Nov 1 00:21:47.060185 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Nov 1 00:21:47.060205 kernel: Linux version 5.15.192-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Oct 31 23:12:38 -00 2025 Nov 1 00:21:47.060212 kernel: earlycon: pl11 at MMIO 0x00000000effec000 (options '') Nov 1 00:21:47.060219 kernel: printk: bootconsole [pl11] enabled Nov 1 00:21:47.060224 kernel: efi: EFI v2.70 by EDK II Nov 1 00:21:47.060230 kernel: efi: ACPI 2.0=0x3fd5f018 SMBIOS=0x3e580000 SMBIOS 3.0=0x3e560000 MEMATTR=0x3ead8b98 RNG=0x3fd5f998 MEMRESERVE=0x3761cf98 Nov 1 00:21:47.060236 kernel: random: crng init done Nov 1 00:21:47.060242 kernel: ACPI: Early table checksum verification disabled Nov 1 00:21:47.060247 kernel: ACPI: RSDP 0x000000003FD5F018 000024 (v02 VRTUAL) Nov 1 00:21:47.060252 kernel: ACPI: XSDT 0x000000003FD5FF18 00006C (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Nov 1 00:21:47.060258 kernel: ACPI: FACP 0x000000003FD5FC18 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Nov 1 00:21:47.060263 kernel: ACPI: DSDT 0x000000003FD41018 01DFCD (v02 MSFTVM DSDT01 00000001 INTL 20230628) Nov 1 00:21:47.060270 kernel: ACPI: DBG2 0x000000003FD5FB18 000072 (v00 VRTUAL MICROSFT 00000001 MSFT 00000001) Nov 1 00:21:47.060275 kernel: ACPI: GTDT 0x000000003FD5FD98 000060 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Nov 1 00:21:47.060282 kernel: ACPI: OEM0 0x000000003FD5F098 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Nov 1 00:21:47.060288 kernel: ACPI: SPCR 0x000000003FD5FA98 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Nov 1 00:21:47.060294 kernel: ACPI: APIC 0x000000003FD5F818 0000FC (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Nov 1 00:21:47.060301 kernel: ACPI: SRAT 0x000000003FD5F198 000234 (v03 VRTUAL MICROSFT 00000001 MSFT 00000001) Nov 1 00:21:47.060306 kernel: ACPI: PPTT 0x000000003FD5F418 000120 (v01 VRTUAL MICROSFT 00000000 MSFT 00000000) Nov 1 00:21:47.060312 kernel: ACPI: BGRT 0x000000003FD5FE98 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Nov 1 00:21:47.060318 kernel: ACPI: SPCR: console: pl011,mmio32,0xeffec000,115200 Nov 1 00:21:47.060323 kernel: NUMA: Failed to initialise from firmware Nov 1 00:21:47.060329 kernel: NUMA: Faking a node at [mem 0x0000000000000000-0x00000001bfffffff] Nov 1 00:21:47.060335 kernel: NUMA: NODE_DATA [mem 0x1bf7f3900-0x1bf7f8fff] Nov 1 00:21:47.060340 kernel: Zone ranges: Nov 1 00:21:47.060346 kernel: DMA [mem 0x0000000000000000-0x00000000ffffffff] Nov 1 00:21:47.064436 kernel: DMA32 empty Nov 1 00:21:47.064445 kernel: Normal [mem 0x0000000100000000-0x00000001bfffffff] Nov 1 00:21:47.064457 kernel: Movable zone start for each node Nov 1 00:21:47.064463 kernel: Early memory node ranges Nov 1 00:21:47.064469 kernel: node 0: [mem 0x0000000000000000-0x00000000007fffff] Nov 1 00:21:47.064475 kernel: node 0: [mem 0x0000000000824000-0x000000003e54ffff] Nov 1 00:21:47.064481 kernel: node 0: [mem 0x000000003e550000-0x000000003e87ffff] Nov 1 00:21:47.064487 kernel: node 0: [mem 0x000000003e880000-0x000000003fc7ffff] Nov 1 00:21:47.064493 kernel: node 0: [mem 0x000000003fc80000-0x000000003fcfffff] Nov 1 00:21:47.064499 kernel: node 0: [mem 0x000000003fd00000-0x000000003fffffff] Nov 1 00:21:47.064504 kernel: node 0: [mem 0x0000000100000000-0x00000001bfffffff] Nov 1 00:21:47.064510 kernel: Initmem setup node 0 [mem 0x0000000000000000-0x00000001bfffffff] Nov 1 00:21:47.064516 kernel: On node 0, zone DMA: 36 pages in unavailable ranges Nov 1 00:21:47.064522 kernel: psci: probing for conduit method from ACPI. Nov 1 00:21:47.064532 kernel: psci: PSCIv1.1 detected in firmware. Nov 1 00:21:47.064538 kernel: psci: Using standard PSCI v0.2 function IDs Nov 1 00:21:47.064545 kernel: psci: MIGRATE_INFO_TYPE not supported. Nov 1 00:21:47.064551 kernel: psci: SMC Calling Convention v1.4 Nov 1 00:21:47.064557 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x0 -> Node -1 Nov 1 00:21:47.064564 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1 -> Node -1 Nov 1 00:21:47.064570 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 Nov 1 00:21:47.064576 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 Nov 1 00:21:47.064583 kernel: pcpu-alloc: [0] 0 [0] 1 Nov 1 00:21:47.064589 kernel: Detected PIPT I-cache on CPU0 Nov 1 00:21:47.064595 kernel: CPU features: detected: GIC system register CPU interface Nov 1 00:21:47.064602 kernel: CPU features: detected: Hardware dirty bit management Nov 1 00:21:47.064608 kernel: CPU features: detected: Spectre-BHB Nov 1 00:21:47.064614 kernel: CPU features: kernel page table isolation forced ON by KASLR Nov 1 00:21:47.064620 kernel: CPU features: detected: Kernel page table isolation (KPTI) Nov 1 00:21:47.064626 kernel: CPU features: detected: ARM erratum 1418040 Nov 1 00:21:47.064634 kernel: CPU features: detected: ARM erratum 1542419 (kernel portion) Nov 1 00:21:47.064640 kernel: CPU features: detected: SSBS not fully self-synchronizing Nov 1 00:21:47.064646 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1032156 Nov 1 00:21:47.064652 kernel: Policy zone: Normal Nov 1 00:21:47.064660 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=284392058f112e827cd7c521dcce1be27e1367d0030df494642d12e41e342e29 Nov 1 00:21:47.064667 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Nov 1 00:21:47.064674 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Nov 1 00:21:47.064680 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Nov 1 00:21:47.064686 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Nov 1 00:21:47.064692 kernel: software IO TLB: mapped [mem 0x000000003a550000-0x000000003e550000] (64MB) Nov 1 00:21:47.064699 kernel: Memory: 3986880K/4194160K available (9792K kernel code, 2094K rwdata, 7592K rodata, 36416K init, 777K bss, 207280K reserved, 0K cma-reserved) Nov 1 00:21:47.064706 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Nov 1 00:21:47.064712 kernel: trace event string verifier disabled Nov 1 00:21:47.064718 kernel: rcu: Preemptible hierarchical RCU implementation. Nov 1 00:21:47.064725 kernel: rcu: RCU event tracing is enabled. Nov 1 00:21:47.064731 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Nov 1 00:21:47.064738 kernel: Trampoline variant of Tasks RCU enabled. Nov 1 00:21:47.064744 kernel: Tracing variant of Tasks RCU enabled. Nov 1 00:21:47.064750 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Nov 1 00:21:47.064756 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Nov 1 00:21:47.064762 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Nov 1 00:21:47.064768 kernel: GICv3: 960 SPIs implemented Nov 1 00:21:47.064776 kernel: GICv3: 0 Extended SPIs implemented Nov 1 00:21:47.064782 kernel: GICv3: Distributor has no Range Selector support Nov 1 00:21:47.064788 kernel: Root IRQ handler: gic_handle_irq Nov 1 00:21:47.064794 kernel: GICv3: 16 PPIs implemented Nov 1 00:21:47.064800 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000effee000 Nov 1 00:21:47.064806 kernel: ITS: No ITS available, not enabling LPIs Nov 1 00:21:47.064813 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Nov 1 00:21:47.064819 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Nov 1 00:21:47.064825 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Nov 1 00:21:47.064831 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Nov 1 00:21:47.064838 kernel: Console: colour dummy device 80x25 Nov 1 00:21:47.064845 kernel: printk: console [tty1] enabled Nov 1 00:21:47.064852 kernel: ACPI: Core revision 20210730 Nov 1 00:21:47.064859 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Nov 1 00:21:47.064865 kernel: pid_max: default: 32768 minimum: 301 Nov 1 00:21:47.064872 kernel: LSM: Security Framework initializing Nov 1 00:21:47.064878 kernel: SELinux: Initializing. Nov 1 00:21:47.064884 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Nov 1 00:21:47.064891 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Nov 1 00:21:47.064897 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3a8030, hints 0xe, misc 0x31e1 Nov 1 00:21:47.064905 kernel: Hyper-V: Host Build 10.0.22477.1619-1-0 Nov 1 00:21:47.064911 kernel: rcu: Hierarchical SRCU implementation. Nov 1 00:21:47.064918 kernel: Remapping and enabling EFI services. Nov 1 00:21:47.064924 kernel: smp: Bringing up secondary CPUs ... Nov 1 00:21:47.064931 kernel: Detected PIPT I-cache on CPU1 Nov 1 00:21:47.064937 kernel: GICv3: CPU1: found redistributor 1 region 1:0x00000000f000e000 Nov 1 00:21:47.064944 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Nov 1 00:21:47.064950 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Nov 1 00:21:47.064956 kernel: smp: Brought up 1 node, 2 CPUs Nov 1 00:21:47.064962 kernel: SMP: Total of 2 processors activated. Nov 1 00:21:47.064970 kernel: CPU features: detected: 32-bit EL0 Support Nov 1 00:21:47.064977 kernel: CPU features: detected: Instruction cache invalidation not required for I/D coherence Nov 1 00:21:47.064983 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Nov 1 00:21:47.064990 kernel: CPU features: detected: CRC32 instructions Nov 1 00:21:47.064996 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Nov 1 00:21:47.065002 kernel: CPU features: detected: LSE atomic instructions Nov 1 00:21:47.065009 kernel: CPU features: detected: Privileged Access Never Nov 1 00:21:47.065016 kernel: CPU: All CPU(s) started at EL1 Nov 1 00:21:47.065022 kernel: alternatives: patching kernel code Nov 1 00:21:47.065030 kernel: devtmpfs: initialized Nov 1 00:21:47.065042 kernel: KASLR enabled Nov 1 00:21:47.065049 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Nov 1 00:21:47.065057 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Nov 1 00:21:47.065064 kernel: pinctrl core: initialized pinctrl subsystem Nov 1 00:21:47.065070 kernel: SMBIOS 3.1.0 present. Nov 1 00:21:47.065077 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 09/28/2024 Nov 1 00:21:47.065084 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Nov 1 00:21:47.065091 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Nov 1 00:21:47.065099 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Nov 1 00:21:47.065106 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Nov 1 00:21:47.065112 kernel: audit: initializing netlink subsys (disabled) Nov 1 00:21:47.065119 kernel: audit: type=2000 audit(0.090:1): state=initialized audit_enabled=0 res=1 Nov 1 00:21:47.065126 kernel: thermal_sys: Registered thermal governor 'step_wise' Nov 1 00:21:47.065133 kernel: cpuidle: using governor menu Nov 1 00:21:47.065139 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Nov 1 00:21:47.065148 kernel: ASID allocator initialised with 32768 entries Nov 1 00:21:47.065154 kernel: ACPI: bus type PCI registered Nov 1 00:21:47.065161 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Nov 1 00:21:47.065168 kernel: Serial: AMBA PL011 UART driver Nov 1 00:21:47.065174 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Nov 1 00:21:47.065181 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Nov 1 00:21:47.065187 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Nov 1 00:21:47.065194 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Nov 1 00:21:47.065201 kernel: cryptd: max_cpu_qlen set to 1000 Nov 1 00:21:47.065209 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Nov 1 00:21:47.065216 kernel: ACPI: Added _OSI(Module Device) Nov 1 00:21:47.065222 kernel: ACPI: Added _OSI(Processor Device) Nov 1 00:21:47.065229 kernel: ACPI: Added _OSI(Processor Aggregator Device) Nov 1 00:21:47.065236 kernel: ACPI: Added _OSI(Linux-Dell-Video) Nov 1 00:21:47.065242 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Nov 1 00:21:47.065249 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Nov 1 00:21:47.065256 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Nov 1 00:21:47.065262 kernel: ACPI: Interpreter enabled Nov 1 00:21:47.065270 kernel: ACPI: Using GIC for interrupt routing Nov 1 00:21:47.065277 kernel: ARMH0011:00: ttyAMA0 at MMIO 0xeffec000 (irq = 12, base_baud = 0) is a SBSA Nov 1 00:21:47.065283 kernel: printk: console [ttyAMA0] enabled Nov 1 00:21:47.065290 kernel: printk: bootconsole [pl11] disabled Nov 1 00:21:47.065297 kernel: ARMH0011:01: ttyAMA1 at MMIO 0xeffeb000 (irq = 13, base_baud = 0) is a SBSA Nov 1 00:21:47.065303 kernel: iommu: Default domain type: Translated Nov 1 00:21:47.065310 kernel: iommu: DMA domain TLB invalidation policy: strict mode Nov 1 00:21:47.065317 kernel: vgaarb: loaded Nov 1 00:21:47.065323 kernel: pps_core: LinuxPPS API ver. 1 registered Nov 1 00:21:47.065330 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Nov 1 00:21:47.065338 kernel: PTP clock support registered Nov 1 00:21:47.065345 kernel: Registered efivars operations Nov 1 00:21:47.065363 kernel: No ACPI PMU IRQ for CPU0 Nov 1 00:21:47.065370 kernel: No ACPI PMU IRQ for CPU1 Nov 1 00:21:47.065377 kernel: clocksource: Switched to clocksource arch_sys_counter Nov 1 00:21:47.065384 kernel: VFS: Disk quotas dquot_6.6.0 Nov 1 00:21:47.065390 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Nov 1 00:21:47.065398 kernel: pnp: PnP ACPI init Nov 1 00:21:47.065404 kernel: pnp: PnP ACPI: found 0 devices Nov 1 00:21:47.065413 kernel: NET: Registered PF_INET protocol family Nov 1 00:21:47.065419 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Nov 1 00:21:47.065426 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Nov 1 00:21:47.065433 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Nov 1 00:21:47.065440 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Nov 1 00:21:47.065447 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Nov 1 00:21:47.065454 kernel: TCP: Hash tables configured (established 32768 bind 32768) Nov 1 00:21:47.065461 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Nov 1 00:21:47.065469 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Nov 1 00:21:47.065476 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Nov 1 00:21:47.065482 kernel: PCI: CLS 0 bytes, default 64 Nov 1 00:21:47.065489 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 1 counters available Nov 1 00:21:47.065496 kernel: kvm [1]: HYP mode not available Nov 1 00:21:47.065502 kernel: Initialise system trusted keyrings Nov 1 00:21:47.065509 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Nov 1 00:21:47.065516 kernel: Key type asymmetric registered Nov 1 00:21:47.065522 kernel: Asymmetric key parser 'x509' registered Nov 1 00:21:47.065530 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Nov 1 00:21:47.065537 kernel: io scheduler mq-deadline registered Nov 1 00:21:47.065543 kernel: io scheduler kyber registered Nov 1 00:21:47.065550 kernel: io scheduler bfq registered Nov 1 00:21:47.065557 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Nov 1 00:21:47.065563 kernel: thunder_xcv, ver 1.0 Nov 1 00:21:47.065570 kernel: thunder_bgx, ver 1.0 Nov 1 00:21:47.065577 kernel: nicpf, ver 1.0 Nov 1 00:21:47.065583 kernel: nicvf, ver 1.0 Nov 1 00:21:47.065731 kernel: rtc-efi rtc-efi.0: registered as rtc0 Nov 1 00:21:47.065795 kernel: rtc-efi rtc-efi.0: setting system clock to 2025-11-01T00:21:46 UTC (1761956506) Nov 1 00:21:47.065804 kernel: efifb: probing for efifb Nov 1 00:21:47.065811 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Nov 1 00:21:47.065818 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Nov 1 00:21:47.065824 kernel: efifb: scrolling: redraw Nov 1 00:21:47.065831 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Nov 1 00:21:47.065838 kernel: Console: switching to colour frame buffer device 128x48 Nov 1 00:21:47.065846 kernel: fb0: EFI VGA frame buffer device Nov 1 00:21:47.065853 kernel: SMCCC: SOC_ID: ARCH_SOC_ID not implemented, skipping .... Nov 1 00:21:47.065860 kernel: hid: raw HID events driver (C) Jiri Kosina Nov 1 00:21:47.065866 kernel: NET: Registered PF_INET6 protocol family Nov 1 00:21:47.065873 kernel: Segment Routing with IPv6 Nov 1 00:21:47.065879 kernel: In-situ OAM (IOAM) with IPv6 Nov 1 00:21:47.065886 kernel: NET: Registered PF_PACKET protocol family Nov 1 00:21:47.065893 kernel: Key type dns_resolver registered Nov 1 00:21:47.065899 kernel: registered taskstats version 1 Nov 1 00:21:47.065906 kernel: Loading compiled-in X.509 certificates Nov 1 00:21:47.065914 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.192-flatcar: 4aa5071b9a6f96878595e36d4bd5862a671c915d' Nov 1 00:21:47.065921 kernel: Key type .fscrypt registered Nov 1 00:21:47.065927 kernel: Key type fscrypt-provisioning registered Nov 1 