39486bd395cff9abc3f" Workload="10.200.20.27-k8s-nfs--server--provisioner--0-eth0" Sep 13 01:36:06.570029 env[1468]: 2025-09-13 01:36:06.485 [INFO][3163] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="98a129c3b2946148b9554717b74662d8507efe7ccad7e39486bd395cff9abc3f" HandleID="k8s-pod-network.98a129c3b2946148b9554717b74662d8507efe7ccad7e39486bd395cff9abc3f" Workload="10.200.20.27-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d2ff0), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.27", "pod":"nfs-server-provisioner-0", "timestamp":"2025-09-13 01:36:06.485809738 +0000 UTC"}, Hostname:"10.200.20.27", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 01:36:06.570029 env[1468]: 2025-09-13 01:36:06.486 [INFO][3163] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 01:36:06.570029 env[1468]: 2025-09-13 01:36:06.486 [INFO][3163] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 01:36:06.570029 env[1468]: 2025-09-13 01:36:06.486 [INFO][3163] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.27' Sep 13 01:36:06.570029 env[1468]: 2025-09-13 01:36:06.497 [INFO][3163] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.98a129c3b2946148b9554717b74662d8507efe7ccad7e39486bd395cff9abc3f" host="10.200.20.27" Sep 13 01:36:06.570029 env[1468]: 2025-09-13 01:36:06.506 [INFO][3163] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.20.27" Sep 13 01:36:06.570029 env[1468]: 2025-09-13 01:36:06.511 [INFO][3163] ipam/ipam.go 511: Trying affinity for 192.168.76.192/26 host="10.200.20.27" Sep 13 01:36:06.570029 env[1468]: 2025-09-13 01:36:06.513 [INFO][3163] ipam/ipam.go 158: Attempting to load block cidr=192.168.76.192/26 host="10.200.20.27" Sep 13 01:36:06.570029 env[1468]: 2025-09-13 01:36:06.516 [INFO][3163] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.76.192/26 host="10.200.20.27" Sep 13 01:36:06.570029 env[1468]: 2025-09-13 01:36:06.516 [INFO][3163] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.76.192/26 handle="k8s-pod-network.98a129c3b2946148b9554717b74662d8507efe7ccad7e39486bd395cff9abc3f" host="10.200.20.27" Sep 13 01:36:06.570029 env[1468]: 2025-09-13 01:36:06.517 [INFO][3163] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.98a129c3b2946148b9554717b74662d8507efe7ccad7e39486bd395cff9abc3f Sep 13 01:36:06.570029 env[1468]: 2025-09-13 01:36:06.522 [INFO][3163] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.76.192/26 handle="k8s-pod-network.98a129c3b2946148b9554717b74662d8507efe7ccad7e39486bd395cff9abc3f" host="10.200.20.27" Sep 13 01:36:06.570029 env[1468]: 2025-09-13 01:36:06.531 [INFO][3163] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.76.195/26] block=192.168.76.192/26 handle="k8s-pod-network.98a129c3b2946148b9554717b74662d8507efe7ccad7e39486bd395cff9abc3f" host="10.200.20.27" Sep 13 01:36:06.570029 env[1468]: 2025-09-13 01:36:06.531 [INFO][3163] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.76.195/26] handle="k8s-pod-network.98a129c3b2946148b9554717b74662d8507efe7ccad7e39486bd395cff9abc3f" host="10.200.20.27" Sep 13 01:36:06.570029 env[1468]: 2025-09-13 01:36:06.531 [INFO][3163] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 01:36:06.570029 env[1468]: 2025-09-13 01:36:06.531 [INFO][3163] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.76.195/26] IPv6=[] ContainerID="98a129c3b2946148b9554717b74662d8507efe7ccad7e39486bd395cff9abc3f" HandleID="k8s-pod-network.98a129c3b2946148b9554717b74662d8507efe7ccad7e39486bd395cff9abc3f" Workload="10.200.20.27-k8s-nfs--server--provisioner--0-eth0" Sep 13 01:36:06.570826 env[1468]: 2025-09-13 01:36:06.532 [INFO][3149] cni-plugin/k8s.go 418: Populated endpoint ContainerID="98a129c3b2946148b9554717b74662d8507efe7ccad7e39486bd395cff9abc3f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.27-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.27-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"538f2abd-070f-4a1c-b4c4-01aa89be16ed", ResourceVersion:"1555", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 1, 36, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.27", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.76.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 01:36:06.570826 env[1468]: 2025-09-13 01:36:06.533 [INFO][3149] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.76.195/32] ContainerID="98a129c3b2946148b9554717b74662d8507efe7ccad7e39486bd395cff9abc3f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.27-k8s-nfs--server--provisioner--0-eth0" Sep 13 01:36:06.570826 env[1468]: 2025-09-13 01:36:06.533 [INFO][3149] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="98a129c3b2946148b9554717b74662d8507efe7ccad7e39486bd395cff9abc3f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.27-k8s-nfs--server--provisioner--0-eth0" Sep 13 01:36:06.570826 env[1468]: 2025-09-13 01:36:06.551 [INFO][3149] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="98a129c3b2946148b9554717b74662d8507efe7ccad7e39486bd395cff9abc3f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.27-k8s-nfs--server--provisioner--0-eth0" Sep 13 01:36:06.570972 env[1468]: 2025-09-13 01:36:06.551 [INFO][3149] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="98a129c3b2946148b9554717b74662d8507efe7ccad7e39486bd395cff9abc3f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.27-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.27-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"538f2abd-070f-4a1c-b4c4-01aa89be16ed", ResourceVersion:"1555", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 1, 36, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.27", ContainerID:"98a129c3b2946148b9554717b74662d8507efe7ccad7e39486bd395cff9abc3f", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.76.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"3e:e0:8b:a8:f4:2c", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 01:36:06.570972 env[1468]: 2025-09-13 01:36:06.567 [INFO][3149] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="98a129c3b2946148b9554717b74662d8507efe7ccad7e39486bd395cff9abc3f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.27-k8s-nfs--server--provisioner--0-eth0" Sep 13 01:36:06.580000 audit[3179]: NETFILTER_CFG table=filter:78 family=2 entries=40 op=nft_register_chain pid=3179 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 01:36:06.580000 audit[3179]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20756 a0=3 a1=fffff382cf20 a2=0 a3=ffffa51b9fa8 items=0 ppid=2569 pid=3179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:36:06.580000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 01:36:06.584787 env[1468]: time="2025-09-13T01:36:06.584711537Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 01:36:06.584862 env[1468]: time="2025-09-13T01:36:06.584799700Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 01:36:06.584862 env[1468]: time="2025-09-13T01:36:06.584842341Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 01:36:06.585090 env[1468]: time="2025-09-13T01:36:06.585035307Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/98a129c3b2946148b9554717b74662d8507efe7ccad7e39486bd395cff9abc3f pid=3187 runtime=io.containerd.runc.v2 Sep 13 01:36:06.599348 systemd[1]: Started cri-containerd-98a129c3b2946148b9554717b74662d8507efe7ccad7e39486bd395cff9abc3f.scope. Sep 13 01:36:06.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:06.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:06.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:06.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:06.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:06.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:06.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:06.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:06.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:06.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:06.615000 audit: BPF prog-id=116 op=LOAD Sep 13 01:36:06.615000 audit[3197]: AVC avc: denied { bpf } for pid=3197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:06.615000 audit[3197]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=3187 pid=3197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:36:06.615000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938613132396333623239343631343862393535343731376237343636 Sep 13 01:36:06.616000 audit[3197]: AVC avc: denied { perfmon } for pid=3197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:06.616000 audit[3197]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3187 pid=3197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:36:06.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938613132396333623239343631343862393535343731376237343636 Sep 13 01:36:06.616000 audit[3197]: AVC avc: denied { bpf } for pid=3197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:06.616000 audit[3197]: AVC avc: denied { bpf } for pid=3197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:06.616000 audit[3197]: AVC avc: denied { bpf } for pid=3197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:06.616000 audit[3197]: AVC avc: denied { perfmon } for pid=3197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:06.616000 audit[3197]: AVC avc: denied { perfmon } for pid=3197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:06.616000 audit[3197]: AVC avc: denied { perfmon } for pid=3197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:06.616000 audit[3197]: AVC avc: denied { perfmon } for pid=3197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:06.616000 audit[3197]: AVC avc: denied { perfmon } for pid=3197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:06.616000 audit[3197]: AVC avc: denied { bpf } for pid=3197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:06.616000 audit[3197]: AVC avc: denied { bpf } for pid=3197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:06.616000 audit: BPF prog-id=117 op=LOAD Sep 13 01:36:06.616000 audit[3197]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3187 pid=3197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:36:06.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938613132396333623239343631343862393535343731376237343636 Sep 13 01:36:06.616000 audit[3197]: AVC avc: denied { bpf } for pid=3197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:06.616000 audit[3197]: AVC avc: denied { bpf } for pid=3197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:06.616000 audit[3197]: AVC avc: denied { perfmon } for pid=3197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:06.616000 audit[3197]: AVC avc: denied { perfmon } for pid=3197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:06.616000 audit[3197]: AVC avc: denied { perfmon } for pid=3197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:06.616000 audit[3197]: AVC avc: denied { perfmon } for pid=3197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:06.616000 audit[3197]: AVC avc: denied { perfmon } for pid=3197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:06.616000 audit[3197]: AVC avc: denied { bpf } for pid=3197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:06.616000 audit[3197]: AVC avc: denied { bpf } for pid=3197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:06.616000 audit: BPF prog-id=118 op=LOAD Sep 13 01:36:06.616000 audit[3197]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3187 pid=3197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:36:06.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938613132396333623239343631343862393535343731376237343636 Sep 13 01:36:06.617000 audit: BPF prog-id=118 op=UNLOAD Sep 13 01:36:06.617000 audit: BPF prog-id=117 op=UNLOAD Sep 13 01:36:06.617000 audit[3197]: AVC avc: denied { bpf } for pid=3197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:06.617000 audit[3197]: AVC avc: denied { bpf } for pid=3197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:06.617000 audit[3197]: AVC avc: denied { bpf } for pid=3197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:06.617000 audit[3197]: AVC avc: denied { perfmon } for pid=3197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:06.617000 audit[3197]: AVC avc: denied { perfmon } for pid=3197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:06.617000 audit[3197]: AVC avc: denied { perfmon } for pid=3197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:06.617000 audit[3197]: AVC avc: denied { perfmon } for pid=3197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:06.617000 audit[3197]: AVC avc: denied { perfmon } for pid=3197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:06.617000 audit[3197]: AVC avc: denied { bpf } for pid=3197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:06.617000 audit[3197]: AVC avc: denied { bpf } for pid=3197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:06.617000 audit: BPF prog-id=119 op=LOAD Sep 13 01:36:06.617000 audit[3197]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3187 pid=3197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:36:06.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938613132396333623239343631343862393535343731376237343636 Sep 13 01:36:06.637920 env[1468]: time="2025-09-13T01:36:06.637286551Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:538f2abd-070f-4a1c-b4c4-01aa89be16ed,Namespace:default,Attempt:0,} returns sandbox id \"98a129c3b2946148b9554717b74662d8507efe7ccad7e39486bd395cff9abc3f\"" Sep 13 01:36:06.639496 env[1468]: time="2025-09-13T01:36:06.639470616Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Sep 13 01:36:07.298702 systemd[1]: run-containerd-runc-k8s.io-98a129c3b2946148b9554717b74662d8507efe7ccad7e39486bd395cff9abc3f-runc.bxCdyH.mount: Deactivated successfully. Sep 13 01:36:07.386416 kubelet[1971]: E0913 01:36:07.386357 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:36:08.199263 systemd-networkd[1625]: cali60e51b789ff: Gained IPv6LL Sep 13 01:36:08.387005 kubelet[1971]: E0913 01:36:08.386952 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:36:09.072354 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2543739629.mount: Deactivated successfully. Sep 13 01:36:09.387878 kubelet[1971]: E0913 01:36:09.387847 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:36:10.388960 kubelet[1971]: E0913 01:36:10.388921 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:36:10.917010 env[1468]: time="2025-09-13T01:36:10.916966825Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:36:10.924270 env[1468]: time="2025-09-13T01:36:10.924240706Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:36:10.929296 env[1468]: time="2025-09-13T01:36:10.929268244Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:36:10.934075 env[1468]: time="2025-09-13T01:36:10.934049776Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:36:10.934744 env[1468]: time="2025-09-13T01:36:10.934713554Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\"" Sep 13 01:36:10.942217 env[1468]: time="2025-09-13T01:36:10.942174120Z" level=info msg="CreateContainer within sandbox \"98a129c3b2946148b9554717b74662d8507efe7ccad7e39486bd395cff9abc3f\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Sep 13 01:36:10.961149 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1435229043.mount: Deactivated successfully. Sep 13 01:36:10.966242 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3812118557.mount: Deactivated successfully. Sep 13 01:36:10.981525 env[1468]: time="2025-09-13T01:36:10.981485483Z" level=info msg="CreateContainer within sandbox \"98a129c3b2946148b9554717b74662d8507efe7ccad7e39486bd395cff9abc3f\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"0f436207f7ddf0cf20588a3412a5fd5a5d35286718ce416bf5c3260762dae1d4\"" Sep 13 01:36:10.982138 env[1468]: time="2025-09-13T01:36:10.982119340Z" level=info msg="StartContainer for \"0f436207f7ddf0cf20588a3412a5fd5a5d35286718ce416bf5c3260762dae1d4\"" Sep 13 01:36:10.999052 systemd[1]: Started cri-containerd-0f436207f7ddf0cf20588a3412a5fd5a5d35286718ce416bf5c3260762dae1d4.scope. Sep 13 01:36:11.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:11.016270 kernel: kauditd_printk_skb: 62 callbacks suppressed Sep 13 01:36:11.016371 kernel: audit: type=1400 audit(1757727371.010:741): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:11.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:11.048943 kernel: audit: type=1400 audit(1757727371.010:742): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:11.049031 kernel: audit: type=1400 audit(1757727371.010:743): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:11.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:11.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:11.082094 kernel: audit: type=1400 audit(1757727371.010:744): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:11.082196 kernel: audit: type=1400 audit(1757727371.010:745): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:11.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:11.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:11.114943 kernel: audit: type=1400 audit(1757727371.010:746): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:11.115056 kernel: audit: type=1400 audit(1757727371.010:747): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:11.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:11.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:11.148370 kernel: audit: type=1400 audit(1757727371.010:748): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:11.148507 kernel: audit: type=1400 audit(1757727371.010:749): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:11.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:11.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:11.180757 kernel: audit: type=1400 audit(1757727371.010:750): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:11.010000 audit: BPF prog-id=120 op=LOAD Sep 13 01:36:11.010000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:11.010000 audit[3226]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3187 pid=3226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:36:11.010000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066343336323037663764646630636632303538386133343132613566 Sep 13 01:36:11.010000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:11.010000 audit[3226]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3187 pid=3226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:36:11.010000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066343336323037663764646630636632303538386133343132613566 Sep 13 01:36:11.010000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:11.010000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:11.010000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:11.010000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:11.010000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:11.010000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:11.010000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:11.010000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:11.010000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:11.010000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:11.010000 audit: BPF prog-id=121 op=LOAD Sep 13 01:36:11.010000 audit[3226]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3187 pid=3226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:36:11.010000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066343336323037663764646630636632303538386133343132613566 Sep 13 01:36:11.015000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:11.015000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:11.015000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:11.015000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:11.015000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:11.015000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:11.015000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:11.015000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:11.015000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:11.015000 audit: BPF prog-id=122 op=LOAD Sep 13 01:36:11.015000 audit[3226]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3187 pid=3226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:36:11.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066343336323037663764646630636632303538386133343132613566 Sep 13 01:36:11.031000 audit: BPF prog-id=122 op=UNLOAD Sep 13 01:36:11.031000 audit: BPF prog-id=121 op=UNLOAD Sep 13 01:36:11.031000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:11.031000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:11.031000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:11.031000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:11.031000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:11.031000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:11.031000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:11.031000 audit[3226]: AVC avc: denied { perfmon } for pid=3226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:11.031000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:11.031000 audit[3226]: AVC avc: denied { bpf } for pid=3226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:11.031000 audit: BPF prog-id=123 op=LOAD Sep 13 01:36:11.031000 audit[3226]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3187 pid=3226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:36:11.031000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066343336323037663764646630636632303538386133343132613566 Sep 13 01:36:11.184255 env[1468]: time="2025-09-13T01:36:11.184211208Z" level=info msg="StartContainer for \"0f436207f7ddf0cf20588a3412a5fd5a5d35286718ce416bf5c3260762dae1d4\" returns successfully" Sep 13 01:36:11.190000 audit[3254]: AVC avc: denied { search } for pid=3254 comm="rpcbind" name="crypto" dev="proc" ino=20822 scontext=system_u:system_r:svirt_lxc_net_t:s0:c362,c931 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 13 01:36:11.190000 audit[3254]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff924ff000 a2=0 a3=0 items=0 ppid=3237 pid=3254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c362,c931 key=(null) Sep 13 01:36:11.190000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Sep 13 01:36:11.232000 audit[3259]: AVC avc: denied { search } for pid=3259 comm="dbus-daemon" name="crypto" dev="proc" ino=20822 scontext=system_u:system_r:svirt_lxc_net_t:s0:c362,c931 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 13 01:36:11.232000 audit[3259]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff9d40f000 a2=0 a3=0 items=0 ppid=3237 pid=3259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c362,c931 key=(null) Sep 13 01:36:11.232000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Sep 13 01:36:11.235000 audit[3260]: AVC avc: denied { watch } for pid=3260 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537433 scontext=system_u:system_r:svirt_lxc_net_t:s0:c362,c931 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c362,c931 tclass=dir permissive=0 Sep 13 01:36:11.235000 audit[3260]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaaadceda090 a2=2c8 a3=aaaadceb4a60 items=0 ppid=3237 pid=3260 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c362,c931 key=(null) Sep 13 01:36:11.235000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Sep 13 01:36:11.239000 audit[3261]: AVC avc: denied { read } for pid=3261 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=20847 scontext=system_u:system_r:svirt_lxc_net_t:s0:c362,c931 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Sep 13 01:36:11.239000 audit[3261]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffff9c a1=ffffb7fca570 a2=80000 a3=0 