00:21:47.065934 kernel: ima: No TPM chip found, activating TPM-bypass! Nov 1 00:21:47.065941 kernel: ima: Allocated hash algorithm: sha1 Nov 1 00:21:47.065948 kernel: ima: No architecture policies found Nov 1 00:21:47.065954 kernel: clk: Disabling unused clocks Nov 1 00:21:47.065961 kernel: Freeing unused kernel memory: 36416K Nov 1 00:21:47.065969 kernel: Run /init as init process Nov 1 00:21:47.065976 kernel: with arguments: Nov 1 00:21:47.065982 kernel: /init Nov 1 00:21:47.065989 kernel: with environment: Nov 1 00:21:47.065995 kernel: HOME=/ Nov 1 00:21:47.066001 kernel: TERM=linux Nov 1 00:21:47.066008 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Nov 1 00:21:47.066017 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Nov 1 00:21:47.066028 systemd[1]: Detected virtualization microsoft. Nov 1 00:21:47.066035 systemd[1]: Detected architecture arm64. Nov 1 00:21:47.066042 systemd[1]: Running in initrd. Nov 1 00:21:47.066049 systemd[1]: No hostname configured, using default hostname. Nov 1 00:21:47.066057 systemd[1]: Hostname set to . Nov 1 00:21:47.066064 systemd[1]: Initializing machine ID from random generator. Nov 1 00:21:47.066072 systemd[1]: Queued start job for default target initrd.target. Nov 1 00:21:47.066079 systemd[1]: Started systemd-ask-password-console.path. Nov 1 00:21:47.066087 systemd[1]: Reached target cryptsetup.target. Nov 1 00:21:47.066094 systemd[1]: Reached target paths.target. Nov 1 00:21:47.066101 systemd[1]: Reached target slices.target. Nov 1 00:21:47.066108 systemd[1]: Reached target swap.target. Nov 1 00:21:47.066115 systemd[1]: Reached target timers.target. Nov 1 00:21:47.066123 systemd[1]: Listening on iscsid.socket. Nov 1 00:21:47.066130 systemd[1]: Listening on iscsiuio.socket. Nov 1 00:21:47.066137 systemd[1]: Listening on systemd-journald-audit.socket. Nov 1 00:21:47.066145 systemd[1]: Listening on systemd-journald-dev-log.socket. Nov 1 00:21:47.066153 systemd[1]: Listening on systemd-journald.socket. Nov 1 00:21:47.066160 systemd[1]: Listening on systemd-networkd.socket. Nov 1 00:21:47.066167 systemd[1]: Listening on systemd-udevd-control.socket. Nov 1 00:21:47.066174 systemd[1]: Listening on systemd-udevd-kernel.socket. Nov 1 00:21:47.066181 systemd[1]: Reached target sockets.target. Nov 1 00:21:47.066188 systemd[1]: Starting kmod-static-nodes.service... Nov 1 00:21:47.066196 systemd[1]: Finished network-cleanup.service. Nov 1 00:21:47.066203 systemd[1]: Starting systemd-fsck-usr.service... Nov 1 00:21:47.066211 systemd[1]: Starting systemd-journald.service... Nov 1 00:21:47.066219 systemd[1]: Starting systemd-modules-load.service... Nov 1 00:21:47.066226 systemd[1]: Starting systemd-resolved.service... Nov 1 00:21:47.066233 systemd[1]: Starting systemd-vconsole-setup.service... Nov 1 00:21:47.066245 systemd-journald[276]: Journal started Nov 1 00:21:47.066290 systemd-journald[276]: Runtime Journal (/run/log/journal/38473f77cda140bcb105a9583516ac5a) is 8.0M, max 78.5M, 70.5M free. Nov 1 00:21:47.049535 systemd-modules-load[277]: Inserted module 'overlay' Nov 1 00:21:47.099371 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Nov 1 00:21:47.111699 systemd[1]: Started systemd-journald.service. Nov 1 00:21:47.111759 kernel: Bridge firewalling registered Nov 1 00:21:47.111849 systemd-modules-load[277]: Inserted module 'br_netfilter' Nov 1 00:21:47.141522 kernel: audit: type=1130 audit(1761956507.113:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:21:47.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:21:47.116418 systemd-resolved[278]: Positive Trust Anchors: Nov 1 00:21:47.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:21:47.116426 systemd-resolved[278]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Nov 1 00:21:47.197341 kernel: audit: type=1130 audit(1761956507.145:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:21:47.197379 kernel: audit: type=1130 audit(1761956507.171:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:21:47.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:21:47.116454 systemd-resolved[278]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Nov 1 00:21:47.268721 kernel: audit: type=1130 audit(1761956507.201:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:21:47.268747 kernel: SCSI subsystem initialized Nov 1 00:21:47.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:21:47.117405 systemd[1]: Finished kmod-static-nodes.service. Nov 1 00:21:47.314455 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Nov 1 00:21:47.314483 kernel: device-mapper: uevent: version 1.0.3 Nov 1 00:21:47.314492 kernel: audit: type=1130 audit(1761956507.285:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:21:47.285000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:21:47.118695 systemd-resolved[278]: Defaulting to hostname 'linux'. Nov 1 00:21:47.161740 systemd[1]: Started systemd-resolved.service. Nov 1 00:21:47.348549 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Nov 1 00:21:47.171853 systemd[1]: Finished systemd-fsck-usr.service. Nov 1 00:21:47.259794 systemd[1]: Finished systemd-vconsole-setup.service. Nov 1 00:21:47.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:21:47.295577 systemd[1]: Reached target nss-lookup.target. Nov 1 00:21:47.333225 systemd[1]: Starting dracut-cmdline-ask.service... Nov 1 00:21:47.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:21:47.338780 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Nov 1 00:21:47.427988 kernel: audit: type=1130 audit(1761956507.362:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:21:47.428011 kernel: audit: type=1130 audit(1761956507.389:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:21:47.343306 systemd-modules-load[277]: Inserted module 'dm_multipath' Nov 1 00:21:47.345128 systemd[1]: Finished systemd-modules-load.service. Nov 1 00:21:47.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:21:47.363493 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Nov 1 00:21:47.465066 kernel: audit: type=1130 audit(1761956507.438:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:21:47.390451 systemd[1]: Starting systemd-sysctl.service... Nov 1 00:21:47.428193 systemd[1]: Finished dracut-cmdline-ask.service. Nov 1 00:21:47.458569 systemd[1]: Starting dracut-cmdline.service... Nov 1 00:21:47.505308 kernel: audit: type=1130 audit(1761956507.484:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:21:47.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:21:47.469426 systemd[1]: Finished systemd-sysctl.service. Nov 1 00:21:47.510040 dracut-cmdline[300]: dracut-dracut-053 Nov 1 00:21:47.514591 dracut-cmdline[300]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=284392058f112e827cd7c521dcce1be27e1367d0030df494642d12e41e342e29 Nov 1 00:21:47.576373 kernel: Loading iSCSI transport class v2.0-870. Nov 1 00:21:47.590388 kernel: iscsi: registered transport (tcp) Nov 1 00:21:47.611580 kernel: iscsi: registered transport (qla4xxx) Nov 1 00:21:47.611647 kernel: QLogic iSCSI HBA Driver Nov 1 00:21:47.647665 systemd[1]: Finished dracut-cmdline.service. Nov 1 00:21:47.652000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:21:47.653763 systemd[1]: Starting dracut-pre-udev.service... Nov 1 00:21:47.711370 kernel: raid6: neonx8 gen() 13751 MB/s Nov 1 00:21:47.729366 kernel: raid6: neonx8 xor() 10827 MB/s Nov 1 00:21:47.751367 kernel: raid6: neonx4 gen() 13541 MB/s Nov 1 00:21:47.772364 kernel: raid6: neonx4 xor() 11305 MB/s Nov 1 00:21:47.793381 kernel: raid6: neonx2 gen() 13103 MB/s Nov 1 00:21:47.815363 kernel: raid6: neonx2 xor() 10243 MB/s Nov 1 00:21:47.836359 kernel: raid6: neonx1 gen() 10524 MB/s Nov 1 00:21:47.856363 kernel: raid6: neonx1 xor() 8797 MB/s Nov 1 00:21:47.878361 kernel: raid6: int64x8 gen() 6268 MB/s Nov 1 00:21:47.899359 kernel: raid6: int64x8 xor() 3544 MB/s Nov 1 00:21:47.920364 kernel: raid6: int64x4 gen() 7221 MB/s Nov 1 00:21:47.942360 kernel: raid6: int64x4 xor() 3858 MB/s Nov 1 00:21:47.962359 kernel: raid6: int64x2 gen() 6155 MB/s Nov 1 00:21:47.983363 kernel: raid6: int64x2 xor() 3321 MB/s Nov 1 00:21:48.005360 kernel: raid6: int64x1 gen() 5044 MB/s Nov 1 00:21:48.030404 kernel: raid6: int64x1 xor() 2648 MB/s Nov 1 00:21:48.030418 kernel: raid6: using algorithm neonx8 gen() 13751 MB/s Nov 1 00:21:48.030427 kernel: raid6: .... xor() 10827 MB/s, rmw enabled Nov 1 00:21:48.036012 kernel: raid6: using neon recovery algorithm Nov 1 00:21:48.058028 kernel: xor: measuring software checksum speed Nov 1 00:21:48.058053 kernel: 8regs : 17181 MB/sec Nov 1 00:21:48.062086 kernel: 32regs : 20603 MB/sec Nov 1 00:21:48.066224 kernel: arm64_neon : 27804 MB/sec Nov 1 00:21:48.066243 kernel: xor: using function: arm64_neon (27804 MB/sec) Nov 1 00:21:48.128369 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Nov 1 00:21:48.139107 systemd[1]: Finished dracut-pre-udev.service. Nov 1 00:21:48.143000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:21:48.147000 audit: BPF prog-id=7 op=LOAD Nov 1 00:21:48.147000 audit: BPF prog-id=8 op=LOAD Nov 1 00:21:48.148819 systemd[1]: Starting systemd-udevd.service... Nov 1 00:21:48.167119 systemd-udevd[476]: Using default interface naming scheme 'v252'. Nov 1 00:21:48.173662 systemd[1]: Started systemd-udevd.service. Nov 1 00:21:48.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:21:48.187246 systemd[1]: Starting dracut-pre-trigger.service... Nov 1 00:21:48.202407 dracut-pre-trigger[497]: rd.md=0: removing MD RAID activation Nov 1 00:21:48.237705 systemd[1]: Finished dracut-pre-trigger.service. Nov 1 00:21:48.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:21:48.245293 systemd[1]: Starting systemd-udev-trigger.service... Nov 1 00:21:48.281407 systemd[1]: Finished systemd-udev-trigger.service. Nov 1 00:21:48.291000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:21:48.329371 kernel: hv_vmbus: Vmbus version:5.3 Nov 1 00:21:48.346387 kernel: hv_vmbus: registering driver hv_netvsc Nov 1 00:21:48.346457 kernel: hv_vmbus: registering driver hid_hyperv Nov 1 00:21:48.366600 kernel: hv_vmbus: registering driver hyperv_keyboard Nov 1 00:21:48.366653 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/MSFT1000:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Nov 1 00:21:48.366665 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Nov 1 00:21:48.385000 kernel: hid-generic 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Nov 1 00:21:48.392373 kernel: hv_vmbus: registering driver hv_storvsc Nov 1 00:21:48.397368 kernel: scsi host1: storvsc_host_t Nov 1 00:21:48.397549 kernel: scsi host0: storvsc_host_t Nov 1 00:21:48.408298 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Nov 1 00:21:48.415975 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Nov 1 00:21:48.437366 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Nov 1 00:21:48.438322 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Nov 1 00:21:48.438340 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Nov 1 00:21:48.454959 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Nov 1 00:21:48.481809 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Nov 1 00:21:48.481960 kernel: sd 0:0:0:0: [sda] Write Protect is off Nov 1 00:21:48.482057 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Nov 1 00:21:48.482150 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Nov 1 00:21:48.482229 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Nov 1 00:21:48.482245 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Nov 1 00:21:48.514372 kernel: hv_netvsc 0022487a-74fd-0022-487a-74fd0022487a eth0: VF slot 1 added Nov 1 00:21:48.522380 kernel: hv_vmbus: registering driver hv_pci Nov 1 00:21:48.531397 kernel: hv_pci 1a7bcf5a-1c63-4963-bce1-35e6fc6e79f9: PCI VMBus probing: Using version 0x10004 Nov 1 00:21:48.818410 kernel: hv_pci 1a7bcf5a-1c63-4963-bce1-35e6fc6e79f9: PCI host bridge to bus 1c63:00 Nov 1 00:21:48.818518 kernel: pci_bus 1c63:00: root bus resource [mem 0xfc0000000-0xfc00fffff window] Nov 1 00:21:48.818614 kernel: pci_bus 1c63:00: No busn resource found for root bus, will use [bus 00-ff] Nov 1 00:21:48.818685 kernel: pci 1c63:00:02.0: [15b3:1018] type 00 class 0x020000 Nov 1 00:21:48.818777 kernel: pci 1c63:00:02.0: reg 0x10: [mem 0xfc0000000-0xfc00fffff 64bit pref] Nov 1 00:21:48.818854 kernel: pci 1c63:00:02.0: enabling Extended Tags Nov 1 00:21:48.818930 kernel: pci 1c63:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 1c63:00:02.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) Nov 1 00:21:48.819007 kernel: pci_bus 1c63:00: busn_res: [bus 00-ff] end is updated to 00 Nov 1 00:21:48.819078 kernel: pci 1c63:00:02.0: BAR 0: assigned [mem 0xfc0000000-0xfc00fffff 64bit pref] Nov 1 00:21:48.857786 kernel: mlx5_core 1c63:00:02.0: enabling device (0000 -> 0002) Nov 1 00:21:49.172060 kernel: mlx5_core 1c63:00:02.0: firmware version: 16.31.2424 Nov 1 00:21:49.172182 kernel: mlx5_core 1c63:00:02.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0) Nov 1 00:21:49.172264 kernel: hv_netvsc 0022487a-74fd-0022-487a-74fd0022487a eth0: VF registering: eth1 Nov 1 00:21:49.172345 kernel: mlx5_core 1c63:00:02.0 eth1: joined to eth0 Nov 1 00:21:49.180371 kernel: mlx5_core 1c63:00:02.0 enP7267s1: renamed from eth1 Nov 1 00:21:49.477380 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/sda6 scanned by (udev-worker) (529) Nov 1 00:21:49.478243 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Nov 1 00:21:49.496454 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Nov 1 00:21:49.900052 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Nov 1 00:21:50.095633 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Nov 1 00:21:50.101935 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Nov 1 00:21:50.117428 systemd[1]: Starting disk-uuid.service... Nov 1 00:21:50.144960 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Nov 1 00:21:51.162115 disk-uuid[603]: The operation has completed successfully. Nov 1 00:21:51.167878 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Nov 1 00:21:51.228671 systemd[1]: disk-uuid.service: Deactivated successfully. Nov 1 00:21:51.280469 kernel: kauditd_printk_skb: 7 callbacks suppressed Nov 1 00:21:51.280504 kernel: audit: type=1130 audit(1761956511.233:18): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:21:51.280520 kernel: audit: type=1131 audit(1761956511.233:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:21:51.233000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:21:51.233000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:21:51.228772 systemd[1]: Finished disk-uuid.service. Nov 1 00:21:51.241946 systemd[1]: Starting verity-setup.service... Nov 1 00:21:51.338024 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Nov 1 00:21:52.221789 systemd[1]: Found device dev-mapper-usr.device. Nov 1 00:21:52.228228 systemd[1]: Mounting sysusr-usr.mount... Nov 1 00:21:52.238770 systemd[1]: Finished verity-setup.service. Nov 1 00:21:52.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:21:52.266397 kernel: audit: type=1130 audit(1761956512.244:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:21:52.322369 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Nov 1 00:21:52.323058 systemd[1]: Mounted sysusr-usr.mount. Nov 1 00:21:52.331397 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Nov 1 00:21:52.332269 systemd[1]: Starting ignition-setup.service... Nov 1 00:21:52.348020 systemd[1]: Starting parse-ip-for-networkd.service... Nov 1 00:21:52.374564 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Nov 1 00:21:52.374625 kernel: BTRFS info (device sda6): using free space tree Nov 1 00:21:52.379526 kernel: BTRFS info (device sda6): has skinny extents Nov 1 00:21:52.433105 systemd[1]: Finished parse-ip-for-networkd.service. Nov 1 00:21:52.471444 kernel: audit: type=1130 audit(1761956512.438:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:21:52.471468 kernel: audit: type=1334 audit(1761956512.442:22): prog-id=9 op=LOAD Nov 1 00:21:52.