items=0 ppid=3237 pid=3261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c362,c931 key=(null) Sep 13 01:36:11.239000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Sep 13 01:36:11.240000 audit[3261]: AVC avc: denied { search } for pid=3261 comm="ganesha.nfsd" name="crypto" dev="proc" ino=20822 scontext=system_u:system_r:svirt_lxc_net_t:s0:c362,c931 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 13 01:36:11.240000 audit[3261]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffb735f000 a2=0 a3=0 items=0 ppid=3237 pid=3261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c362,c931 key=(null) Sep 13 01:36:11.240000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Sep 13 01:36:11.389342 kubelet[1971]: E0913 01:36:11.389307 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:36:11.699000 audit[3268]: NETFILTER_CFG table=filter:79 family=2 entries=20 op=nft_register_rule pid=3268 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:36:11.699000 audit[3268]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=fffff85bceb0 a2=0 a3=1 items=0 ppid=2190 pid=3268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:36:11.699000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:36:11.707000 audit[3268]: NETFILTER_CFG table=nat:80 family=2 entries=110 op=nft_register_chain pid=3268 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 01:36:11.707000 audit[3268]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=50988 a0=3 a1=fffff85bceb0 a2=0 a3=1 items=0 ppid=2190 pid=3268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:36:11.707000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 01:36:12.390289 kubelet[1971]: E0913 01:36:12.390251 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:36:13.391036 kubelet[1971]: E0913 01:36:13.391001 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:36:14.391580 kubelet[1971]: E0913 01:36:14.391545 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:36:15.392200 kubelet[1971]: E0913 01:36:15.392164 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:36:16.392903 kubelet[1971]: E0913 01:36:16.392870 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:36:17.388205 systemd[1]: run-containerd-runc-k8s.io-f0dcab693e9f7563a44c5881ed72cc4de44ed527bcb5fe9d3df008be65fe5bb6-runc.Dd61qP.mount: Deactivated successfully. Sep 13 01:36:17.393986 kubelet[1971]: E0913 01:36:17.393940 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:36:18.352069 kubelet[1971]: E0913 01:36:18.352028 1971 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:36:18.368041 env[1468]: time="2025-09-13T01:36:18.368006074Z" level=info msg="StopPodSandbox for \"704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4\"" Sep 13 01:36:18.394937 kubelet[1971]: E0913 01:36:18.394903 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:36:18.436714 env[1468]: 2025-09-13 01:36:18.405 [WARNING][3302] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.27-k8s-nginx--deployment--7fcdb87857--2lblc-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"e38003c9-a05d-42fc-bab0-1c8de9b2837f", ResourceVersion:"1522", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 1, 35, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.27", ContainerID:"17d8b09315f4f43239b4c60591b027d1d01699b9add276278cd6e579f36bf68f", Pod:"nginx-deployment-7fcdb87857-2lblc", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.76.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali4dbfba3bc7f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 01:36:18.436714 env[1468]: 2025-09-13 01:36:18.405 [INFO][3302] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4" Sep 13 01:36:18.436714 env[1468]: 2025-09-13 01:36:18.405 [INFO][3302] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4" iface="eth0" netns="" Sep 13 01:36:18.436714 env[1468]: 2025-09-13 01:36:18.405 [INFO][3302] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4" Sep 13 01:36:18.436714 env[1468]: 2025-09-13 01:36:18.405 [INFO][3302] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4" Sep 13 01:36:18.436714 env[1468]: 2025-09-13 01:36:18.423 [INFO][3309] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4" HandleID="k8s-pod-network.704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4" Workload="10.200.20.27-k8s-nginx--deployment--7fcdb87857--2lblc-eth0" Sep 13 01:36:18.436714 env[1468]: 2025-09-13 01:36:18.423 [INFO][3309] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 01:36:18.436714 env[1468]: 2025-09-13 01:36:18.423 [INFO][3309] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 01:36:18.436714 env[1468]: 2025-09-13 01:36:18.432 [WARNING][3309] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4" HandleID="k8s-pod-network.704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4" Workload="10.200.20.27-k8s-nginx--deployment--7fcdb87857--2lblc-eth0" Sep 13 01:36:18.436714 env[1468]: 2025-09-13 01:36:18.432 [INFO][3309] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4" HandleID="k8s-pod-network.704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4" Workload="10.200.20.27-k8s-nginx--deployment--7fcdb87857--2lblc-eth0" Sep 13 01:36:18.436714 env[1468]: 2025-09-13 01:36:18.434 [INFO][3309] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 01:36:18.436714 env[1468]: 2025-09-13 01:36:18.435 [INFO][3302] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4" Sep 13 01:36:18.437263 env[1468]: time="2025-09-13T01:36:18.437219989Z" level=info msg="TearDown network for sandbox \"704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4\" successfully" Sep 13 01:36:18.437329 env[1468]: time="2025-09-13T01:36:18.437313791Z" level=info msg="StopPodSandbox for \"704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4\" returns successfully" Sep 13 01:36:18.437925 env[1468]: time="2025-09-13T01:36:18.437902685Z" level=info msg="RemovePodSandbox for \"704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4\"" Sep 13 01:36:18.438064 env[1468]: time="2025-09-13T01:36:18.438024808Z" level=info msg="Forcibly stopping sandbox \"704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4\"" Sep 13 01:36:18.517860 env[1468]: 2025-09-13 01:36:18.473 [WARNING][3325] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.27-k8s-nginx--deployment--7fcdb87857--2lblc-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"e38003c9-a05d-42fc-bab0-1c8de9b2837f", ResourceVersion:"1522", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 1, 35, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.27", ContainerID:"17d8b09315f4f43239b4c60591b027d1d01699b9add276278cd6e579f36bf68f", Pod:"nginx-deployment-7fcdb87857-2lblc", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.76.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali4dbfba3bc7f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 01:36:18.517860 env[1468]: 2025-09-13 01:36:18.473 [INFO][3325] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4" Sep 13 01:36:18.517860 env[1468]: 2025-09-13 01:36:18.473 [INFO][3325] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4" iface="eth0" netns="" Sep 13 01:36:18.517860 env[1468]: 2025-09-13 01:36:18.473 [INFO][3325] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4" Sep 13 01:36:18.517860 env[1468]: 2025-09-13 01:36:18.473 [INFO][3325] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4" Sep 13 01:36:18.517860 env[1468]: 2025-09-13 01:36:18.503 [INFO][3332] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4" HandleID="k8s-pod-network.704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4" Workload="10.200.20.27-k8s-nginx--deployment--7fcdb87857--2lblc-eth0" Sep 13 01:36:18.517860 env[1468]: 2025-09-13 01:36:18.503 [INFO][3332] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 01:36:18.517860 env[1468]: 2025-09-13 01:36:18.503 [INFO][3332] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 01:36:18.517860 env[1468]: 2025-09-13 01:36:18.513 [WARNING][3332] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4" HandleID="k8s-pod-network.704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4" Workload="10.200.20.27-k8s-nginx--deployment--7fcdb87857--2lblc-eth0" Sep 13 01:36:18.517860 env[1468]: 2025-09-13 01:36:18.513 [INFO][3332] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4" HandleID="k8s-pod-network.704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4" Workload="10.200.20.27-k8s-nginx--deployment--7fcdb87857--2lblc-eth0" Sep 13 01:36:18.517860 env[1468]: 2025-09-13 01:36:18.515 [INFO][3332] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 01:36:18.517860 env[1468]: 2025-09-13 01:36:18.516 [INFO][3325] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4" Sep 13 01:36:18.518360 env[1468]: time="2025-09-13T01:36:18.518327025Z" level=info msg="TearDown network for sandbox \"704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4\" successfully" Sep 13 01:36:18.525025 env[1468]: time="2025-09-13T01:36:18.524994743Z" level=info msg="RemovePodSandbox \"704d94baf19ade4c21da0579a89e7c9fd31dedc2a0aef45f4f39c43bec39ebf4\" returns successfully" Sep 13 01:36:18.525567 env[1468]: time="2025-09-13T01:36:18.525544956Z" level=info msg="StopPodSandbox for \"c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2\"" Sep 13 01:36:18.593392 env[1468]: 2025-09-13 01:36:18.561 [WARNING][3346] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.27-k8s-csi--node--driver--mblgz-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"9c5d7852-9b3f-42a7-8a36-2aa1283d8cc1", ResourceVersion:"1497", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 1, 35, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.27", ContainerID:"3d11b55d96f7a5802e9da92f4876716a87058e1e428e8a4e60485a66e9af9540", Pod:"csi-node-driver-mblgz", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.76.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali86d706c5e89", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 01:36:18.593392 env[1468]: 2025-09-13 01:36:18.561 [INFO][3346] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2" Sep 13 01:36:18.593392 env[1468]: 2025-09-13 01:36:18.561 [INFO][3346] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2" iface="eth0" netns="" Sep 13 01:36:18.593392 env[1468]: 2025-09-13 01:36:18.561 [INFO][3346] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2" Sep 13 01:36:18.593392 env[1468]: 2025-09-13 01:36:18.562 [INFO][3346] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2" Sep 13 01:36:18.593392 env[1468]: 2025-09-13 01:36:18.579 [INFO][3355] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2" HandleID="k8s-pod-network.c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2" Workload="10.200.20.27-k8s-csi--node--driver--mblgz-eth0" Sep 13 01:36:18.593392 env[1468]: 2025-09-13 01:36:18.579 [INFO][3355] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 01:36:18.593392 env[1468]: 2025-09-13 01:36:18.579 [INFO][3355] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 01:36:18.593392 env[1468]: 2025-09-13 01:36:18.589 [WARNING][3355] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2" HandleID="k8s-pod-network.c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2" Workload="10.200.20.27-k8s-csi--node--driver--mblgz-eth0" Sep 13 01:36:18.593392 env[1468]: 2025-09-13 01:36:18.589 [INFO][3355] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2" HandleID="k8s-pod-network.c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2" Workload="10.200.20.27-k8s-csi--node--driver--mblgz-eth0" Sep 13 01:36:18.593392 env[1468]: 2025-09-13 01:36:18.590 [INFO][3355] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 01:36:18.593392 env[1468]: 2025-09-13 01:36:18.592 [INFO][3346] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2" Sep 13 01:36:18.593937 env[1468]: time="2025-09-13T01:36:18.593896051Z" level=info msg="TearDown network for sandbox \"c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2\" successfully" Sep 13 01:36:18.594013 env[1468]: time="2025-09-13T01:36:18.593997933Z" level=info msg="StopPodSandbox for \"c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2\" returns successfully" Sep 13 01:36:18.594484 env[1468]: time="2025-09-13T01:36:18.594462344Z" level=info msg="RemovePodSandbox for \"c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2\"" Sep 13 01:36:18.594696 env[1468]: time="2025-09-13T01:36:18.594643908Z" level=info msg="Forcibly stopping sandbox \"c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2\"" Sep 13 01:36:18.659906 env[1468]: 2025-09-13 01:36:18.628 [WARNING][3369] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.27-k8s-csi--node--driver--mblgz-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"9c5d7852-9b3f-42a7-8a36-2aa1283d8cc1", ResourceVersion:"1497", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 1, 35, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.27", ContainerID:"3d11b55d96f7a5802e9da92f4876716a87058e1e428e8a4e60485a66e9af9540", Pod:"csi-node-driver-mblgz", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.76.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali86d706c5e89", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 01:36:18.659906 env[1468]: 2025-09-13 01:36:18.628 [INFO][3369] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2" Sep 13 01:36:18.659906 env[1468]: 2025-09-13 01:36:18.628 [INFO][3369] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2" iface="eth0" netns="" Sep 13 01:36:18.659906 env[1468]: 2025-09-13 01:36:18.628 [INFO][3369] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2" Sep 13 01:36:18.659906 env[1468]: 2025-09-13 01:36:18.628 [INFO][3369] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2" Sep 13 01:36:18.659906 env[1468]: 2025-09-13 01:36:18.645 [INFO][3376] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2" HandleID="k8s-pod-network.c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2" Workload="10.200.20.27-k8s-csi--node--driver--mblgz-eth0" Sep 13 01:36:18.659906 env[1468]: 2025-09-13 01:36:18.645 [INFO][3376] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 01:36:18.659906 env[1468]: 2025-09-13 01:36:18.645 [INFO][3376] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 01:36:18.659906 env[1468]: 2025-09-13 01:36:18.655 [WARNING][3376] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2" HandleID="k8s-pod-network.c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2" Workload="10.200.20.27-k8s-csi--node--driver--mblgz-eth0" Sep 13 01:36:18.659906 env[1468]: 2025-09-13 01:36:18.655 [INFO][3376] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2" HandleID="k8s-pod-network.c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2" Workload="10.200.20.27-k8s-csi--node--driver--mblgz-eth0" Sep 13 01:36:18.659906 env[1468]: 2025-09-13 01:36:18.657 [INFO][3376] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 01:36:18.659906 env[1468]: 2025-09-13 01:36:18.658 [INFO][3369] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2" Sep 13 01:36:18.660381 env[1468]: time="2025-09-13T01:36:18.660348141Z" level=info msg="TearDown network for sandbox \"c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2\" successfully" Sep 13 01:36:18.667257 env[1468]: time="2025-09-13T01:36:18.667225263Z" level=info msg="RemovePodSandbox \"c6cad473ebb43ff40cc40b07fe8399ec73dac2f08f3525ad114ea03590164bf2\" returns successfully" Sep 13 01:36:19.395953 kubelet[1971]: E0913 01:36:19.395914 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:36:20.397012 kubelet[1971]: E0913 01:36:20.396978 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:36:21.397680 kubelet[1971]: E0913 01:36:21.397626 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:36:22.398256 kubelet[1971]: E0913 01:36:22.398220 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:36:23.399165 kubelet[1971]: E0913 01:36:23.399130 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:36:24.400127 kubelet[1971]: E0913 01:36:24.400088 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:36:25.401113 kubelet[1971]: E0913 01:36:25.401077 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:36:26.402310 kubelet[1971]: E0913 01:36:26.402277 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:36:27.403333 kubelet[1971]: E0913 01:36:27.403298 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:36:28.403600 kubelet[1971]: E0913 01:36:28.403563 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:36:29.404059 kubelet[1971]: E0913 01:36:29.404020 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:36:30.404747 kubelet[1971]: E0913 01:36:30.404711 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:36:31.405220 kubelet[1971]: E0913 01:36:31.405190 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:36:31.432083 kubelet[1971]: I0913 01:36:31.432019 1971 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=22.134848152 podStartE2EDuration="26.432001064s" podCreationTimestamp="2025-09-13 01:36:05 +0000 UTC" firstStartedPulling="2025-09-13 01:36:06.638976041 +0000 UTC m=+49.088708982" lastFinishedPulling="2025-09-13 01:36:10.936128953 +0000 UTC m=+53.385861894" observedRunningTime="2025-09-13 01:36:11.683236684 +0000 UTC m=+54.132969625" watchObservedRunningTime="2025-09-13 01:36:31.432001064 +0000 UTC m=+73.881734005" Sep 13 01:36:31.441756 systemd[1]: Created slice kubepods-besteffort-pod22a4611e_a2bd_4de5_879b_63dabbec54ae.slice. Sep 13 01:36:31.614181 kubelet[1971]: I0913 01:36:31.614143 1971 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-83ccd01a-265f-45b6-952b-eb09e7d43ac5\" (UniqueName: \"kubernetes.io/nfs/22a4611e-a2bd-4de5-879b-63dabbec54ae-pvc-83ccd01a-265f-45b6-952b-eb09e7d43ac5\") pod \"test-pod-1\" (UID: \"22a4611e-a2bd-4de5-879b-63dabbec54ae\") " pod="default/test-pod-1" Sep 13 01:36:31.614181 kubelet[1971]: I0913 01:36:31.614186 1971 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rpn74\" (UniqueName: \"kubernetes.io/projected/22a4611e-a2bd-4de5-879b-63dabbec54ae-kube-api-access-rpn74\") pod \"test-pod-1\" (UID: \"22a4611e-a2bd-4de5-879b-63dabbec54ae\") " pod="default/test-pod-1" Sep 13 01:36:31.920314 kernel: Failed to create system directory netfs Sep 13 01:36:31.920454 kernel: kauditd_printk_skb: 68 callbacks suppressed Sep 13 01:36:31.920485 kernel: audit: type=1400 audit(1757727391.908:766): avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:31.920511 kernel: Failed to create system directory netfs Sep 13 01:36:31.908000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:31.908000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:31.939961 kernel: audit: type=1400 audit(1757727391.908:766): avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:31.940033 kernel: Failed to create system directory netfs Sep 13 01:36:31.940066 kernel: Failed to create system directory netfs Sep 13 01:36:31.908000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:31.990236 kernel: audit: type=1400 audit(1757727391.908:766): avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:31.990374 kernel: audit: type=1400 audit(1757727391.908:766): avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:31.908000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.008851 kernel: audit: type=1300 audit(1757727391.908:766): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab1544c5e0 a1=12c14 a2=aaaae5a4e028 a3=aaab1543d010 items=0 ppid=547 pid=3409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:36:31.908000 audit[3409]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab1544c5e0 a1=12c14 a2=aaaae5a4e028 a3=aaab1543d010 items=0 ppid=547 pid=3409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:36:31.908000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 01:36:32.047779 kernel: audit: type=1327 audit(1757727391.908:766): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 01:36:32.047868 kernel: Failed to create system directory fscache Sep 13 01:36:32.047894 kernel: audit: type=1400 audit(1757727391.991:767): avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:31.991000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.067443 kernel: Failed to create system directory fscache Sep 13 01:36:32.067536 kernel: audit: type=1400 audit(1757727391.991:767): avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:31.991000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:31.991000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.115266 kernel: Failed to create system directory fscache Sep 13 01:36:32.115362 kernel: audit: type=1400 audit(1757727391.991:767): avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.115396 kernel: Failed to create system directory fscache Sep 13 01:36:31.991000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.138463 kernel: audit: type=1400 audit(1757727391.991:767): avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.138548 kernel: Failed to create system directory fscache Sep 13 01:36:32.138594 kernel: Failed to create system directory fscache Sep 13 01:36:31.991000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:31.991000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:31.991000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.151626 kernel: Failed to create system directory fscache Sep 13 01:36:32.151701 kernel: Failed to create system directory fscache Sep 13 01:36:31.991000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:31.991000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.161053 kernel: Failed to create system directory fscache Sep 13 01:36:32.161143 kernel: Failed to create system directory fscache Sep 13 01:36:31.991000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:31.991000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.169665 kernel: Failed to create system directory fscache Sep 13 01:36:32.169719 kernel: Failed to create system directory fscache Sep 13 01:36:31.991000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:31.991000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.178058 kernel: Failed to create system directory fscache Sep 13 01:36:31.991000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.183240 kernel: Failed to create system directory fscache Sep 13 01:36:32.186264 kernel: FS-Cache: Loaded Sep 13 01:36:31.991000 audit[3409]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab1565f210 a1=4c344 a2=aaaae5a4e028 a3=aaab1543d010 items=0 ppid=547 pid=3409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:36:31.991000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.260860 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.260926 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.260954 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.269244 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.273518 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.273557 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.281919 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.281973 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.290363 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.290413 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.298848 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.298901 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.307103 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.307168 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.315027 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.315076 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.322846 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.322926 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.334332 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.334397 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.334429 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.341866 