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:21:52.442000 audit: BPF prog-id=9 op=LOAD Nov 1 00:21:52.443635 systemd[1]: Starting systemd-networkd.service... Nov 1 00:21:52.494029 systemd-networkd[867]: lo: Link UP Nov 1 00:21:52.495374 systemd-networkd[867]: lo: Gained carrier Nov 1 00:21:52.502000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:21:52.496190 systemd-networkd[867]: Enumeration completed Nov 1 00:21:52.531978 kernel: audit: type=1130 audit(1761956512.502:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:21:52.496285 systemd[1]: Started systemd-networkd.service. Nov 1 00:21:52.503167 systemd[1]: Reached target network.target. Nov 1 00:21:52.507905 systemd-networkd[867]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Nov 1 00:21:52.576717 kernel: audit: type=1130 audit(1761956512.547:24): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:21:52.547000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:21:52.528043 systemd[1]: Starting iscsiuio.service... Nov 1 00:21:52.581107 iscsid[872]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Nov 1 00:21:52.581107 iscsid[872]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Nov 1 00:21:52.581107 iscsid[872]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Nov 1 00:21:52.581107 iscsid[872]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Nov 1 00:21:52.581107 iscsid[872]: If using hardware iscsi like qla4xxx this message can be ignored. Nov 1 00:21:52.581107 iscsid[872]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Nov 1 00:21:52.581107 iscsid[872]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Nov 1 00:21:52.712849 kernel: audit: type=1130 audit(1761956512.576:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:21:52.712874 kernel: audit: type=1130 audit(1761956512.613:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:21:52.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:21:52.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:21:52.539888 systemd[1]: Started iscsiuio.service. Nov 1 00:21:52.549043 systemd[1]: Starting iscsid.service... Nov 1 00:21:52.573096 systemd[1]: Started iscsid.service. Nov 1 00:21:52.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:21:52.578026 systemd[1]: Starting dracut-initqueue.service... Nov 1 00:21:52.752893 kernel: audit: type=1130 audit(1761956512.726:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:21:52.605190 systemd[1]: Finished dracut-initqueue.service. Nov 1 00:21:52.614450 systemd[1]: Reached target remote-fs-pre.target. Nov 1 00:21:52.654281 systemd[1]: Reached target remote-cryptsetup.target. Nov 1 00:21:52.674027 systemd[1]: Reached target remote-fs.target. Nov 1 00:21:52.684908 systemd[1]: Starting dracut-pre-mount.service... Nov 1 00:21:52.717524 systemd[1]: Finished dracut-pre-mount.service. Nov 1 00:21:52.785367 kernel: mlx5_core 1c63:00:02.0 enP7267s1: Link up Nov 1 00:21:52.791365 kernel: buffer_size[0]=0 is not enough for lossless buffer Nov 1 00:21:52.879503 kernel: hv_netvsc 0022487a-74fd-0022-487a-74fd0022487a eth0: Data path switched to VF: enP7267s1 Nov 1 00:21:52.879698 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Nov 1 00:21:52.880668 systemd-networkd[867]: enP7267s1: Link UP Nov 1 00:21:52.880866 systemd-networkd[867]: eth0: Link UP Nov 1 00:21:52.881300 systemd-networkd[867]: eth0: Gained carrier Nov 1 00:21:52.886700 systemd[1]: mnt-oem.mount: Deactivated successfully. Nov 1 00:21:52.895494 systemd-networkd[867]: enP7267s1: Gained carrier Nov 1 00:21:52.908426 systemd-networkd[867]: eth0: DHCPv4 address 10.200.20.12/24, gateway 10.200.20.1 acquired from 168.63.129.16 Nov 1 00:21:53.495143 systemd[1]: Finished ignition-setup.service. Nov 1 00:21:53.499000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:21:53.500936 systemd[1]: Starting ignition-fetch-offline.service... Nov 1 00:21:54.814478 systemd-networkd[867]: eth0: Gained IPv6LL Nov 1 00:21:59.432037 kernel: mlx5_core 1c63:00:02.0: poll_health:739:(pid 0): device's health compromised - reached miss count Nov 1 00:22:01.105007 ignition[894]: Ignition 2.14.0 Nov 1 00:22:01.105019 ignition[894]: Stage: fetch-offline Nov 1 00:22:01.105110 ignition[894]: reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 00:22:01.105133 ignition[894]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Nov 1 00:22:01.322596 ignition[894]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Nov 1 00:22:01.322767 ignition[894]: parsed url from cmdline: "" Nov 1 00:22:01.330781 systemd[1]: Finished ignition-fetch-offline.service. Nov 1 00:22:01.336000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:01.322771 ignition[894]: no config URL provided Nov 1 00:22:01.371915 kernel: kauditd_printk_skb: 1 callbacks suppressed Nov 1 00:22:01.371945 kernel: audit: type=1130 audit(1761956521.336:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:01.347111 systemd[1]: Starting ignition-fetch.service... Nov 1 00:22:01.322776 ignition[894]: reading system config file "/usr/lib/ignition/user.ign" Nov 1 00:22:01.322785 ignition[894]: no config at "/usr/lib/ignition/user.ign" Nov 1 00:22:01.322790 ignition[894]: failed to fetch config: resource requires networking Nov 1 00:22:01.323034 ignition[894]: Ignition finished successfully Nov 1 00:22:01.354755 ignition[900]: Ignition 2.14.0 Nov 1 00:22:01.354761 ignition[900]: Stage: fetch Nov 1 00:22:01.354874 ignition[900]: reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 00:22:01.354895 ignition[900]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Nov 1 00:22:01.357691 ignition[900]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Nov 1 00:22:01.357818 ignition[900]: parsed url from cmdline: "" Nov 1 00:22:01.357821 ignition[900]: no config URL provided Nov 1 00:22:01.357826 ignition[900]: reading system config file "/usr/lib/ignition/user.ign" Nov 1 00:22:01.357838 ignition[900]: no config at "/usr/lib/ignition/user.ign" Nov 1 00:22:01.357868 ignition[900]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Nov 1 00:22:01.537836 ignition[900]: GET result: OK Nov 1 00:22:01.537891 ignition[900]: config has been read from IMDS userdata Nov 1 00:22:01.540470 unknown[900]: fetched base config from "system" Nov 1 00:22:01.551000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:01.537909 ignition[900]: parsing config with SHA512: 2e3bde6147b7bfb3ee6cf262f8558440d11f8da128657d60b75ed9c7d97e3c975a426a97cef6caff6cf9550f8665f8a9a3d0bcd9538162d2b1cb1f4e5d5a64cd Nov 1 00:22:01.540478 unknown[900]: fetched base config from "system" Nov 1 00:22:01.584252 kernel: audit: type=1130 audit(1761956521.551:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:01.540852 ignition[900]: fetch: fetch complete Nov 1 00:22:01.540487 unknown[900]: fetched user config from "azure" Nov 1 00:22:01.540858 ignition[900]: fetch: fetch passed Nov 1 00:22:01.597000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:01.545688 systemd[1]: Finished ignition-fetch.service. Nov 1 00:22:01.627679 kernel: audit: type=1130 audit(1761956521.597:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:01.540907 ignition[900]: Ignition finished successfully Nov 1 00:22:01.656471 kernel: audit: type=1130 audit(1761956521.637:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:01.637000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:01.553339 systemd[1]: Starting ignition-kargs.service... Nov 1 00:22:01.586696 ignition[906]: Ignition 2.14.0 Nov 1 00:22:01.593453 systemd[1]: Finished ignition-kargs.service. Nov 1 00:22:01.586702 ignition[906]: Stage: kargs Nov 1 00:22:01.617380 systemd[1]: Starting ignition-disks.service... Nov 1 00:22:01.586824 ignition[906]: reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 00:22:01.632334 systemd[1]: Finished ignition-disks.service. Nov 1 00:22:01.586846 ignition[906]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Nov 1 00:22:01.637482 systemd[1]: Reached target initrd-root-device.target. Nov 1 00:22:01.590079 ignition[906]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Nov 1 00:22:01.661407 systemd[1]: Reached target local-fs-pre.target. Nov 1 00:22:01.591918 ignition[906]: kargs: kargs passed Nov 1 00:22:01.671921 systemd[1]: Reached target local-fs.target. Nov 1 00:22:01.591981 ignition[906]: Ignition finished successfully Nov 1 00:22:01.680198 systemd[1]: Reached target sysinit.target. Nov 1 00:22:01.624435 ignition[912]: Ignition 2.14.0 Nov 1 00:22:01.691160 systemd[1]: Reached target basic.target. Nov 1 00:22:01.624442 ignition[912]: Stage: disks Nov 1 00:22:01.702381 systemd[1]: Starting systemd-fsck-root.service... Nov 1 00:22:01.624567 ignition[912]: reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 00:22:01.624587 ignition[912]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Nov 1 00:22:01.627810 ignition[912]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Nov 1 00:22:01.629638 ignition[912]: disks: disks passed Nov 1 00:22:01.629699 ignition[912]: Ignition finished successfully Nov 1 00:22:01.849423 systemd-fsck[920]: ROOT: clean, 637/7326000 files, 481087/7359488 blocks Nov 1 00:22:01.856770 systemd[1]: Finished systemd-fsck-root.service. Nov 1 00:22:01.886631 kernel: audit: type=1130 audit(1761956521.861:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:01.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:01.863001 systemd[1]: Mounting sysroot.mount... Nov 1 00:22:01.931418 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Nov 1 00:22:01.931899 systemd[1]: Mounted sysroot.mount. Nov 1 00:22:01.936932 systemd[1]: Reached target initrd-root-fs.target. Nov 1 00:22:02.037497 systemd[1]: Mounting sysroot-usr.mount... Nov 1 00:22:02.042959 systemd[1]: Starting flatcar-metadata-hostname.service... Nov 1 00:22:02.057389 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Nov 1 00:22:02.057439 systemd[1]: Reached target ignition-diskful.target. Nov 1 00:22:02.075007 systemd[1]: Mounted sysroot-usr.mount. Nov 1 00:22:02.197570 systemd[1]: Mounting sysroot-usr-share-oem.mount... Nov 1 00:22:02.203316 systemd[1]: Starting initrd-setup-root.service... Nov 1 00:22:02.239373 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/sda6 scanned by mount (931) Nov 1 00:22:02.252766 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Nov 1 00:22:02.252810 kernel: BTRFS info (device sda6): using free space tree Nov 1 00:22:02.258101 kernel: BTRFS info (device sda6): has skinny extents Nov 1 00:22:02.258300 initrd-setup-root[936]: cut: /sysroot/etc/passwd: No such file or directory Nov 1 00:22:02.272269 systemd[1]: Mounted sysroot-usr-share-oem.mount. Nov 1 00:22:02.339914 initrd-setup-root[962]: cut: /sysroot/etc/group: No such file or directory Nov 1 00:22:02.387330 initrd-setup-root[970]: cut: /sysroot/etc/shadow: No such file or directory Nov 1 00:22:02.431500 initrd-setup-root[978]: cut: /sysroot/etc/gshadow: No such file or directory Nov 1 00:22:04.120918 systemd[1]: Finished initrd-setup-root.service. Nov 1 00:22:04.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:04.147805 systemd[1]: Starting ignition-mount.service... Nov 1 00:22:04.160523 kernel: audit: type=1130 audit(1761956524.125:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:04.157976 systemd[1]: Starting sysroot-boot.service... Nov 1 00:22:04.165444 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Nov 1 00:22:04.165584 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Nov 1 00:22:04.184091 ignition[997]: INFO : Ignition 2.14.0 Nov 1 00:22:04.184091 ignition[997]: INFO : Stage: mount Nov 1 00:22:04.184091 ignition[997]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 00:22:04.184091 ignition[997]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Nov 1 00:22:04.184091 ignition[997]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Nov 1 00:22:04.249130 kernel: audit: type=1130 audit(1761956524.196:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:04.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:04.189459 systemd[1]: Finished ignition-mount.service. Nov 1 00:22:04.253758 ignition[997]: INFO : mount: mount passed Nov 1 00:22:04.253758 ignition[997]: INFO : Ignition finished successfully Nov 1 00:22:04.278228 systemd[1]: Finished sysroot-boot.service. Nov 1 00:22:04.282000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:04.305399 kernel: audit: type=1130 audit(1761956524.282:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:05.509784 coreos-metadata[930]: Nov 01 00:22:05.509 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Nov 1 00:22:05.518632 coreos-metadata[930]: Nov 01 00:22:05.512 INFO Fetch successful Nov 1 00:22:05.551258 coreos-metadata[930]: Nov 01 00:22:05.551 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Nov 1 00:22:05.563619 coreos-metadata[930]: Nov 01 00:22:05.561 INFO Fetch successful Nov 1 00:22:05.605772 coreos-metadata[930]: Nov 01 00:22:05.605 INFO wrote hostname ci-3510.3.8-n-bde7a9edbb to /sysroot/etc/hostname Nov 1 00:22:05.614391 systemd[1]: Finished flatcar-metadata-hostname.service. Nov 1 00:22:05.619000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:05.620961 systemd[1]: Starting ignition-files.service... Nov 1 00:22:05.649620 kernel: audit: type=1130 audit(1761956525.619:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:05.648613 systemd[1]: Mounting sysroot-usr-share-oem.mount... Nov 1 00:22:05.672372 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by mount (1009) Nov 1 00:22:05.686853 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Nov 1 00:22:05.686894 kernel: BTRFS info (device sda6): using free space tree Nov 1 00:22:05.691644 kernel: BTRFS info (device sda6): has skinny extents Nov 1 00:22:05.698790 systemd[1]: Mounted sysroot-usr-share-oem.mount. Nov 1 00:22:05.715167 ignition[1028]: INFO : Ignition 2.14.0 Nov 1 00:22:05.715167 ignition[1028]: INFO : Stage: files Nov 1 00:22:05.726768 ignition[1028]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 00:22:05.726768 ignition[1028]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Nov 1 00:22:05.726768 ignition[1028]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Nov 1 00:22:05.726768 ignition[1028]: DEBUG : files: compiled without relabeling support, skipping Nov 1 00:22:05.768376 ignition[1028]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Nov 1 00:22:05.768376 ignition[1028]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Nov 1 00:22:06.052232 ignition[1028]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Nov 1 00:22:06.061511 ignition[1028]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Nov 1 00:22:06.149283 unknown[1028]: wrote ssh authorized keys file for user: core Nov 1 00:22:06.155902 ignition[1028]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Nov 1 00:22:06.186118 ignition[1028]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Nov 1 00:22:06.197390 ignition[1028]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Nov 1 00:22:06.219765 ignition[1028]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Nov 1 00:22:06.231810 ignition[1028]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Nov 1 00:22:06.231810 ignition[1028]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-arm64.raw" Nov 1 00:22:06.231810 ignition[1028]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-arm64.raw" Nov 1 00:22:06.274024 ignition[1028]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Nov 1 00:22:06.274024 ignition[1028]: INFO : files: createFilesystemsFiles: createFiles: op(6): oem config not found in "/usr/share/oem", looking on oem partition Nov 1 00:22:06.274024 ignition[1028]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1131225451" Nov 1 00:22:06.274024 ignition[1028]: CRITICAL : files: createFilesystemsFiles: createFiles: op(6): op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1131225451": device or resource busy Nov 1 00:22:06.274024 ignition[1028]: ERROR : files: createFilesystemsFiles: createFiles: op(6): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1131225451", trying btrfs: device or resource busy Nov 1 00:22:06.274024 ignition[1028]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1131225451" Nov 1 00:22:06.274024 ignition[1028]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1131225451" Nov 1 00:22:06.358272 ignition[1028]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [started] unmounting "/mnt/oem1131225451" Nov 1 00:22:06.358272 ignition[1028]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [finished] unmounting "/mnt/oem1131225451" Nov 1 00:22:06.358272 ignition[1028]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Nov 1 00:22:06.358272 ignition[1028]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Nov 1 00:22:06.358272 ignition[1028]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Nov 1 00:22:06.358272 ignition[1028]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4027781326" Nov 1 00:22:06.358272 ignition[1028]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4027781326": device or resource busy Nov 1 00:22:06.358272 ignition[1028]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem4027781326", trying btrfs: device or resource busy Nov 1 00:22:06.358272 ignition[1028]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4027781326" Nov 1 00:22:06.358272 ignition[1028]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4027781326" Nov 1 00:22:06.358272 ignition[1028]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem4027781326" Nov 1 00:22:06.358272 ignition[1028]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem4027781326" Nov 1 00:22:06.358272 ignition[1028]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Nov 1 00:22:06.358272 ignition[1028]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-arm64.raw" Nov 1 00:22:06.358272 ignition[1028]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET https://extensions.flatcar.org/extensions/kubernetes-v1.32.4-arm64.raw: attempt #1 Nov 1 00:22:06.286483 systemd[1]: mnt-oem1131225451.mount: Deactivated successfully. Nov 1 00:22:06.929954 ignition[1028]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET result: OK Nov 1 00:22:07.163485 ignition[1028]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-arm64.raw" Nov 1 00:22:07.178371 ignition[1028]: INFO : files: op(f): [started] processing unit "waagent.service" Nov 1 00:22:07.178371 ignition[1028]: INFO : files: op(f): [finished] processing unit "waagent.service" Nov 1 00:22:07.178371 ignition[1028]: INFO : files: op(10): [started] processing unit "nvidia.service" Nov 1 00:22:07.178371 ignition[1028]: INFO : files: op(10): [finished] processing unit "nvidia.service" Nov 1 00:22:07.178371 ignition[1028]: INFO : files: op(11): [started] setting preset to enabled for "waagent.service" Nov 1 00:22:07.178371 ignition[1028]: INFO : files: op(11): [finished] setting preset to enabled for "waagent.service" Nov 1 00:22:07.178371 ignition[1028]: INFO : files: op(12): [started] setting preset to enabled for "nvidia.service" Nov 1 00:22:07.178371 ignition[1028]: INFO : files: op(12): [finished] setting preset to enabled for "nvidia.service" Nov 1 00:22:07.178371 ignition[1028]: INFO : files: createResultFile: createFiles: op(13): [started] writing file "/sysroot/etc/.ignition-result.json" Nov 1 00:22:07.178371 ignition[1028]: INFO : files: createResultFile: createFiles: op(13): [finished] writing file "/sysroot/etc/.ignition-result.json" Nov 1 00:22:07.178371 ignition[1028]: INFO : files: files passed Nov 1 00:22:07.178371 ignition[1028]: INFO : Ignition finished successfully Nov 1 00:22:07.381395 kernel: audit: type=1130 audit(1761956527.182:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:07.381424 kernel: audit: type=1130 audit(1761956527.262:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:07.381441 kernel: audit: type=1131 audit(1761956527.262:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:07.381451 kernel: audit: type=1130 audit(1761956527.321:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:07.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:07.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:07.262000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:07.321000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:07.178178 systemd[1]: Finished ignition-files.service. Nov 1 00:22:07.210535 systemd[1]: Starting initrd-setup-root-after-ignition.service... Nov 1 00:22:07.390000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:07.231549 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Nov 1 00:22:07.413000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:07.424603 initrd-setup-root-after-ignition[1053]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Nov 1 00:22:07.455402 kernel: audit: type=1130 audit(1761956527.390:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:07.455426 kernel: audit: type=1131 audit(1761956527.413:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:07.238278 systemd[1]: Starting ignition-quench.service... Nov 1 00:22:07.251302 systemd[1]: ignition-quench.service: Deactivated successfully. Nov 1 00:22:07.251440 systemd[1]: Finished ignition-quench.service. Nov 1 00:22:07.315451 systemd[1]: Finished initrd-setup-root-after-ignition.service. Nov 1 00:22:07.322144 systemd[1]: Reached target ignition-complete.target. Nov 1 00:22:07.355596 systemd[1]: Starting initrd-parse-etc.service... Nov 1 00:22:07.382621 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Nov 1 00:22:07.523356 kernel: audit: type=1130 audit(1761956527.500:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:07.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:07.382736 systemd[1]: Finished initrd-parse-etc.service. Nov 1 00:22:07.413882 systemd[1]: Reached target initrd-fs.target. Nov 1 00:22:07.446898 systemd[1]: Reached target initrd.target. Nov 1 00:22:07.459677 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Nov 1 00:22:07.463806 systemd[1]: Starting dracut-pre-pivot.service... Nov 1 00:22:07.495869 systemd[1]: Finished dracut-pre-pivot.service. Nov 1 00:22:07.522565 systemd[1]: Starting initrd-cleanup.service... Nov 1 00:22:07.578000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:07.540214 systemd[1]: Stopped target nss-lookup.target. Nov 1 00:22:07.548384 systemd[1]: Stopped target remote-cryptsetup.target. Nov 1 00:22:07.560639 systemd[1]: Stopped target timers.target. Nov 1 00:22:07.621740 kernel: audit: type=1131 audit(1761956527.578:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:07.569426 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Nov 1 00:22:07.569498 systemd[1]: Stopped dracut-pre-pivot.service. Nov 1 00:22:07.600797 systemd[1]: Stopped target initrd.target. Nov 1 00:22:07.609166 systemd[1]: Stopped target basic.target. Nov 1 00:22:07.617857 systemd[1]: Stopped target ignition-complete.target. Nov 1 00:22:07.626647 systemd[1]: Stopped target ignition-diskful.target. Nov 1 00:22:07.637193 systemd[1]: Stopped target initrd-root-device.target. Nov 1 00:22:07.646140 systemd[1]: Stopped target remote-fs.target. Nov 1 00:22:07.655187 systemd[1]: Stopped target remote-fs-pre.target. Nov 1 00:22:07.663944 systemd[1]: Stopped target sysinit.target. Nov 1 00:22:07.709000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:07.673063 systemd[1]: Stopped target local-fs.target. Nov 1 00:22:07.681637 systemd[1]: Stopped target local-fs-pre.target. Nov 1 00:22:07.692164 systemd[1]: Stopped target swap.target. Nov 1 00:22:07.749000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:07.700551 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Nov 1 00:22:07.776585 kernel: audit: type=1131 audit(1761956527.709:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:07.776615 kernel: audit: type=1131 audit(1761956527.749:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:07.700637 systemd[1]: Stopped dracut-pre-mount.service. Nov 1 00:22:07.781000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:07.731277 systemd[1]: Stopped target cryptsetup.target. Nov 1 00:22:07.790000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:07.740129 systemd[1]: dracut-initqueue.service: Deactivated successfully. Nov 1 00:22:07.799000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:07.740195 systemd[1]: Stopped dracut-initqueue.service. Nov 1 00:22:07.771028 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Nov 1 00:22:07.771085 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Nov 1 00:22:07.833329 iscsid[872]: iscsid shutting down. Nov 1 00:22:07.846343 ignition[1066]: INFO : Ignition 2.14.0 Nov 1 00:22:07.846343 ignition[1066]: INFO : Stage: umount Nov 1 00:22:07.846343 ignition[1066]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 00:22:07.846343 ignition[1066]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Nov 1 00:22:07.846343 ignition[1066]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Nov 1 00:22:07.846343 ignition[1066]: INFO : umount: umount passed Nov 1 00:22:07.846343 ignition[1066]: INFO : Ignition finished successfully Nov 1 00:22:07.855000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:07.864000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:07.875000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:07.903000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:07.903000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:07.913000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:07.782034 systemd[1]: ignition-files.service: Deactivated successfully. Nov 1 00:22:07.924000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:07.782077 systemd[1]: Stopped ignition-files.service. Nov 1 00:22:07.935000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:07.790328 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Nov 1 00:22:07.946000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:07.790380 systemd[1]: Stopped flatcar-metadata-hostname.service. Nov 1 00:22:07.957000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:07.804337 systemd[1]: Stopping ignition-mount.service... Nov 1 00:22:07.816249 systemd[1]: Stopping iscsid.service... Nov 1 00:22:07.820557 systemd[1]: Stopping sysroot-boot.service... Nov 1 00:22:07.842713 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Nov 1 00:22:07.842799 systemd[1]: Stopped systemd-udev-trigger.service. Nov 1 00:22:07.856253 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Nov 1 00:22:07.856322 systemd[1]: Stopped dracut-pre-trigger.service. Nov 1 00:22:07.865313 systemd[1]: iscsid.service: Deactivated successfully. Nov 1 00:22:08.027000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:07.865456 systemd[1]: Stopped iscsid.service. Nov 1 00:22:07.876481 systemd[1]: initrd-cleanup.service: Deactivated successfully. Nov 1 00:22:08.046000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:07.876591 systemd[1]: Finished initrd-cleanup.service. Nov 1 00:22:07.905515 systemd[1]: sysroot-boot.mount: Deactivated successfully. Nov 1 00:22:07.905951 systemd[1]: ignition-mount.service: Deactivated successfully. Nov 1 00:22:07.906039 systemd[1]: Stopped ignition-mount.service. Nov 1 00:22:07.913586 systemd[1]: ignition-disks.service: Deactivated successfully. Nov 1 00:22:08.094000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:07.913644 systemd[1]: Stopped ignition-disks.service. Nov 1 00:22:08.104000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:07.924449 systemd[1]: ignition-kargs.service: Deactivated successfully. Nov 1 00:22:08.109000 audit: BPF prog-id=6 op=UNLOAD Nov 1 00:22:07.924495 systemd[1]: Stopped ignition-kargs.service. Nov 1 00:22:08.129000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:07.936060 systemd[1]: ignition-fetch.service: Deactivated successfully. Nov 1 00:22:08.138000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:07.936101 systemd[1]: Stopped ignition-fetch.service. Nov 1 00:22:08.149000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:07.946623 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Nov 1 00:22:07.946680 systemd[1]: Stopped ignition-fetch-offline.service. Nov 1 00:22:07.958413 systemd[1]: Stopped target paths.target. Nov 1 00:22:07.967668 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Nov 1 00:22:07.976253 systemd[1]: Stopped systemd-ask-password-console.path. Nov 1 00:22:08.189000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:07.983011 systemd[1]: Stopped target slices.target. Nov 1 00:22:08.198000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:08.000525 systemd[1]: Stopped target sockets.target. Nov 1 00:22:08.009273 systemd[1]: iscsid.socket: Deactivated successfully. Nov 1 00:22:08.009323 systemd[1]: Closed iscsid.socket. Nov 1 00:22:08.226000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:08.019244 systemd[1]: ignition-setup.service: Deactivated successfully. Nov 1 00:22:08.234000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:08.019292 systemd[1]: Stopped ignition-setup.service. Nov 1 00:22:08.244000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:08.028683 systemd[1]: Stopping iscsiuio.service... Nov 1 00:22:08.268013 kernel: hv_netvsc 0022487a-74fd-0022-487a-74fd0022487a eth0: Data path switched from VF: enP7267s1 Nov 1 00:22:08.263000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:08.039566 systemd[1]: iscsiuio.service: Deactivated successfully. Nov 1 00:22:08.039662 systemd[1]: Stopped iscsiuio.service. Nov 1 00:22:08.047096 systemd[1]: Stopped target network.target. Nov 1 00:22:08.056567 systemd[1]: iscsiuio.socket: Deactivated successfully. Nov 1 00:22:08.291000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:08.056608 systemd[1]: Closed iscsiuio.socket. Nov 1 00:22:08.301000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:08.064670 systemd[1]: Stopping systemd-networkd.service... Nov 1 00:22:08.310000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:08.073734 systemd[1]: Stopping systemd-resolved.service... Nov 1 00:22:08.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:08.320000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:08.079343 systemd-networkd[867]: eth0: DHCPv6 lease lost Nov 1 00:22:08.324000 audit: BPF prog-id=9 op=UNLOAD Nov 1 00:22:08.085266 systemd[1]: systemd-networkd.service: Deactivated successfully. Nov 1 00:22:08.333000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:08.085403 systemd[1]: Stopped systemd-networkd.service. Nov 1 00:22:08.095812 systemd[1]: systemd-resolved.service: Deactivated successfully. Nov 1 00:22:08.095931 systemd[1]: Stopped systemd-resolved.service. Nov 1 00:22:08.105810 systemd[1]: systemd-networkd.socket: Deactivated successfully. Nov 1 00:22:08.105849 systemd[1]: Closed systemd-networkd.socket. Nov 1 00:22:08.115230 systemd[1]: Stopping network-cleanup.service... Nov 1 00:22:08.124241 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Nov 1 00:22:08.124312 systemd[1]: Stopped parse-ip-for-networkd.service. Nov 1 00:22:08.130020 systemd[1]: systemd-sysctl.service: Deactivated successfully. Nov 1 00:22:08.130087 systemd[1]: Stopped systemd-sysctl.service. Nov 1 00:22:08.144714 systemd[1]: systemd-modules-load.service: Deactivated successfully. Nov 1 00:22:08.144770 systemd[1]: Stopped systemd-modules-load.service. Nov 1 00:22:08.149991 systemd[1]: Stopping systemd-udevd.service... Nov 1 00:22:08.162857 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Nov 1 00:22:08.174614 systemd[1]: systemd-udevd.service: Deactivated successfully. Nov 1 00:22:08.174985 systemd[1]: Stopped systemd-udevd.service. Nov 1 00:22:08.189870 systemd[1]: sysroot-boot.service: Deactivated successfully. Nov 1 00:22:08.189976 systemd[1]: Stopped sysroot-boot.service. Nov 1 00:22:08.199663 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Nov 1 00:22:08.199706 systemd[1]: Closed systemd-udevd-control.socket. Nov 1 00:22:08.208580 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Nov 1 00:22:08.208609 systemd[1]: Closed systemd-udevd-kernel.socket. Nov 1 00:22:08.216947 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Nov 1 00:22:08.216997 systemd[1]: Stopped dracut-pre-udev.service. Nov 1 00:22:08.226446 systemd[1]: dracut-cmdline.service: Deactivated successfully. Nov 1 00:22:08.226488 systemd[1]: Stopped dracut-cmdline.service. Nov 1 00:22:08.235122 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Nov 1 00:22:08.235159 systemd[1]: Stopped dracut-cmdline-ask.service. Nov 1 00:22:08.245102 systemd[1]: initrd-setup-root.service: Deactivated successfully. Nov 1 00:22:08.245144 systemd[1]: Stopped initrd-setup-root.service. Nov 1 00:22:08.409365 systemd-journald[276]: Received SIGTERM from PID 1 (n/a). Nov 1 00:22:08.267496 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Nov 1 00:22:08.282599 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Nov 1 00:22:08.282688 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Nov 1 00:22:08.297271 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Nov 1 00:22:08.297390 systemd[1]: Stopped kmod-static-nodes.service. Nov 1 00:22:08.302267 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Nov 1 00:22:08.302324 systemd[1]: Stopped systemd-vconsole-setup.service. Nov 1 00:22:08.311849 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Nov 1 00:22:08.312428 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Nov 1 00:22:08.312523 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Nov 1 00:22:08.325252 systemd[1]: network-cleanup.service: Deactivated successfully. Nov 1 00:22:08.325415 systemd[1]: Stopped