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.341929 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.349477 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.349525 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.357012 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.361338 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.361392 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.368666 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.368719 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.376171 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.376225 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.383191 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.383240 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.390411 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.390457 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.397558 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.397606 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.404576 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.404631 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.405806 kubelet[1971]: E0913 01:36:32.405781 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.412031 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.412078 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.419082 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.419124 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.426152 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.426250 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.433123 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.433203 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.440374 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.440434 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.447306 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.447366 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.454427 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.454494 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.461712 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.465512 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.465568 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.472882 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.472965 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.479877 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.479930 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.487217 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.487271 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.494235 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.494298 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.501348 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.501403 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.508371 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.508427 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.515293 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.519341 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.519413 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.526277 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.526334 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.533461 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.533503 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.540591 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.540645 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.547570 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.547628 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.555446 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.555520 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.561679 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.561711 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.569028 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.572887 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.576548 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.576593 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.584044 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.584087 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.591094 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.591153 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.598317 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.598373 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.602024 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.609054 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.609117 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.616045 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.616098 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.623502 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.623550 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.630681 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.630722 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.637616 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.637687 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.644982 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.645034 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.651941 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.655498 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.655524 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.662611 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.662677 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.669549 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.669592 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.677455 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.677502 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.681096 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.684656 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.688332 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.692659 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.699666 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.699706 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.703127 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.706684 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.713748 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.713794 kernel: Failed to create system directory sunrpc Sep 13 01:36:32.246000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.729461 kernel: RPC: Registered named UNIX socket transport module. Sep 13 01:36:32.729519 kernel: RPC: Registered udp transport module. Sep 13 01:36:32.729555 kernel: RPC: Registered tcp transport module. Sep 13 01:36:32.732770 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Sep 13 01:36:32.246000 audit[3409]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab156ab560 a1=14a804 a2=aaaae5a4e028 a3=aaab1543d010 items=6 ppid=547 pid=3409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:36:32.246000 audit: CWD cwd="/" Sep 13 01:36:32.246000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:36:32.246000 audit: PATH item=1 name=(null) inode=22066 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:36:32.246000 audit: PATH item=2 name=(null) inode=22066 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:36:32.246000 audit: PATH item=3 name=(null) inode=22067 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:36:32.246000 audit: PATH item=4 name=(null) inode=22066 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:36:32.246000 audit: PATH item=5 name=(null) inode=22068 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 01:36:32.246000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.895258 kernel: Failed to create system directory nfs Sep 13 01:36:32.895320 kernel: Failed to create system directory nfs Sep 13 01:36:32.895349 kernel: Failed to create system directory nfs Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.902070 kernel: Failed to create system directory nfs Sep 13 01:36:32.902119 kernel: Failed to create system directory nfs Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.908744 kernel: Failed to create system directory nfs Sep 13 01:36:32.908773 kernel: Failed to create system directory nfs Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.915759 kernel: Failed to create system directory nfs Sep 13 01:36:32.915808 kernel: Failed to create system directory nfs Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.922564 kernel: Failed to create system directory nfs Sep 13 01:36:32.922618 kernel: Failed to create system directory nfs Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.929393 kernel: Failed to create system directory nfs Sep 13 01:36:32.929435 kernel: Failed to create system directory nfs Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.936040 kernel: Failed to create system directory nfs Sep 13 01:36:32.936085 kernel: Failed to create system directory nfs Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.943607 kernel: Failed to create system directory nfs Sep 13 01:36:32.943699 kernel: Failed to create system directory nfs Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.950222 kernel: Failed to create system directory nfs Sep 13 01:36:32.950263 kernel: Failed to create system directory nfs Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.956905 kernel: Failed to create system directory nfs Sep 13 01:36:32.956949 kernel: Failed to create system directory nfs Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.964000 kernel: Failed to create system directory nfs Sep 13 01:36:32.964047 kernel: Failed to create system directory nfs Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.970646 kernel: Failed to create system directory nfs Sep 13 01:36:32.970686 kernel: Failed to create system directory nfs Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.979088 kernel: Failed to create system directory nfs Sep 13 01:36:32.979131 kernel: Failed to create system directory nfs Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.985961 kernel: Failed to create system directory nfs Sep 13 01:36:32.985991 kernel: Failed to create system directory nfs Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.992940 kernel: Failed to create system directory nfs Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.996627 kernel: Failed to create system directory nfs Sep 13 01:36:32.996720 kernel: Failed to create system directory nfs Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.003366 kernel: Failed to create system directory nfs Sep 13 01:36:33.003398 kernel: Failed to create system directory nfs Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.010095 kernel: Failed to create system directory nfs Sep 13 01:36:33.010121 kernel: Failed to create system directory nfs Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.016784 kernel: Failed to create system directory nfs Sep 13 01:36:33.016832 kernel: Failed to create system directory nfs Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.024038 kernel: Failed to create system directory nfs Sep 13 01:36:33.024083 kernel: Failed to create system directory nfs Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.030712 kernel: Failed to create system directory nfs Sep 13 01:36:33.030767 kernel: Failed to create system directory nfs Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.037488 kernel: Failed to create system directory nfs Sep 13 01:36:33.037531 kernel: Failed to create system directory nfs Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.040811 kernel: Failed to create system directory nfs Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.047824 kernel: Failed to create system directory nfs Sep 13 01:36:33.047854 kernel: Failed to create