network-cleanup.service. Nov 1 00:22:08.334473 systemd[1]: Reached target initrd-switch-root.target. Nov 1 00:22:08.345209 systemd[1]: Starting initrd-switch-root.service... Nov 1 00:22:08.360453 systemd[1]: Switching root. Nov 1 00:22:08.409748 systemd-journald[276]: Journal stopped Nov 1 00:22:44.753223 kernel: SELinux: Class mctp_socket not defined in policy. Nov 1 00:22:44.753245 kernel: SELinux: Class anon_inode not defined in policy. Nov 1 00:22:44.753255 kernel: SELinux: the above unknown classes and permissions will be allowed Nov 1 00:22:44.753266 kernel: SELinux: policy capability network_peer_controls=1 Nov 1 00:22:44.753274 kernel: SELinux: policy capability open_perms=1 Nov 1 00:22:44.753282 kernel: SELinux: policy capability extended_socket_class=1 Nov 1 00:22:44.753291 kernel: SELinux: policy capability always_check_network=0 Nov 1 00:22:44.753299 kernel: SELinux: policy capability cgroup_seclabel=1 Nov 1 00:22:44.753307 kernel: SELinux: policy capability nnp_nosuid_transition=1 Nov 1 00:22:44.753315 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Nov 1 00:22:44.753323 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Nov 1 00:22:44.753333 kernel: kauditd_printk_skb: 34 callbacks suppressed Nov 1 00:22:44.753342 kernel: audit: type=1403 audit(1761956534.579:82): auid=4294967295 ses=4294967295 lsm=selinux res=1 Nov 1 00:22:44.753365 systemd[1]: Successfully loaded SELinux policy in 632.815ms. Nov 1 00:22:44.753378 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 56.275ms. Nov 1 00:22:44.753390 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Nov 1 00:22:44.753400 systemd[1]: Detected virtualization microsoft. Nov 1 00:22:44.753409 systemd[1]: Detected architecture arm64. Nov 1 00:22:44.753418 systemd[1]: Detected first boot. Nov 1 00:22:44.753428 systemd[1]: Hostname set to . Nov 1 00:22:44.753437 systemd[1]: Initializing machine ID from random generator. Nov 1 00:22:44.753446 kernel: audit: type=1400 audit(1761956536.733:83): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Nov 1 00:22:44.753458 kernel: audit: type=1400 audit(1761956536.733:84): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Nov 1 00:22:44.753467 kernel: audit: type=1334 audit(1761956536.753:85): prog-id=10 op=LOAD Nov 1 00:22:44.753476 kernel: audit: type=1334 audit(1761956536.753:86): prog-id=10 op=UNLOAD Nov 1 00:22:44.753485 kernel: audit: type=1334 audit(1761956536.772:87): prog-id=11 op=LOAD Nov 1 00:22:44.753494 kernel: audit: type=1334 audit(1761956536.772:88): prog-id=11 op=UNLOAD Nov 1 00:22:44.753503 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Nov 1 00:22:44.753513 kernel: audit: type=1400 audit(1761956540.078:89): avc: denied { associate } for pid=1099 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Nov 1 00:22:44.753525 kernel: audit: type=1300 audit(1761956540.078:89): arch=c00000b7 syscall=5 success=yes exit=0 a0=400014587c a1=40000c6de0 a2=40000cd0c0 a3=32 items=0 ppid=1082 pid=1099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:22:44.753534 kernel: audit: type=1327 audit(1761956540.078:89): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Nov 1 00:22:44.753544 kernel: audit: type=1400 audit(1761956540.088:90): avc: denied { associate } for pid=1099 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Nov 1 00:22:44.753554 kernel: audit: type=1300 audit(1761956540.088:90): arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145959 a2=1ed a3=0 items=2 ppid=1082 pid=1099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:22:44.753563 kernel: audit: type=1307 audit(1761956540.088:90): cwd="/" Nov 1 00:22:44.753572 kernel: audit: type=1302 audit(1761956540.088:90): item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:22:44.753582 kernel: audit: type=1302 audit(1761956540.088:90): item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:22:44.753592 kernel: audit: type=1327 audit(1761956540.088:90): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Nov 1 00:22:44.753601 systemd[1]: Populated /etc with preset unit settings. Nov 1 00:22:44.753611 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Nov 1 00:22:44.753620 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Nov 1 00:22:44.753633 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Nov 1 00:22:44.753643 kernel: audit: type=1334 audit(1761956563.663:91): prog-id=12 op=LOAD Nov 1 00:22:44.753653 kernel: audit: type=1334 audit(1761956563.663:92): prog-id=3 op=UNLOAD Nov 1 00:22:44.753662 kernel: audit: type=1334 audit(1761956563.671:93): prog-id=13 op=LOAD Nov 1 00:22:44.753671 kernel: audit: type=1334 audit(1761956563.677:94): prog-id=14 op=LOAD Nov 1 00:22:44.753680 kernel: audit: type=1334 audit(1761956563.677:95): prog-id=4 op=UNLOAD Nov 1 00:22:44.753688 kernel: audit: type=1334 audit(1761956563.677:96): prog-id=5 op=UNLOAD Nov 1 00:22:44.753697 systemd[1]: initrd-switch-root.service: Deactivated successfully. Nov 1 00:22:44.753707 kernel: audit: type=1334 audit(1761956563.683:97): prog-id=15 op=LOAD Nov 1 00:22:44.753716 systemd[1]: Stopped initrd-switch-root.service. Nov 1 00:22:44.753727 kernel: audit: type=1334 audit(1761956563.683:98): prog-id=12 op=UNLOAD Nov 1 00:22:44.753736 kernel: audit: type=1334 audit(1761956563.690:99): prog-id=16 op=LOAD Nov 1 00:22:44.753744 kernel: audit: type=1334 audit(1761956563.697:100): prog-id=17 op=LOAD Nov 1 00:22:44.753754 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Nov 1 00:22:44.753763 systemd[1]: Created slice system-addon\x2dconfig.slice. Nov 1 00:22:44.753773 systemd[1]: Created slice system-addon\x2drun.slice. Nov 1 00:22:44.753782 systemd[1]: Created slice system-getty.slice. Nov 1 00:22:44.753792 systemd[1]: Created slice system-modprobe.slice. Nov 1 00:22:44.753803 systemd[1]: Created slice system-serial\x2dgetty.slice. Nov 1 00:22:44.753812 systemd[1]: Created slice system-system\x2dcloudinit.slice. Nov 1 00:22:44.753822 systemd[1]: Created slice system-systemd\x2dfsck.slice. Nov 1 00:22:44.753831 systemd[1]: Created slice user.slice. Nov 1 00:22:44.753841 systemd[1]: Started systemd-ask-password-console.path. Nov 1 00:22:44.753850 systemd[1]: Started systemd-ask-password-wall.path. Nov 1 00:22:44.753860 systemd[1]: Set up automount boot.automount. Nov 1 00:22:44.753869 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Nov 1 00:22:44.753879 systemd[1]: Stopped target initrd-switch-root.target. Nov 1 00:22:44.753889 systemd[1]: Stopped target initrd-fs.target. Nov 1 00:22:44.753898 systemd[1]: Stopped target initrd-root-fs.target. Nov 1 00:22:44.753908 systemd[1]: Reached target integritysetup.target. Nov 1 00:22:44.753917 systemd[1]: Reached target remote-cryptsetup.target. Nov 1 00:22:44.753927 systemd[1]: Reached target remote-fs.target. Nov 1 00:22:44.753936 systemd[1]: Reached target slices.target. Nov 1 00:22:44.753945 systemd[1]: Reached target swap.target. Nov 1 00:22:44.753956 systemd[1]: Reached target torcx.target. Nov 1 00:22:44.753965 systemd[1]: Reached target veritysetup.target. Nov 1 00:22:44.753974 systemd[1]: Listening on systemd-coredump.socket. Nov 1 00:22:44.753984 systemd[1]: Listening on systemd-initctl.socket. Nov 1 00:22:44.753993 systemd[1]: Listening on systemd-networkd.socket. Nov 1 00:22:44.754003 systemd[1]: Listening on systemd-udevd-control.socket. Nov 1 00:22:44.754014 systemd[1]: Listening on systemd-udevd-kernel.socket. Nov 1 00:22:44.754024 systemd[1]: Listening on systemd-userdbd.socket. Nov 1 00:22:44.754034 systemd[1]: Mounting dev-hugepages.mount... Nov 1 00:22:44.754044 systemd[1]: Mounting dev-mqueue.mount... Nov 1 00:22:44.754053 systemd[1]: Mounting media.mount... Nov 1 00:22:44.754062 systemd[1]: Mounting sys-kernel-debug.mount... Nov 1 00:22:44.754072 systemd[1]: Mounting sys-kernel-tracing.mount... Nov 1 00:22:44.754082 systemd[1]: Mounting tmp.mount... Nov 1 00:22:44.754092 systemd[1]: Starting flatcar-tmpfiles.service... Nov 1 00:22:44.754102 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Nov 1 00:22:44.754111 systemd[1]: Starting kmod-static-nodes.service... Nov 1 00:22:44.754121 systemd[1]: Starting modprobe@configfs.service... Nov 1 00:22:44.754130 systemd[1]: Starting modprobe@dm_mod.service... Nov 1 00:22:44.754139 systemd[1]: Starting modprobe@drm.service... Nov 1 00:22:44.754149 systemd[1]: Starting modprobe@efi_pstore.service... Nov 1 00:22:44.754158 systemd[1]: Starting modprobe@fuse.service... Nov 1 00:22:44.754168 systemd[1]: Starting modprobe@loop.service... Nov 1 00:22:44.754179 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Nov 1 00:22:44.754189 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Nov 1 00:22:44.754199 systemd[1]: Stopped systemd-fsck-root.service. Nov 1 00:22:44.754209 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Nov 1 00:22:44.754218 systemd[1]: Stopped systemd-fsck-usr.service. Nov 1 00:22:44.754228 systemd[1]: Stopped systemd-journald.service. Nov 1 00:22:44.754238 systemd[1]: systemd-journald.service: Consumed 3.149s CPU time. Nov 1 00:22:44.754248 systemd[1]: Starting systemd-journald.service... Nov 1 00:22:44.754258 systemd[1]: Starting systemd-modules-load.service... Nov 1 00:22:44.754269 systemd[1]: Starting systemd-network-generator.service... Nov 1 00:22:44.754278 systemd[1]: Starting systemd-remount-fs.service... Nov 1 00:22:44.754288 systemd[1]: Starting systemd-udev-trigger.service... Nov 1 00:22:44.754299 systemd[1]: verity-setup.service: Deactivated successfully. Nov 1 00:22:44.754309 systemd[1]: Stopped verity-setup.service. Nov 1 00:22:44.754318 systemd[1]: Mounted dev-hugepages.mount. Nov 1 00:22:44.754328 systemd[1]: Mounted dev-mqueue.mount. Nov 1 00:22:44.754337 kernel: loop: module loaded Nov 1 00:22:44.754354 systemd[1]: Mounted media.mount. Nov 1 00:22:44.754368 systemd[1]: Mounted sys-kernel-debug.mount. Nov 1 00:22:44.754378 systemd[1]: Mounted sys-kernel-tracing.mount. Nov 1 00:22:44.754387 systemd[1]: Mounted tmp.mount. Nov 1 00:22:44.754402 kernel: fuse: init (API version 7.34) Nov 1 00:22:44.754414 systemd[1]: Finished flatcar-tmpfiles.service. Nov 1 00:22:44.754424 systemd[1]: Finished kmod-static-nodes.service. Nov 1 00:22:44.754434 systemd[1]: modprobe@configfs.service: Deactivated successfully. Nov 1 00:22:44.754444 systemd[1]: Finished modprobe@configfs.service. Nov 1 00:22:44.754455 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Nov 1 00:22:44.754465 systemd[1]: Finished modprobe@dm_mod.service. Nov 1 00:22:44.754479 systemd-journald[1177]: Journal started Nov 1 00:22:44.754524 systemd-journald[1177]: Runtime Journal (/run/log/journal/d8ed2bf546154465acb407bc31b5d49b) is 8.0M, max 78.5M, 70.5M free. Nov 1 00:22:14.579000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Nov 1 00:22:16.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Nov 1 00:22:16.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Nov 1 00:22:16.753000 audit: BPF prog-id=10 op=LOAD Nov 1 00:22:16.753000 audit: BPF prog-id=10 op=UNLOAD Nov 1 00:22:16.772000 audit: BPF prog-id=11 op=LOAD Nov 1 00:22:16.772000 audit: BPF prog-id=11 op=UNLOAD Nov 1 00:22:20.078000 audit[1099]: AVC avc: denied { associate } for pid=1099 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Nov 1 00:22:20.078000 audit[1099]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=400014587c a1=40000c6de0 a2=40000cd0c0 a3=32 items=0 ppid=1082 pid=1099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:22:20.078000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Nov 1 00:22:20.088000 audit[1099]: AVC avc: denied { associate } for pid=1099 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Nov 1 00:22:20.088000 audit[1099]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145959 a2=1ed a3=0 items=2 ppid=1082 pid=1099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:22:20.088000 audit: CWD cwd="/" Nov 1 00:22:20.088000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:22:20.088000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:22:20.088000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Nov 1 00:22:43.663000 audit: BPF prog-id=12 op=LOAD Nov 1 00:22:43.663000 audit: BPF prog-id=3 op=UNLOAD Nov 1 00:22:43.671000 audit: BPF prog-id=13 op=LOAD Nov 1 00:22:43.677000 audit: BPF prog-id=14 op=LOAD Nov 1 00:22:43.677000 audit: BPF prog-id=4 op=UNLOAD Nov 1 00:22:43.677000 audit: BPF prog-id=5 op=UNLOAD Nov 1 00:22:43.683000 audit: BPF prog-id=15 op=LOAD Nov 1 00:22:43.683000 audit: BPF prog-id=12 op=UNLOAD Nov 1 00:22:43.690000 audit: BPF prog-id=16 op=LOAD Nov 1 00:22:43.697000 audit: BPF prog-id=17 op=LOAD Nov 1 00:22:43.697000 audit: BPF prog-id=13 op=UNLOAD Nov 1 00:22:43.697000 audit: BPF prog-id=14 op=UNLOAD Nov 1 00:22:43.697000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:43.723000 audit: BPF prog-id=15 op=UNLOAD Nov 1 00:22:43.746000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:43.746000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:44.441000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:44.460000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:44.470000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:44.470000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:44.478000 audit: BPF prog-id=18 op=LOAD Nov 1 00:22:44.478000 audit: BPF prog-id=19 op=LOAD Nov 1 00:22:44.478000 audit: BPF prog-id=20 op=LOAD Nov 1 00:22:44.478000 audit: BPF prog-id=16 op=UNLOAD Nov 1 00:22:44.478000 audit: BPF prog-id=17 op=UNLOAD Nov 1 00:22:44.627000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:44.711000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:44.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:44.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:44.743000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:44.750000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Nov 1 00:22:44.750000 audit[1177]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=fffff25a1910 a2=4000 a3=1 items=0 ppid=1 pid=1177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:22:44.750000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Nov 1 00:22:43.661784 systemd[1]: Queued start job for default target multi-user.target. Nov 1 00:22:19.890530 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2025-11-01T00:22:19Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Nov 1 00:22:43.661797 systemd[1]: Unnecessary job was removed for dev-sda6.device. Nov 1 00:22:19.960894 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2025-11-01T00:22:19Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Nov 1 00:22:43.698003 systemd[1]: systemd-journald.service: Deactivated successfully. Nov 1 00:22:19.960915 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2025-11-01T00:22:19Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Nov 1 00:22:43.698379 systemd[1]: systemd-journald.service: Consumed 3.149s CPU time. Nov 1 00:22:19.960956 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2025-11-01T00:22:19Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Nov 1 00:22:19.960966 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2025-11-01T00:22:19Z" level=debug msg="skipped missing lower profile" missing profile=oem Nov 1 00:22:19.961010 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2025-11-01T00:22:19Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Nov 1 00:22:19.961023 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2025-11-01T00:22:19Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Nov 1 00:22:19.961227 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2025-11-01T00:22:19Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Nov 1 00:22:19.961265 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2025-11-01T00:22:19Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Nov 1 00:22:19.961276 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2025-11-01T00:22:19Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Nov 1 00:22:20.039218 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2025-11-01T00:22:20Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Nov 1 00:22:20.039274 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2025-11-01T00:22:20Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Nov 1 00:22:20.039308 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2025-11-01T00:22:20Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Nov 1 00:22:20.039324 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2025-11-01T00:22:20Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Nov 1 00:22:20.039343 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2025-11-01T00:22:20Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Nov 1 00:22:20.039372 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2025-11-01T00:22:20Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Nov 1 00:22:44.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:44.761000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:33.891732 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2025-11-01T00:22:33Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Nov 1 00:22:33.891990 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2025-11-01T00:22:33Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Nov 1 00:22:33.892090 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2025-11-01T00:22:33Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Nov 1 00:22:33.892252 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2025-11-01T00:22:33Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Nov 1 00:22:33.892304 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2025-11-01T00:22:33Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Nov 1 00:22:33.892372 /usr/lib/systemd/system-generators/torcx-generator[1099]: time="2025-11-01T00:22:33Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Nov 1 00:22:44.772476 systemd[1]: Started systemd-journald.service. Nov 1 00:22:44.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:44.773428 systemd[1]: modprobe@drm.service: Deactivated successfully. Nov 1 00:22:44.773580 systemd[1]: Finished modprobe@drm.service. Nov 1 00:22:44.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:44.778000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:44.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:44.785000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:44.779282 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Nov 1 00:22:44.779491 systemd[1]: Finished modprobe@efi_pstore.service. Nov 1 00:22:44.786216 systemd[1]: modprobe@fuse.service: Deactivated successfully. Nov 1 00:22:44.786640 systemd[1]: Finished modprobe@fuse.service. Nov 1 00:22:44.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:44.791000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:44.792213 systemd[1]: modprobe@loop.service: Deactivated successfully. Nov 1 00:22:44.792361 systemd[1]: Finished modprobe@loop.service. Nov 1 00:22:44.797000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:44.797000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:44.798622 systemd[1]: Finished systemd-network-generator.service. Nov 1 00:22:44.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:44.804879 systemd[1]: Finished systemd-remount-fs.service. Nov 1 00:22:44.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:44.811143 systemd[1]: Reached target network-pre.target. Nov 1 00:22:44.818188 systemd[1]: Mounting sys-fs-fuse-connections.mount... Nov 1 00:22:44.825126 systemd[1]: Mounting sys-kernel-config.mount... Nov 1 00:22:44.830040 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Nov 1 00:22:44.943962 systemd[1]: Starting systemd-hwdb-update.service... Nov 1 00:22:44.950991 systemd[1]: Starting systemd-journal-flush.service... Nov 1 00:22:44.956333 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Nov 1 00:22:44.957673 systemd[1]: Starting systemd-random-seed.service... Nov 1 00:22:44.962382 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Nov 1 00:22:44.963725 systemd[1]: Starting systemd-sysusers.service... Nov 1 00:22:44.970520 systemd[1]: Finished systemd-udev-trigger.service. Nov 1 00:22:44.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:44.976194 systemd[1]: Mounted sys-fs-fuse-connections.mount. Nov 1 00:22:44.981878 systemd[1]: Mounted sys-kernel-config.mount. Nov 1 00:22:44.988802 systemd[1]: Starting systemd-udev-settle.service... Nov 1 00:22:44.997053 udevadm[1217]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Nov 1 00:22:45.041103 systemd[1]: Finished systemd-modules-load.service. Nov 1 00:22:45.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:45.048561 systemd[1]: Starting systemd-sysctl.service... Nov 1 00:22:45.109637 systemd[1]: Finished systemd-random-seed.service. Nov 1 00:22:45.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:45.114863 systemd[1]: Reached target first-boot-complete.target. Nov 1 00:22:45.121123 systemd-journald[1177]: Time spent on flushing to /var/log/journal/d8ed2bf546154465acb407bc31b5d49b is 14.189ms for 1106 entries. Nov 1 00:22:45.121123 systemd-journald[1177]: System Journal (/var/log/journal/d8ed2bf546154465acb407bc31b5d49b) is 8.0M, max 2.6G, 2.6G free. Nov 1 00:22:45.251804 systemd-journald[1177]: Received client request to flush runtime journal. Nov 1 00:22:45.252855 systemd[1]: Finished systemd-journal-flush.service. Nov 1 00:22:45.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:45.531247 systemd[1]: Finished systemd-sysctl.service. Nov 1 00:22:45.535000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:47.319805 systemd[1]: Finished systemd-sysusers.service. Nov 1 00:22:47.324000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:47.326024 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Nov 1 00:22:48.455113 systemd[1]: Finished systemd-hwdb-update.service. Nov 1 00:22:48.460000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:49.458836 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Nov 1 00:22:49.489011 kernel: kauditd_printk_skb: 43 callbacks suppressed Nov 1 00:22:49.489077 kernel: audit: type=1130 audit(1761956569.464:142): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:49.464000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:49.469000 audit: BPF prog-id=21 op=LOAD Nov 1 00:22:49.494848 kernel: audit: type=1334 audit(1761956569.469:143): prog-id=21 op=LOAD Nov 1 00:22:49.489796 systemd[1]: Starting systemd-udevd.service... Nov 1 00:22:49.488000 audit: BPF prog-id=22 op=LOAD Nov 1 00:22:49.500633 kernel: audit: type=1334 audit(1761956569.488:144): prog-id=22 op=LOAD Nov 1 00:22:49.488000 audit: BPF prog-id=7 op=UNLOAD Nov 1 00:22:49.509373 kernel: audit: type=1334 audit(1761956569.488:145): prog-id=7 op=UNLOAD Nov 1 00:22:49.488000 audit: BPF prog-id=8 op=UNLOAD Nov 1 00:22:49.515132 kernel: audit: type=1334 audit(1761956569.488:146): prog-id=8 op=UNLOAD Nov 1 00:22:49.527923 systemd-udevd[1224]: Using default interface naming scheme 'v252'. Nov 1 00:22:52.439403 systemd[1]: Started systemd-udevd.service. Nov 1 00:22:52.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:52.478426 kernel: audit: type=1130 audit(1761956572.449:147): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:52.478000 audit: BPF prog-id=23 op=LOAD Nov 1 00:22:52.490599 kernel: audit: type=1334 audit(1761956572.478:148): prog-id=23 op=LOAD Nov 1 00:22:52.486566 systemd[1]: Starting systemd-networkd.service... Nov 1 00:22:52.501422 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Nov 1 00:22:52.595373 kernel: mousedev: PS/2 mouse device common for all mice Nov 1 00:22:52.625000 audit[1226]: AVC avc: denied { confidentiality } for pid=1226 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Nov 1 00:22:52.652061 kernel: audit: type=1400 audit(1761956572.625:149): avc: denied { confidentiality } for pid=1226 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Nov 1 00:22:52.652159 kernel: hv_vmbus: registering driver hv_balloon Nov 1 00:22:52.663672 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Nov 1 00:22:52.663789 kernel: hv_balloon: Memory hot add disabled on ARM64 Nov 1 00:22:52.625000 audit[1226]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab25ec1a50 a1=aa2c a2=ffff857824b0 a3=aaab25e21010 items=12 ppid=1224 pid=1226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:22:52.667368 kernel: audit: type=1300 audit(1761956572.625:149): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab25ec1a50 a1=aa2c a2=ffff857824b0 a3=aaab25e21010 items=12 ppid=1224 pid=1226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:22:52.625000 audit: CWD cwd="/" Nov 1 00:22:52.697328 systemd[1]: Starting systemd-userdbd.service... Nov 1 00:22:52.707414 kernel: audit: type=1307 audit(1761956572.625:149): cwd="/" Nov 1 00:22:52.625000 audit: PATH item=0 name=(null) inode=6836 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:22:52.625000 audit: PATH item=1 name=(null) inode=11573 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:22:52.625000 audit: PATH item=2 name=(null) inode=11573 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:22:52.625000 audit: PATH item=3 name=(null) inode=11574 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:22:52.625000 audit: PATH item=4 name=(null) inode=11573 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:22:52.625000 audit: PATH item=5 name=(null) inode=11575 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:22:52.625000 audit: PATH item=6 name=(null) inode=11573 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:22:52.625000 audit: PATH item=7 name=(null) inode=11576 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:22:52.625000 audit: PATH item=8 name=(null) inode=11573 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:22:52.625000 audit: PATH item=9 name=(null) inode=11577 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:22:52.625000 audit: PATH item=10 name=(null) inode=11573 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:22:52.625000 audit: PATH item=11 name=(null) inode=11578 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:22:52.625000 audit: PROCTITLE proctitle="(udev-worker)" Nov 1 00:22:52.696000 audit: BPF prog-id=24 op=LOAD Nov 1 00:22:52.696000 audit: BPF prog-id=25 op=LOAD Nov 1 00:22:52.696000 audit: BPF prog-id=26 op=LOAD Nov 1 00:22:52.723378 kernel: hv_vmbus: registering driver hyperv_fb Nov 1 00:22:52.737591 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Nov 1 00:22:52.737711 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Nov 1 00:22:52.743013 kernel: Console: switching to colour dummy device 80x25 Nov 1 00:22:52.745369 kernel: Console: switching to colour frame buffer device 128x48 Nov 1 00:22:52.767451 kernel: hv_utils: Registering HyperV Utility Driver Nov 1 00:22:52.767597 kernel: hv_vmbus: registering driver hv_utils Nov 1 00:22:52.771887 kernel: hv_utils: Heartbeat IC version 3.0 Nov 1 00:22:52.772000 kernel: hv_utils: Shutdown IC version 3.2 Nov 1 00:22:52.779026 kernel: hv_utils: TimeSync IC version 4.0 Nov 1 00:22:53.096545 systemd[1]: Started systemd-userdbd.service. Nov 1 00:22:53.100000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:53.804214 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Nov 1 00:22:53.812025 systemd[1]: Finished systemd-udev-settle.service. Nov 1 00:22:53.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:53.818529 systemd[1]: Starting lvm2-activation-early.service... Nov 1 00:22:54.517279 lvm[1301]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Nov 1 00:22:54.606679 systemd[1]: Finished lvm2-activation-early.service. Nov 1 00:22:54.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:54.612237 systemd[1]: Reached target cryptsetup.target. Nov 1 00:22:54.618043 systemd[1]: Starting lvm2-activation.service... Nov 1 00:22:54.622306 lvm[1302]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Nov 1 00:22:54.646651 systemd[1]: Finished lvm2-activation.service. Nov 1 00:22:54.650000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:54.651554 systemd[1]: Reached target local-fs-pre.target. Nov 1 00:22:54.656409 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Nov 1 00:22:54.656444 systemd[1]: Reached target local-fs.target. Nov 1 00:22:54.660945 systemd[1]: Reached target machines.target. Nov 1 00:22:54.666611 systemd[1]: Starting ldconfig.service... Nov 1 00:22:54.667933 systemd-networkd[1245]: lo: Link UP Nov 1 00:22:54.667940 systemd-networkd[1245]: lo: Gained carrier Nov 1 00:22:54.668358 systemd-networkd[1245]: Enumeration completed Nov 1 00:22:54.748840 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Nov 1 00:22:54.748928 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 00:22:54.750183 systemd[1]: Starting systemd-boot-update.service... Nov 1 00:22:54.755147 systemd-networkd[1245]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Nov 1 00:22:54.755825 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Nov 1 00:22:54.762823 systemd[1]: Starting systemd-machine-id-commit.service... Nov 1 00:22:54.768956 systemd[1]: Starting systemd-sysext.service... Nov 1 00:22:54.773482 systemd[1]: Started systemd-networkd.service. Nov 1 00:22:54.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:54.780253 systemd[1]: Starting systemd-networkd-wait-online.service... Nov 1 00:22:54.782537 kernel: kauditd_printk_skb: 20 callbacks suppressed Nov 1 00:22:54.782660 kernel: audit: type=1130 audit(1761956574.778:157): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:54.832901 kernel: mlx5_core 1c63:00:02.0 enP7267s1: Link up Nov 1 00:22:54.833190 kernel: buffer_size[0]=0 is not enough for lossless buffer Nov 1 00:22:54.879641 kernel: hv_netvsc 0022487a-74fd-0022-487a-74fd0022487a eth0: Data path switched to VF: enP7267s1 Nov 1 00:22:54.880479 systemd-networkd[1245]: enP7267s1: Link UP Nov 1 00:22:54.880733 systemd-networkd[1245]: eth0: Link UP Nov 1 00:22:54.880807 systemd-networkd[1245]: eth0: Gained carrier Nov 1 00:22:54.893447 systemd-networkd[1245]: enP7267s1: Gained carrier Nov 1 00:22:54.902764 systemd-networkd[1245]: eth0: DHCPv4 address 10.200.20.12/24, gateway 10.200.20.1 acquired from 168.63.129.16 Nov 1 00:22:54.979601 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1304 (bootctl) Nov 1 00:22:54.981025 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Nov 1 00:22:54.993554 systemd[1]: Unmounting usr-share-oem.mount... Nov 1 00:22:55.015334 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Nov 1 00:22:55.016087 systemd[1]: Finished systemd-machine-id-commit.service. Nov 1 00:22:55.