system directory nfs Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.054586 kernel: Failed to create system directory nfs Sep 13 01:36:33.054617 kernel: Failed to create system directory nfs Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.061173 kernel: Failed to create system directory nfs Sep 13 01:36:33.061256 kernel: Failed to create system directory nfs Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.067962 kernel: Failed to create system directory nfs Sep 13 01:36:33.068010 kernel: Failed to create system directory nfs Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.076016 kernel: Failed to create system directory nfs Sep 13 01:36:33.076063 kernel: Failed to create system directory nfs Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.083248 kernel: Failed to create system directory nfs Sep 13 01:36:33.083294 kernel: Failed to create system directory nfs Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.090518 kernel: Failed to create system directory nfs Sep 13 01:36:33.090561 kernel: Failed to create system directory nfs Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:32.882000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.097788 kernel: Failed to create system directory nfs Sep 13 01:36:33.116731 kernel: FS-Cache: Netfs 'nfs' registered for caching Sep 13 01:36:32.882000 audit[3409]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab15854b50 a1=116324 a2=aaaae5a4e028 a3=aaab1543d010 items=0 ppid=547 pid=3409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:36:32.882000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.221891 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.221945 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.221989 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.228753 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.228797 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.235798 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.235845 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.242894 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.242941 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.249753 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.249797 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.257604 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.257649 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.264722 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.264752 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.268184 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.275450 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.275493 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.278928 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.282301 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.285710 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.289259 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.292748 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.296119 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.299517 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.302922 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.309983 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.310011 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.313330 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.316698 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.323665 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.323711 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.330864 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.330919 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.334282 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.341390 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.341427 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.348134 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.348183 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.351493 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.355395 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.362313 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.362367 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.369342 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.369408 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.376089 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.376135 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.382804 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.386568 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.386632 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.393612 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.393684 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.400509 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.400559 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.406728 kubelet[1971]: E0913 01:36:33.406685 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:36:33.407231 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.407265 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.414122 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.414192 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.421096 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.421130 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.427850 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.427935 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.431287 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.434701 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.441872 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.441906 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.448730 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.448779 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.452144 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.455508 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.458980 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.462784 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.469854 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.469891 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.476723 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.476761 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.483744 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.483776 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.490637 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.490698 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.497899 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.497951 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.504711 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.504755 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.511611 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.511676 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.518353 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.518396 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.525220 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.525251 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.532067 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.532115 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.538767 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.538796 kernel: Failed to create system directory nfs4 Sep 13 01:36:33.205000 audit[3414]: AVC avc: denied { confidentiality } for pid=3414 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.647911 kernel: NFS: Registering the id_resolver key type Sep 13 01:36:33.648043 kernel: Key type id_resolver registered Sep 13 01:36:33.648070 kernel: Key type id_legacy registered Sep 13 01:36:33.205000 audit[3414]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffffb7cca010 a1=19c744 a2=aaaac22ce028 a3=aaab0162d010 items=0 ppid=547 pid=3414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:36:33.205000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Sep 13 01:36:33.713000 audit[3416]: AVC avc: denied { confidentiality } for pid=3416 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.713000 audit[3416]: AVC avc: denied { confidentiality } for pid=3416 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.725330 kernel: Failed to create system directory rpcgss Sep 13 01:36:33.725390 kernel: Failed to create system directory rpcgss Sep 13 01:36:33.725426 kernel: Failed to create system directory rpcgss Sep 13 01:36:33.713000 audit[3416]: AVC avc: denied { confidentiality } for pid=3416 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.729042 kernel: Failed to create system directory rpcgss Sep 13 01:36:33.713000 audit[3416]: AVC avc: denied { confidentiality } for pid=3416 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.732972 kernel: Failed to create system directory rpcgss Sep 13 01:36:33.713000 audit[3416]: AVC avc: denied { confidentiality } for pid=3416 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.713000 audit[3416]: AVC avc: denied { confidentiality } for pid=3416 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.740136 kernel: Failed to create system directory rpcgss Sep 13 01:36:33.740247 kernel: Failed to create system directory rpcgss Sep 13 01:36:33.713000 audit[3416]: AVC avc: denied { confidentiality } for pid=3416 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.713000 audit[3416]: AVC avc: denied { confidentiality } for pid=3416 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.747668 kernel: Failed to create system directory rpcgss Sep 13 01:36:33.747703 kernel: Failed to create system directory rpcgss Sep 13 01:36:33.713000 audit[3416]: AVC avc: denied { confidentiality } for pid=3416 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.713000 audit[3416]: AVC avc: denied { confidentiality } for pid=3416 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.754867 kernel: Failed to create system directory rpcgss Sep 13 01:36:33.754929 kernel: Failed to create system directory rpcgss Sep 13 01:36:33.713000 audit[3416]: AVC avc: denied { confidentiality } for pid=3416 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.713000 audit[3416]: AVC avc: denied { confidentiality } for pid=3416 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.762239 kernel: Failed to create system directory rpcgss Sep 13 01:36:33.762301 kernel: Failed to create system directory rpcgss Sep 13 01:36:33.713000 audit[3416]: AVC avc: denied { confidentiality } for pid=3416 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.713000 audit[3416]: AVC avc: denied { confidentiality } for pid=3416 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.769459 kernel: Failed to create system directory rpcgss Sep 13 01:36:33.713000 audit[3416]: AVC avc: denied { confidentiality } for pid=3416 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.773466 kernel: Failed to create system directory rpcgss Sep 13 01:36:33.773495 kernel: Failed to create system directory rpcgss Sep 13 01:36:33.713000 audit[3416]: AVC avc: denied { confidentiality } for pid=3416 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.713000 audit[3416]: AVC avc: denied { confidentiality } for pid=3416 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.781106 kernel: Failed to create system directory rpcgss Sep 13 01:36:33.781166 kernel: Failed to create system directory rpcgss Sep 13 01:36:33.713000 audit[3416]: AVC avc: denied { confidentiality } for pid=3416 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.713000 audit[3416]: AVC avc: denied { confidentiality } for pid=3416 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.788742 kernel: Failed to create system directory rpcgss Sep 13 01:36:33.788775 kernel: Failed to create system directory rpcgss Sep 13 01:36:33.713000 