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:55.040658 kernel: audit: type=1130 audit(1761956575.021:158): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:55.120996 systemd[1]: usr-share-oem.mount: Deactivated successfully. Nov 1 00:22:55.121180 systemd[1]: Unmounted usr-share-oem.mount. Nov 1 00:22:55.170614 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Nov 1 00:22:55.176000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:55.196666 kernel: audit: type=1130 audit(1761956575.176:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:55.250651 kernel: loop0: detected capacity change from 0 to 207008 Nov 1 00:22:55.425653 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Nov 1 00:22:55.458768 kernel: loop1: detected capacity change from 0 to 207008 Nov 1 00:22:55.480304 (sd-sysext)[1318]: Using extensions 'kubernetes'. Nov 1 00:22:55.481465 (sd-sysext)[1318]: Merged extensions into '/usr'. Nov 1 00:22:55.498898 systemd[1]: Mounting usr-share-oem.mount... Nov 1 00:22:55.503434 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Nov 1 00:22:55.504832 systemd[1]: Starting modprobe@dm_mod.service... Nov 1 00:22:55.510371 systemd[1]: Starting modprobe@efi_pstore.service... Nov 1 00:22:55.516077 systemd[1]: Starting modprobe@loop.service... Nov 1 00:22:55.520435 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Nov 1 00:22:55.520568 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 00:22:55.522971 systemd[1]: Mounted usr-share-oem.mount. Nov 1 00:22:55.528241 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Nov 1 00:22:55.528395 systemd[1]: Finished modprobe@dm_mod.service. Nov 1 00:22:55.532000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:55.535023 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Nov 1 00:22:55.535150 systemd[1]: Finished modprobe@efi_pstore.service. Nov 1 00:22:55.532000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:55.575246 systemd[1]: modprobe@loop.service: Deactivated successfully. Nov 1 00:22:55.575530 kernel: audit: type=1130 audit(1761956575.532:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:55.575584 kernel: audit: type=1131 audit(1761956575.532:161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:55.575612 systemd[1]: Finished modprobe@loop.service. Nov 1 00:22:55.551000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:55.599603 kernel: audit: type=1130 audit(1761956575.551:162): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:55.600172 systemd[1]: Finished systemd-sysext.service. Nov 1 00:22:55.551000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:55.624203 kernel: audit: type=1131 audit(1761956575.551:163): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:55.579000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:55.625657 systemd[1]: Starting ensure-sysext.service... Nov 1 00:22:55.644449 kernel: audit: type=1130 audit(1761956575.579:164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:55.579000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:55.665966 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Nov 1 00:22:55.666167 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Nov 1 00:22:55.667177 kernel: audit: type=1131 audit(1761956575.579:165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:55.668639 kernel: audit: type=1130 audit(1761956575.601:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:55.601000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:55.669070 systemd[1]: Starting systemd-tmpfiles-setup.service... Nov 1 00:22:55.696665 systemd[1]: Reloading. Nov 1 00:22:55.709698 systemd-fsck[1315]: fsck.fat 4.2 (2021-01-31) Nov 1 00:22:55.709698 systemd-fsck[1315]: /dev/sda1: 236 files, 117310/258078 clusters Nov 1 00:22:55.731743 systemd-tmpfiles[1325]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Nov 1 00:22:55.762511 /usr/lib/systemd/system-generators/torcx-generator[1347]: time="2025-11-01T00:22:55Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Nov 1 00:22:55.762931 /usr/lib/systemd/system-generators/torcx-generator[1347]: time="2025-11-01T00:22:55Z" level=info msg="torcx already run" Nov 1 00:22:55.841998 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Nov 1 00:22:55.842019 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Nov 1 00:22:55.845305 systemd-tmpfiles[1325]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Nov 1 00:22:55.858227 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Nov 1 00:22:55.884607 systemd-tmpfiles[1325]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Nov 1 00:22:55.920000 audit: BPF prog-id=27 op=LOAD Nov 1 00:22:55.920000 audit: BPF prog-id=23 op=UNLOAD Nov 1 00:22:55.921000 audit: BPF prog-id=28 op=LOAD Nov 1 00:22:55.921000 audit: BPF prog-id=18 op=UNLOAD Nov 1 00:22:55.921000 audit: BPF prog-id=29 op=LOAD Nov 1 00:22:55.921000 audit: BPF prog-id=30 op=LOAD Nov 1 00:22:55.921000 audit: BPF prog-id=19 op=UNLOAD Nov 1 00:22:55.921000 audit: BPF prog-id=20 op=UNLOAD Nov 1 00:22:55.922000 audit: BPF prog-id=31 op=LOAD Nov 1 00:22:55.922000 audit: BPF prog-id=24 op=UNLOAD Nov 1 00:22:55.922000 audit: BPF prog-id=32 op=LOAD Nov 1 00:22:55.922000 audit: BPF prog-id=33 op=LOAD Nov 1 00:22:55.922000 audit: BPF prog-id=25 op=UNLOAD Nov 1 00:22:55.922000 audit: BPF prog-id=26 op=UNLOAD Nov 1 00:22:55.923000 audit: BPF prog-id=34 op=LOAD Nov 1 00:22:55.923000 audit: BPF prog-id=35 op=LOAD Nov 1 00:22:55.923000 audit: BPF prog-id=21 op=UNLOAD Nov 1 00:22:55.923000 audit: BPF prog-id=22 op=UNLOAD Nov 1 00:22:55.927001 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Nov 1 00:22:55.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:55.939491 systemd[1]: Mounting boot.mount... Nov 1 00:22:55.946514 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Nov 1 00:22:55.947910 systemd[1]: Starting modprobe@dm_mod.service... Nov 1 00:22:55.953972 systemd[1]: Starting modprobe@efi_pstore.service... Nov 1 00:22:55.961244 systemd[1]: Starting modprobe@loop.service... Nov 1 00:22:55.965492 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Nov 1 00:22:55.965649 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 00:22:55.968038 systemd[1]: Mounted boot.mount. Nov 1 00:22:55.974878 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Nov 1 00:22:55.975038 systemd[1]: Finished modprobe@dm_mod.service. Nov 1 00:22:55.980000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:55.980000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:55.981083 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Nov 1 00:22:55.981218 systemd[1]: Finished modprobe@efi_pstore.service. Nov 1 00:22:55.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:55.986000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:55.987273 systemd[1]: modprobe@loop.service: Deactivated successfully. Nov 1 00:22:55.987421 systemd[1]: Finished modprobe@loop.service. Nov 1 00:22:55.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:55.992000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:55.993406 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Nov 1 00:22:55.993508 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Nov 1 00:22:55.995139 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Nov 1 00:22:55.996726 systemd[1]: Starting modprobe@dm_mod.service... Nov 1 00:22:56.002803 systemd[1]: Starting modprobe@efi_pstore.service... Nov 1 00:22:56.008674 systemd[1]: Starting modprobe@loop.service... Nov 1 00:22:56.012882 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Nov 1 00:22:56.013030 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 00:22:56.014002 systemd[1]: Finished systemd-boot-update.service. Nov 1 00:22:56.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:56.019424 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Nov 1 00:22:56.019558 systemd[1]: Finished modprobe@dm_mod.service. Nov 1 00:22:56.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:56.024000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:56.025010 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Nov 1 00:22:56.025138 systemd[1]: Finished modprobe@efi_pstore.service. Nov 1 00:22:56.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:56.029000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:56.030481 systemd[1]: modprobe@loop.service: Deactivated successfully. Nov 1 00:22:56.030613 systemd[1]: Finished modprobe@loop.service. Nov 1 00:22:56.034000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:56.034000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:56.037831 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Nov 1 00:22:56.039270 systemd[1]: Starting modprobe@dm_mod.service... Nov 1 00:22:56.044955 systemd[1]: Starting modprobe@drm.service... Nov 1 00:22:56.050302 systemd[1]: Starting modprobe@efi_pstore.service... Nov 1 00:22:56.057037 systemd[1]: Starting modprobe@loop.service... Nov 1 00:22:56.061604 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Nov 1 00:22:56.061772 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 00:22:56.062775 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Nov 1 00:22:56.062926 systemd[1]: Finished modprobe@dm_mod.service. Nov 1 00:22:56.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:56.067000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:56.068554 systemd[1]: modprobe@drm.service: Deactivated successfully. Nov 1 00:22:56.068713 systemd[1]: Finished modprobe@drm.service. Nov 1 00:22:56.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:56.073000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:56.074382 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Nov 1 00:22:56.074512 systemd[1]: Finished modprobe@efi_pstore.service. Nov 1 00:22:56.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:56.079000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:56.080054 systemd[1]: modprobe@loop.service: Deactivated successfully. Nov 1 00:22:56.080187 systemd[1]: Finished modprobe@loop.service. Nov 1 00:22:56.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:56.084000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:56.085720 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Nov 1 00:22:56.085817 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Nov 1 00:22:56.087002 systemd[1]: Finished ensure-sysext.service. Nov 1 00:22:56.091000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:22:56.785853 systemd-networkd[1245]: eth0: Gained IPv6LL Nov 1 00:22:56.790612 systemd[1]: Finished systemd-networkd-wait-online.service. Nov 1 00:22:56.796000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:23:03.098418 systemd[1]: Finished systemd-tmpfiles-setup.service. Nov 1 00:23:03.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:23:03.109123 kernel: kauditd_printk_skb: 42 callbacks suppressed Nov 1 00:23:03.109183 kernel: audit: type=1130 audit(1761956583.103:209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:23:03.110599 systemd[1]: Starting audit-rules.service... Nov 1 00:23:03.135665 systemd[1]: Starting clean-ca-certificates.service... Nov 1 00:23:03.141699 systemd[1]: Starting systemd-journal-catalog-update.service... Nov 1 00:23:03.147000 audit: BPF prog-id=36 op=LOAD Nov 1 00:23:03.148798 systemd[1]: Starting systemd-resolved.service... Nov 1 00:23:03.157530 kernel: audit: type=1334 audit(1761956583.147:210): prog-id=36 op=LOAD Nov 1 00:23:03.158000 audit: BPF prog-id=37 op=LOAD Nov 1 00:23:03.159746 systemd[1]: Starting systemd-timesyncd.service... Nov 1 00:23:03.168841 kernel: audit: type=1334 audit(1761956583.158:211): prog-id=37 op=LOAD Nov 1 00:23:03.170493 systemd[1]: Starting systemd-update-utmp.service... Nov 1 00:23:03.282000 audit[1426]: SYSTEM_BOOT pid=1426 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Nov 1 00:23:03.302653 kernel: audit: type=1127 audit(1761956583.282:212): pid=1426 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Nov 1 00:23:03.303813 systemd[1]: Finished systemd-update-utmp.service. Nov 1 00:23:03.307000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:23:03.331144 systemd[1]: Finished clean-ca-certificates.service. Nov 1 00:23:03.332648 kernel: audit: type=1130 audit(1761956583.307:213): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:23:03.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:23:03.336364 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Nov 1 00:23:03.355736 kernel: audit: type=1130 audit(1761956583.335:214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:23:03.368580 systemd[1]: Started systemd-timesyncd.service. Nov 1 00:23:03.372000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:23:03.373691 systemd[1]: Reached target time-set.target. Nov 1 00:23:03.393648 kernel: audit: type=1130 audit(1761956583.372:215): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:23:03.593213 systemd-resolved[1423]: Positive Trust Anchors: Nov 1 00:23:03.593232 systemd-resolved[1423]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Nov 1 00:23:03.593260 systemd-resolved[1423]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Nov 1 00:23:03.765672 systemd-resolved[1423]: Using system hostname 'ci-3510.3.8-n-bde7a9edbb'. Nov 1 00:23:03.767212 systemd[1]: Started systemd-resolved.service. Nov 1 00:23:03.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:23:03.771936 systemd[1]: Reached target network.target. Nov 1 00:23:03.794432 kernel: audit: type=1130 audit(1761956583.771:216): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:23:03.794978 systemd[1]: Reached target network-online.target. Nov 1 00:23:03.800291 systemd[1]: Reached target nss-lookup.target. Nov 1 00:23:03.875140 systemd-timesyncd[1425]: Contacted time server 66.59.198.94:123 (0.flatcar.pool.ntp.org). Nov 1 00:23:03.875217 systemd-timesyncd[1425]: Initial clock synchronization to Sat 2025-11-01 00:23:03.880198 UTC. Nov 1 00:23:03.998650 systemd[1]: Finished systemd-journal-catalog-update.service. Nov 1 00:23:04.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:23:04.025645 kernel: audit: type=1130 audit(1761956584.003:217): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:23:04.675000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Nov 1 00:23:04.676130 augenrules[1442]: No rules Nov 1 00:23:04.675000 audit[1442]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffe6834b50 a2=420 a3=0 items=0 ppid=1420 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:23:04.675000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Nov 1 00:23:04.689089 systemd[1]: Finished audit-rules.service. Nov 1 00:23:04.692998 kernel: audit: type=1305 audit(1761956584.675:218): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Nov 1 00:23:23.320484 ldconfig[1303]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Nov 1 00:23:23.320835 ldconfig[1303]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Nov 1 00:23:23.338138 systemd[1]: Finished ldconfig.service. Nov 1 00:23:23.344656 systemd[1]: Starting systemd-update-done.service... Nov 1 00:23:23.502579 systemd[1]: Finished systemd-update-done.service. Nov 1 00:23:23.507744 systemd[1]: Reached target sysinit.target. Nov 1 00:23:23.512312 systemd[1]: Started motdgen.path. Nov 1 00:23:23.515923 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Nov 1 00:23:23.522131 systemd[1]: Started logrotate.timer. Nov 1 00:23:23.526027 systemd[1]: Started mdadm.timer. Nov 1 00:23:23.529625 systemd[1]: Started systemd-tmpfiles-clean.timer. Nov 1 00:23:23.534133 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Nov 1 00:23:23.534182 systemd[1]: Reached target paths.target. Nov 1 00:23:23.538746 systemd[1]: Reached target timers.target. Nov 1 00:23:23.543161 systemd[1]: Listening on dbus.socket. Nov 1 00:23:23.547961 systemd[1]: Starting docker.socket... Nov 1 00:23:23.692125 systemd[1]: Listening on sshd.socket. Nov 1 00:23:23.696503 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 00:23:23.696992 systemd[1]: Listening on docker.socket. Nov 1 00:23:23.701372 systemd[1]: Reached target sockets.target. Nov 1 00:23:23.705819 systemd[1]: Reached target basic.target. Nov 1 00:23:23.710010 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Nov 1 00:23:23.710039 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Nov 1 00:23:23.711126 systemd[1]: Starting containerd.service... Nov 1 00:23:23.715672 systemd[1]: Starting dbus.service... Nov 1 00:23:23.719751 systemd[1]: Starting enable-oem-cloudinit.service... Nov 1 00:23:23.724844 systemd[1]: Starting extend-filesystems.service... Nov 1 00:23:23.729048 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Nov 1 00:23:23.765778 systemd[1]: Starting kubelet.service... Nov 1 00:23:23.770256 systemd[1]: Starting motdgen.service... Nov 1 00:23:23.777440 systemd[1]: Started nvidia.service. Nov 1 00:23:23.782609 systemd[1]: Starting ssh-key-proc-cmdline.service... Nov 1 00:23:23.787750 systemd[1]: Starting sshd-keygen.service... Nov 1 00:23:23.793674 systemd[1]: Starting systemd-logind.service... Nov 1 00:23:23.797535 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 00:23:23.797616 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Nov 1 00:23:23.797990 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Nov 1 00:23:23.798608 systemd[1]: Starting update-engine.service... Nov 1 00:23:23.803271 systemd[1]: Starting update-ssh-keys-after-ignition.service... Nov 1 00:23:23.827864 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Nov 1 00:23:23.828052 systemd[1]: Finished ssh-key-proc-cmdline.service. Nov 1 00:23:23.946732 jq[1463]: true Nov 1 00:23:23.947375 jq[1452]: false Nov 1 00:23:23.990512 systemd[1]: motdgen.service: Deactivated successfully. Nov 1 00:23:23.990723 systemd[1]: Finished motdgen.service. Nov 1 00:23:23.996108 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Nov 1 00:23:23.996309 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Nov 1 00:23:24.010001 extend-filesystems[1453]: Found loop1 Nov 1 00:23:24.014539 extend-filesystems[1453]: Found sda Nov 1 00:23:24.014539 extend-filesystems[1453]: Found sda1 Nov 1 00:23:24.014539 extend-filesystems[1453]: Found sda2 Nov 1 00:23:24.014539 extend-filesystems[1453]: Found sda3 Nov 1 00:23:24.014539 extend-filesystems[1453]: Found usr Nov 1 00:23:24.014539 extend-filesystems[1453]: Found sda4 Nov 1 00:23:24.014539 extend-filesystems[1453]: Found sda6 Nov 1 00:23:24.014539 extend-filesystems[1453]: Found sda7 Nov 1 00:23:24.014539 extend-filesystems[1453]: Found sda9 Nov 1 00:23:24.014539 extend-filesystems[1453]: Checking size of /dev/sda9 Nov 1 00:23:24.082876 jq[1478]: true Nov 1 00:23:24.110426 systemd-logind[1461]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Nov 1 00:23:24.115815 systemd-logind[1461]: New seat seat0. Nov 1 00:23:24.142348 env[1473]: time="2025-11-01T00:23:24.142284783Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Nov 1 00:23:24.172059 env[1473]: time="2025-11-01T00:23:24.172012233Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Nov 1 00:23:24.172213 