audit[3416]: AVC avc: denied { confidentiality } for pid=3416 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.713000 audit[3416]: AVC avc: denied { confidentiality } for pid=3416 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.796686 kernel: Failed to create system directory rpcgss Sep 13 01:36:33.796750 kernel: Failed to create system directory rpcgss Sep 13 01:36:33.713000 audit[3416]: AVC avc: denied { confidentiality } for pid=3416 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.713000 audit[3416]: AVC avc: denied { confidentiality } for pid=3416 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.804325 kernel: Failed to create system directory rpcgss Sep 13 01:36:33.804370 kernel: Failed to create system directory rpcgss Sep 13 01:36:33.713000 audit[3416]: AVC avc: denied { confidentiality } for pid=3416 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.713000 audit[3416]: AVC avc: denied { confidentiality } for pid=3416 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.812062 kernel: Failed to create system directory rpcgss Sep 13 01:36:33.812125 kernel: Failed to create system directory rpcgss Sep 13 01:36:33.713000 audit[3416]: AVC avc: denied { confidentiality } for pid=3416 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 01:36:33.713000 audit[3416]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff9a062010 a1=5eedc a2=aaaab579e028 a3=aaaacc82f010 items=0 ppid=547 pid=3416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:36:33.713000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Sep 13 01:36:34.206747 nfsidmap[3424]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.8-n-669f7473be' Sep 13 01:36:34.243362 nfsidmap[3425]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.8-n-669f7473be' Sep 13 01:36:34.252000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2799 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 01:36:34.252000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2799 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 01:36:34.252000 audit[1573]: AVC avc: denied { watch_reads } for pid=1573 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2799 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 01:36:34.252000 audit[1573]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaadd7b8d40 a2=10 a3=0 items=0 ppid=1 pid=1573 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:36:34.252000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 13 01:36:34.252000 audit[1573]: AVC avc: denied { watch_reads } for pid=1573 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2799 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 01:36:34.252000 audit[1573]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaadd7b8d40 a2=10 a3=0 items=0 ppid=1 pid=1573 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:36:34.252000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 13 01:36:34.406944 kubelet[1971]: E0913 01:36:34.406910 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:36:34.444792 env[1468]: time="2025-09-13T01:36:34.444754170Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:22a4611e-a2bd-4de5-879b-63dabbec54ae,Namespace:default,Attempt:0,}" Sep 13 01:36:34.578861 systemd-networkd[1625]: cali5ec59c6bf6e: Link UP Sep 13 01:36:34.587142 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 01:36:34.587595 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Sep 13 01:36:34.587534 systemd-networkd[1625]: cali5ec59c6bf6e: Gained carrier Sep 13 01:36:34.602195 env[1468]: 2025-09-13 01:36:34.507 [INFO][3426] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.27-k8s-test--pod--1-eth0 default 22a4611e-a2bd-4de5-879b-63dabbec54ae 1641 0 2025-09-13 01:36:06 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.27 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="1f84f68759605328c87b176863c17f9eec77baeca20c6a68082505271a94c897" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.27-k8s-test--pod--1-" Sep 13 01:36:34.602195 env[1468]: 2025-09-13 01:36:34.507 [INFO][3426] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="1f84f68759605328c87b176863c17f9eec77baeca20c6a68082505271a94c897" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.27-k8s-test--pod--1-eth0" Sep 13 01:36:34.602195 env[1468]: 2025-09-13 01:36:34.530 [INFO][3438] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1f84f68759605328c87b176863c17f9eec77baeca20c6a68082505271a94c897" HandleID="k8s-pod-network.1f84f68759605328c87b176863c17f9eec77baeca20c6a68082505271a94c897" Workload="10.200.20.27-k8s-test--pod--1-eth0" Sep 13 01:36:34.602195 env[1468]: 2025-09-13 01:36:34.530 [INFO][3438] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="1f84f68759605328c87b176863c17f9eec77baeca20c6a68082505271a94c897" HandleID="k8s-pod-network.1f84f68759605328c87b176863c17f9eec77baeca20c6a68082505271a94c897" Workload="10.200.20.27-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d3040), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.27", "pod":"test-pod-1", "timestamp":"2025-09-13 01:36:34.530100164 +0000 UTC"}, Hostname:"10.200.20.27", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 01:36:34.602195 env[1468]: 2025-09-13 01:36:34.530 [INFO][3438] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 01:36:34.602195 env[1468]: 2025-09-13 01:36:34.530 [INFO][3438] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 01:36:34.602195 env[1468]: 2025-09-13 01:36:34.530 [INFO][3438] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.27' Sep 13 01:36:34.602195 env[1468]: 2025-09-13 01:36:34.540 [INFO][3438] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.1f84f68759605328c87b176863c17f9eec77baeca20c6a68082505271a94c897" host="10.200.20.27" Sep 13 01:36:34.602195 env[1468]: 2025-09-13 01:36:34.545 [INFO][3438] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.20.27" Sep 13 01:36:34.602195 env[1468]: 2025-09-13 01:36:34.549 [INFO][3438] ipam/ipam.go 511: Trying affinity for 192.168.76.192/26 host="10.200.20.27" Sep 13 01:36:34.602195 env[1468]: 2025-09-13 01:36:34.551 [INFO][3438] ipam/ipam.go 158: Attempting to load block cidr=192.168.76.192/26 host="10.200.20.27" Sep 13 01:36:34.602195 env[1468]: 2025-09-13 01:36:34.553 [INFO][3438] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.76.192/26 host="10.200.20.27" Sep 13 01:36:34.602195 env[1468]: 2025-09-13 01:36:34.553 [INFO][3438] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.76.192/26 handle="k8s-pod-network.1f84f68759605328c87b176863c17f9eec77baeca20c6a68082505271a94c897" host="10.200.20.27" Sep 13 01:36:34.602195 env[1468]: 2025-09-13 01:36:34.555 [INFO][3438] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.1f84f68759605328c87b176863c17f9eec77baeca20c6a68082505271a94c897 Sep 13 01:36:34.602195 env[1468]: 2025-09-13 01:36:34.560 [INFO][3438] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.76.192/26 handle="k8s-pod-network.1f84f68759605328c87b176863c17f9eec77baeca20c6a68082505271a94c897" host="10.200.20.27" Sep 13 01:36:34.602195 env[1468]: 2025-09-13 01:36:34.568 [INFO][3438] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.76.196/26] block=192.168.76.192/26 handle="k8s-pod-network.1f84f68759605328c87b176863c17f9eec77baeca20c6a68082505271a94c897" host="10.200.20.27" Sep 13 01:36:34.602195 env[1468]: 2025-09-13 01:36:34.568 [INFO][3438] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.76.196/26] handle="k8s-pod-network.1f84f68759605328c87b176863c17f9eec77baeca20c6a68082505271a94c897" host="10.200.20.27" Sep 13 01:36:34.602195 env[1468]: 2025-09-13 01:36:34.568 [INFO][3438] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 01:36:34.602195 env[1468]: 2025-09-13 01:36:34.568 [INFO][3438] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.76.196/26] IPv6=[] ContainerID="1f84f68759605328c87b176863c17f9eec77baeca20c6a68082505271a94c897" HandleID="k8s-pod-network.1f84f68759605328c87b176863c17f9eec77baeca20c6a68082505271a94c897" Workload="10.200.20.27-k8s-test--pod--1-eth0" Sep 13 01:36:34.602195 env[1468]: 2025-09-13 01:36:34.570 [INFO][3426] cni-plugin/k8s.go 418: Populated endpoint ContainerID="1f84f68759605328c87b176863c17f9eec77baeca20c6a68082505271a94c897" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.27-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.27-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"22a4611e-a2bd-4de5-879b-63dabbec54ae", ResourceVersion:"1641", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 1, 36, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.27", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.76.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 01:36:34.602970 env[1468]: 2025-09-13 01:36:34.570 [INFO][3426] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.76.196/32] ContainerID="1f84f68759605328c87b176863c17f9eec77baeca20c6a68082505271a94c897" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.27-k8s-test--pod--1-eth0" Sep 13 01:36:34.602970 env[1468]: 2025-09-13 01:36:34.570 [INFO][3426] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="1f84f68759605328c87b176863c17f9eec77baeca20c6a68082505271a94c897" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.27-k8s-test--pod--1-eth0" Sep 13 01:36:34.602970 env[1468]: 2025-09-13 01:36:34.585 [INFO][3426] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="1f84f68759605328c87b176863c17f9eec77baeca20c6a68082505271a94c897" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.27-k8s-test--pod--1-eth0" Sep 13 01:36:34.602970 env[1468]: 2025-09-13 01:36:34.587 [INFO][3426] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="1f84f68759605328c87b176863c17f9eec77baeca20c6a68082505271a94c897" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.27-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.27-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"22a4611e-a2bd-4de5-879b-63dabbec54ae", ResourceVersion:"1641", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 1, 36, 6, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.27", ContainerID:"1f84f68759605328c87b176863c17f9eec77baeca20c6a68082505271a94c897", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.76.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"ae:ef:e9:b7:1f:3b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 01:36:34.602970 env[1468]: 2025-09-13 01:36:34.600 [INFO][3426] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="1f84f68759605328c87b176863c17f9eec77baeca20c6a68082505271a94c897" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.27-k8s-test--pod--1-eth0" Sep 13 01:36:34.613000 audit[3453]: NETFILTER_CFG table=filter:81 family=2 entries=40 op=nft_register_chain pid=3453 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 01:36:34.613000 audit[3453]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20336 a0=3 a1=ffffd42920e0 a2=0 a3=ffffa7fd0fa8 items=0 ppid=2569 pid=3453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:36:34.613000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 01:36:34.616678 env[1468]: time="2025-09-13T01:36:34.616588100Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 01:36:34.616769 env[1468]: time="2025-09-13T01:36:34.616681102Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 01:36:34.616769 env[1468]: time="2025-09-13T01:36:34.616708942Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 01:36:34.616985 env[1468]: time="2025-09-13T01:36:34.616926706Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1f84f68759605328c87b176863c17f9eec77baeca20c6a68082505271a94c897 pid=3460 runtime=io.containerd.runc.v2 Sep 13 01:36:34.630701 systemd[1]: Started cri-containerd-1f84f68759605328c87b176863c17f9eec77baeca20c6a68082505271a94c897.scope. Sep 13 01:36:34.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:34.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:34.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:34.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:34.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:34.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:34.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:34.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:34.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:34.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:34.645000 audit: BPF prog-id=124 op=LOAD Sep 13 01:36:34.646000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:34.646000 audit[3472]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3460 pid=3472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:36:34.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166383466363837353936303533323863383762313736383633633137 Sep 13 01:36:34.646000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:34.646000 audit[3472]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3460 pid=3472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:36:34.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166383466363837353936303533323863383762313736383633633137 Sep 13 01:36:34.646000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:34.646000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:34.646000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:34.646000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:34.646000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:34.646000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:34.646000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:34.646000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:34.646000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:34.646000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:34.646000 audit: BPF prog-id=125 op=LOAD Sep 13 01:36:34.646000 audit[3472]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3460 pid=3472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:36:34.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166383466363837353936303533323863383762313736383633633137 Sep 13 01:36:34.647000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:34.647000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:34.647000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:34.647000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:34.647000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:34.647000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:34.647000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:34.647000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:34.647000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:34.647000 audit: BPF prog-id=126 op=LOAD Sep 13 01:36:34.647000 audit[3472]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3460 pid=3472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:36:34.647000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166383466363837353936303533323863383762313736383633633137 Sep 13 01:36:34.647000 audit: BPF prog-id=126 op=UNLOAD Sep 13 01:36:34.647000 audit: BPF prog-id=125 op=UNLOAD Sep 13 01:36:34.647000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:34.647000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:34.647000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:34.647000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:34.647000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:34.647000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:34.647000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:34.647000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:34.647000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:34.647000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:34.647000 audit: BPF prog-id=127 op=LOAD Sep 13 01:36:34.647000 audit[3472]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3460 pid=3472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:36:34.647000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166383466363837353936303533323863383762313736383633633137 Sep 13 01:36:34.665255 env[1468]: time="2025-09-13T01:36:34.665215946Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:22a4611e-a2bd-4de5-879b-63dabbec54ae,Namespace:default,Attempt:0,} returns sandbox id \"1f84f68759605328c87b176863c17f9eec77baeca20c6a68082505271a94c897\"" Sep 13 01:36:34.666908 env[1468]: time="2025-09-13T01:36:34.666866576Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Sep 13 01:36:34.984457 env[1468]: time="2025-09-13T01:36:34.984416640Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:36:34.990133 env[1468]: time="2025-09-13T01:36:34.990107024Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:9fddf21fd9c2634e7bf6e633e36b0fb227f6cd5fbe1b3334a16de3ab50f31e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:36:34.993977 env[1468]: time="2025-09-13T01:36:34.993941094Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:36:34.997844 env[1468]: time="2025-09-13T01:36:34.997810324Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:883ca821a91fc20bcde818eeee4e1ed55ef63a020d6198ecd5a03af5a4eac530,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 01:36:34.998540 env[1468]: time="2025-09-13T01:36:34.998515297Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:9fddf21fd9c2634e7bf6e633e36b0fb227f6cd5fbe1b3334a16de3ab50f31e5e\"" Sep 13 01:36:35.006888 env[1468]: time="2025-09-13T01:36:35.006855048Z" level=info msg="CreateContainer within sandbox \"1f84f68759605328c87b176863c17f9eec77baeca20c6a68082505271a94c897\" for container &ContainerMetadata{Name:test,Attempt:0,}" Sep 13 01:36:35.038438 env[1468]: time="2025-09-13T01:36:35.038398414Z" level=info msg="CreateContainer within sandbox \"1f84f68759605328c87b176863c17f9eec77baeca20c6a68082505271a94c897\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"4e82f611cbb577d1edeb40378bdf8bdcebe4ababff997447e59eae9b329db680\"" Sep 13 01:36:35.039360 env[1468]: time="2025-09-13T01:36:35.039338711Z" level=info msg="StartContainer for \"4e82f611cbb577d1edeb40378bdf8bdcebe4ababff997447e59eae9b329db680\"" Sep 13 01:36:35.053824 systemd[1]: Started cri-containerd-4e82f611cbb577d1edeb40378bdf8bdcebe4ababff997447e59eae9b329db680.scope. Sep 13 01:36:35.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:35.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:35.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:35.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:35.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:35.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:35.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:35.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:35.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:35.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:35.066000 audit: BPF prog-id=128 op=LOAD Sep 13 01:36:35.067000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:35.067000 audit[3503]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3460 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:36:35.067000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465383266363131636262353737643165646562343033373862646638 Sep 13 01:36:35.067000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:35.067000 audit[3503]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3460 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:36:35.067000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465383266363131636262353737643165646562343033373862646638 Sep 13 01:36:35.067000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:35.067000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:35.067000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:35.067000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:35.067000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:35.067000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:35.067000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:35.067000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:35.067000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:35.067000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:35.067000 audit: BPF prog-id=129 op=LOAD Sep 13 01:36:35.067000 audit[3503]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3460 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:36:35.067000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465383266363131636262353737643165646562343033373862646638 Sep 13 01:36:35.067000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:35.067000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:35.067000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:35.067000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:35.067000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:35.067000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:35.067000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:35.067000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:35.067000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:35.067000 audit: BPF prog-id=130 op=LOAD Sep 13 01:36:35.067000 audit[3503]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3460 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:36:35.067000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465383266363131636262353737643165646562343033373862646638 Sep 13 01:36:35.067000 audit: BPF prog-id=130 op=UNLOAD Sep 13 01:36:35.067000 audit: BPF prog-id=129 op=UNLOAD Sep 13 01:36:35.067000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:35.067000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:35.067000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:35.067000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:35.067000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:35.067000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:35.067000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:35.067000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:35.067000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:35.067000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 01:36:35.067000 audit: BPF prog-id=131 op=LOAD Sep 13 01:36:35.067000 audit[3503]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3460 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 01:36:35.067000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465383266363131636262353737643165646562343033373862646638 Sep 13 01:36:35.084902 env[1468]: time="2025-09-13T01:36:35.084847928Z" level=info msg="StartContainer for \"4e82f611cbb577d1edeb40378bdf8bdcebe4ababff997447e59eae9b329db680\" returns successfully" Sep 13 01:36:35.407384 kubelet[1971]: E0913 01:36:35.407349 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:36:35.720895 kubelet[1971]: I0913 01:36:35.720768 1971 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=29.386809067 podStartE2EDuration="29.72075279s" podCreationTimestamp="2025-09-13 01:36:06 +0000 UTC" firstStartedPulling="2025-09-13 01:36:34.666110802 +0000 UTC m=+77.115843743" lastFinishedPulling="2025-09-13 01:36:35.000054525 +0000 UTC m=+77.449787466" observedRunningTime="2025-09-13 01:36:35.720347263 +0000 UTC m=+78.170126564" watchObservedRunningTime="2025-09-13 01:36:35.72075279 +0000 UTC m=+78.170485731" Sep 13 01:36:35.910846 systemd-networkd[1625]: cali5ec59c6bf6e: Gained IPv6LL Sep 13 01:36:36.407619 kubelet[1971]: E0913 01:36:36.407584 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:36:37.408687 kubelet[1971]: E0913 01:36:37.408641 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:36:38.351460 kubelet[1971]: E0913 01:36:38.351425 1971 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:36:38.409268 kubelet[1971]: E0913 01:36:38.409247 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 01:36:39.410268 kubelet[1971]: E0913 01:36:39.410233 1971 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"