env[1473]: time="2025-11-01T00:23:24.172188249Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Nov 1 00:23:24.173476 env[1473]: time="2025-11-01T00:23:24.173441681Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.192-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Nov 1 00:23:24.173476 env[1473]: time="2025-11-01T00:23:24.173475284Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Nov 1 00:23:24.173725 env[1473]: time="2025-11-01T00:23:24.173700504Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Nov 1 00:23:24.173768 env[1473]: time="2025-11-01T00:23:24.173725106Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Nov 1 00:23:24.173768 env[1473]: time="2025-11-01T00:23:24.173738547Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Nov 1 00:23:24.173768 env[1473]: time="2025-11-01T00:23:24.173747988Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Nov 1 00:23:24.173830 env[1473]: time="2025-11-01T00:23:24.173820474Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Nov 1 00:23:24.174047 env[1473]: time="2025-11-01T00:23:24.174020972Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Nov 1 00:23:24.174166 env[1473]: time="2025-11-01T00:23:24.174142743Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Nov 1 00:23:24.174166 env[1473]: time="2025-11-01T00:23:24.174162905Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Nov 1 00:23:24.174225 env[1473]: time="2025-11-01T00:23:24.174214029Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Nov 1 00:23:24.174248 env[1473]: time="2025-11-01T00:23:24.174227391Z" level=info msg="metadata content store policy set" policy=shared Nov 1 00:23:24.196183 env[1473]: time="2025-11-01T00:23:24.196138584Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Nov 1 00:23:24.196183 env[1473]: time="2025-11-01T00:23:24.196182428Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Nov 1 00:23:24.196337 env[1473]: time="2025-11-01T00:23:24.196215591Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Nov 1 00:23:24.196337 env[1473]: time="2025-11-01T00:23:24.196253834Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Nov 1 00:23:24.196337 env[1473]: time="2025-11-01T00:23:24.196270076Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Nov 1 00:23:24.196337 env[1473]: time="2025-11-01T00:23:24.196284437Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Nov 1 00:23:24.196337 env[1473]: time="2025-11-01T00:23:24.196297558Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Nov 1 00:23:24.196669 env[1473]: time="2025-11-01T00:23:24.196648390Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Nov 1 00:23:24.196712 env[1473]: time="2025-11-01T00:23:24.196672032Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Nov 1 00:23:24.196712 env[1473]: time="2025-11-01T00:23:24.196688273Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Nov 1 00:23:24.196712 env[1473]: time="2025-11-01T00:23:24.196700674Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Nov 1 00:23:24.196799 env[1473]: time="2025-11-01T00:23:24.196713435Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Nov 1 00:23:24.196849 env[1473]: time="2025-11-01T00:23:24.196825885Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Nov 1 00:23:24.196927 env[1473]: time="2025-11-01T00:23:24.196908213Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Nov 1 00:23:24.197172 env[1473]: time="2025-11-01T00:23:24.197145754Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Nov 1 00:23:24.197210 env[1473]: time="2025-11-01T00:23:24.197176077Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Nov 1 00:23:24.197210 env[1473]: time="2025-11-01T00:23:24.197190638Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Nov 1 00:23:24.197249 env[1473]: time="2025-11-01T00:23:24.197233682Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Nov 1 00:23:24.197268 env[1473]: time="2025-11-01T00:23:24.197246443Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Nov 1 00:23:24.197268 env[1473]: time="2025-11-01T00:23:24.197258844Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Nov 1 00:23:24.197304 env[1473]: time="2025-11-01T00:23:24.197271165Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Nov 1 00:23:24.197304 env[1473]: time="2025-11-01T00:23:24.197282926Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Nov 1 00:23:24.197304 env[1473]: time="2025-11-01T00:23:24.197294767Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Nov 1 00:23:24.197366 env[1473]: time="2025-11-01T00:23:24.197305288Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Nov 1 00:23:24.197366 env[1473]: time="2025-11-01T00:23:24.197316129Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Nov 1 00:23:24.197366 env[1473]: time="2025-11-01T00:23:24.197328970Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Nov 1 00:23:24.197480 env[1473]: time="2025-11-01T00:23:24.197451741Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Nov 1 00:23:24.197480 env[1473]: time="2025-11-01T00:23:24.197478184Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Nov 1 00:23:24.197539 env[1473]: time="2025-11-01T00:23:24.197490385Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Nov 1 00:23:24.197539 env[1473]: time="2025-11-01T00:23:24.197501786Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Nov 1 00:23:24.197539 env[1473]: time="2025-11-01T00:23:24.197515267Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Nov 1 00:23:24.197539 env[1473]: time="2025-11-01T00:23:24.197526188Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Nov 1 00:23:24.197639 env[1473]: time="2025-11-01T00:23:24.197544270Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Nov 1 00:23:24.197639 env[1473]: time="2025-11-01T00:23:24.197582593Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Nov 1 00:23:24.197849 env[1473]: time="2025-11-01T00:23:24.197782011Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Nov 1 00:23:24.197849 env[1473]: time="2025-11-01T00:23:24.197843096Z" level=info msg="Connect containerd service" Nov 1 00:23:24.238472 env[1473]: time="2025-11-01T00:23:24.197875019Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Nov 1 00:23:24.238472 env[1473]: time="2025-11-01T00:23:24.198549959Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Nov 1 00:23:24.238472 env[1473]: time="2025-11-01T00:23:24.198785580Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Nov 1 00:23:24.238472 env[1473]: time="2025-11-01T00:23:24.198820863Z" level=info msg=serving... address=/run/containerd/containerd.sock Nov 1 00:23:24.238472 env[1473]: time="2025-11-01T00:23:24.198866027Z" level=info msg="containerd successfully booted in 0.060202s" Nov 1 00:23:24.238472 env[1473]: time="2025-11-01T00:23:24.201725762Z" level=info msg="Start subscribing containerd event" Nov 1 00:23:24.238472 env[1473]: time="2025-11-01T00:23:24.201777887Z" level=info msg="Start recovering state" Nov 1 00:23:24.238472 env[1473]: time="2025-11-01T00:23:24.201854014Z" level=info msg="Start event monitor" Nov 1 00:23:24.238472 env[1473]: time="2025-11-01T00:23:24.201875576Z" level=info msg="Start snapshots syncer" Nov 1 00:23:24.238472 env[1473]: time="2025-11-01T00:23:24.201885897Z" level=info msg="Start cni network conf syncer for default" Nov 1 00:23:24.238472 env[1473]: time="2025-11-01T00:23:24.201897378Z" level=info msg="Start streaming server" Nov 1 00:23:24.198940 systemd[1]: Started containerd.service. Nov 1 00:23:24.337186 extend-filesystems[1453]: Old size kept for /dev/sda9 Nov 1 00:23:24.347766 extend-filesystems[1453]: Found sr0 Nov 1 00:23:24.342390 systemd[1]: extend-filesystems.service: Deactivated successfully. Nov 1 00:23:24.342553 systemd[1]: Finished extend-filesystems.service. Nov 1 00:23:24.450720 bash[1497]: Updated "/home/core/.ssh/authorized_keys" Nov 1 00:23:24.451553 systemd[1]: Finished update-ssh-keys-after-ignition.service. Nov 1 00:23:24.635268 systemd[1]: nvidia.service: Deactivated successfully. Nov 1 00:23:24.727133 systemd[1]: Started kubelet.service. Nov 1 00:23:25.192371 kubelet[1554]: E1101 00:23:25.192270 1554 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Nov 1 00:23:25.194169 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Nov 1 00:23:25.194297 systemd[1]: kubelet.service: Failed with result 'exit-code'. Nov 1 00:23:25.644576 dbus-daemon[1451]: [system] SELinux support is enabled Nov 1 00:23:25.650827 dbus-daemon[1451]: [system] Successfully activated service 'org.freedesktop.systemd1' Nov 1 00:23:25.644791 systemd[1]: Started dbus.service. Nov 1 00:23:25.650284 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Nov 1 00:23:25.650302 systemd[1]: Reached target system-config.target. Nov 1 00:23:25.656551 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Nov 1 00:23:25.656570 systemd[1]: Reached target user-config.target. Nov 1 00:23:25.661751 systemd[1]: Started systemd-logind.service. Nov 1 00:23:25.821540 update_engine[1462]: I1101 00:23:25.786718 1462 main.cc:92] Flatcar Update Engine starting Nov 1 00:23:26.114243 update_engine[1462]: I1101 00:23:26.114138 1462 update_check_scheduler.cc:74] Next update check in 4m0s Nov 1 00:23:26.114492 systemd[1]: Started update-engine.service. Nov 1 00:23:26.121153 systemd[1]: Started locksmithd.service. Nov 1 00:23:26.973865 sshd_keygen[1469]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Nov 1 00:23:26.990839 systemd[1]: Finished sshd-keygen.service. Nov 1 00:23:26.996653 systemd[1]: Starting issuegen.service... Nov 1 00:23:27.001268 systemd[1]: Started waagent.service. Nov 1 00:23:27.005695 systemd[1]: issuegen.service: Deactivated successfully. Nov 1 00:23:27.005873 systemd[1]: Finished issuegen.service. Nov 1 00:23:27.011362 systemd[1]: Starting systemd-user-sessions.service... Nov 1 00:23:27.143852 systemd[1]: Finished systemd-user-sessions.service. Nov 1 00:23:27.150047 systemd[1]: Started getty@tty1.service. Nov 1 00:23:27.155446 systemd[1]: Started serial-getty@ttyAMA0.service. Nov 1 00:23:27.160409 systemd[1]: Reached target getty.target. Nov 1 00:23:27.164537 systemd[1]: Reached target multi-user.target. Nov 1 00:23:27.170268 systemd[1]: Starting systemd-update-utmp-runlevel.service... Nov 1 00:23:27.180420 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Nov 1 00:23:27.180581 systemd[1]: Finished systemd-update-utmp-runlevel.service. Nov 1 00:23:27.186402 systemd[1]: Startup finished in 766ms (kernel) + 26.785s (initrd) + 1min 13.535s (userspace) = 1min 41.087s. Nov 1 00:23:30.013239 login[1574]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Nov 1 00:23:30.014523 login[1575]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Nov 1 00:23:30.060315 locksmithd[1560]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Nov 1 00:23:30.442136 systemd[1]: Created slice user-500.slice. Nov 1 00:23:30.443263 systemd[1]: Starting user-runtime-dir@500.service... Nov 1 00:23:30.446576 systemd-logind[1461]: New session 2 of user core. Nov 1 00:23:30.449230 systemd-logind[1461]: New session 1 of user core. Nov 1 00:23:30.566860 systemd[1]: Finished user-runtime-dir@500.service. Nov 1 00:23:30.568289 systemd[1]: Starting user@500.service... Nov 1 00:23:30.710993 (systemd)[1582]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:23:31.795659 systemd[1582]: Queued start job for default target default.target. Nov 1 00:23:31.796173 systemd[1582]: Reached target paths.target. Nov 1 00:23:31.796193 systemd[1582]: Reached target sockets.target. Nov 1 00:23:31.796204 systemd[1582]: Reached target timers.target. Nov 1 00:23:31.796214 systemd[1582]: Reached target basic.target. Nov 1 00:23:31.796317 systemd[1]: Started user@500.service. Nov 1 00:23:31.797198 systemd[1]: Started session-1.scope. Nov 1 00:23:31.797762 systemd[1]: Started session-2.scope. Nov 1 00:23:31.798450 systemd[1582]: Reached target default.target. Nov 1 00:23:31.798608 systemd[1582]: Startup finished in 1.081s. Nov 1 00:23:35.200351 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Nov 1 00:23:35.200523 systemd[1]: Stopped kubelet.service. Nov 1 00:23:35.201911 systemd[1]: Starting kubelet.service... Nov 1 00:23:35.344502 systemd[1]: Started kubelet.service. Nov 1 00:23:35.414068 kubelet[1606]: E1101 00:23:35.414023 1606 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Nov 1 00:23:35.416639 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Nov 1 00:23:35.416765 systemd[1]: kubelet.service: Failed with result 'exit-code'. Nov 1 00:23:40.993947 kernel: hv_balloon: Max. dynamic memory size: 4096 MB Nov 1 00:23:45.450350 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Nov 1 00:23:45.450531 systemd[1]: Stopped kubelet.service. Nov 1 00:23:45.451847 systemd[1]: Starting kubelet.service... Nov 1 00:23:45.599603 systemd[1]: Started kubelet.service. Nov 1 00:23:45.668876 kubelet[1617]: E1101 00:23:45.668824 1617 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Nov 1 00:23:45.670917 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Nov 1 00:23:45.671035 systemd[1]: kubelet.service: Failed with result 'exit-code'. Nov 1 00:23:49.086131 waagent[1571]: 2025-11-01T00:23:49.086025Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Nov 1 00:23:49.130454 waagent[1571]: 2025-11-01T00:23:49.130360Z INFO Daemon Daemon OS: flatcar 3510.3.8 Nov 1 00:23:49.135393 waagent[1571]: 2025-11-01T00:23:49.135324Z INFO Daemon Daemon Python: 3.9.16 Nov 1 00:23:49.142901 waagent[1571]: 2025-11-01T00:23:49.142778Z INFO Daemon Daemon Run daemon Nov 1 00:23:49.147303 waagent[1571]: 2025-11-01T00:23:49.147230Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.8' Nov 1 00:23:49.216365 waagent[1571]: 2025-11-01T00:23:49.216209Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Nov 1 00:23:49.232057 waagent[1571]: 2025-11-01T00:23:49.231920Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Nov 1 00:23:49.242011 waagent[1571]: 2025-11-01T00:23:49.241934Z INFO Daemon Daemon cloud-init is enabled: False Nov 1 00:23:49.247868 waagent[1571]: 2025-11-01T00:23:49.247803Z INFO Daemon Daemon Using waagent for provisioning Nov 1 00:23:49.253947 waagent[1571]: 2025-11-01T00:23:49.253883Z INFO Daemon Daemon Activate resource disk Nov 1 00:23:49.259002 waagent[1571]: 2025-11-01T00:23:49.258939Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Nov 1 00:23:49.273804 waagent[1571]: 2025-11-01T00:23:49.273730Z INFO Daemon Daemon Found device: None Nov 1 00:23:49.278664 waagent[1571]: 2025-11-01T00:23:49.278578Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Nov 1 00:23:49.287142 waagent[1571]: 2025-11-01T00:23:49.287079Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Nov 1 00:23:49.299688 waagent[1571]: 2025-11-01T00:23:49.299607Z INFO Daemon Daemon Clean protocol and wireserver endpoint Nov 1 00:23:49.305676 waagent[1571]: 2025-11-01T00:23:49.305603Z INFO Daemon Daemon Running default provisioning handler Nov 1 00:23:49.319058 waagent[1571]: 2025-11-01T00:23:49.318921Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Nov 1 00:23:49.335134 waagent[1571]: 2025-11-01T00:23:49.334990Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Nov 1 00:23:49.345721 waagent[1571]: 2025-11-01T00:23:49.345597Z INFO Daemon Daemon cloud-init is enabled: False Nov 1 00:23:49.351162 waagent[1571]: 2025-11-01T00:23:49.351097Z INFO Daemon Daemon Copying ovf-env.xml Nov 1 00:23:49.690999 waagent[1571]: 2025-11-01T00:23:49.690800Z INFO Daemon Daemon Successfully mounted dvd Nov 1 00:23:49.902872 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Nov 1 00:23:50.055513 waagent[1571]: 2025-11-01T00:23:50.055363Z INFO Daemon Daemon Detect protocol endpoint Nov 1 00:23:50.060887 waagent[1571]: 2025-11-01T00:23:50.060801Z INFO Daemon Daemon Clean protocol and wireserver endpoint Nov 1 00:23:50.067493 waagent[1571]: 2025-11-01T00:23:50.067407Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Nov 1 00:23:50.074293 waagent[1571]: 2025-11-01T00:23:50.074220Z INFO Daemon Daemon Test for route to 168.63.129.16 Nov 1 00:23:50.079932 waagent[1571]: 2025-11-01T00:23:50.079865Z INFO Daemon Daemon Route to 168.63.129.16 exists Nov 1 00:23:50.085307 waagent[1571]: 2025-11-01T00:23:50.085244Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Nov 1 00:23:50.418307 waagent[1571]: 2025-11-01T00:23:50.418181Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Nov 1 00:23:50.425367 waagent[1571]: 2025-11-01T00:23:50.425320Z INFO Daemon Daemon Wire protocol version:2012-11-30 Nov 1 00:23:50.430987 waagent[1571]: 2025-11-01T00:23:50.430916Z INFO Daemon Daemon Server preferred version:2015-04-05 Nov 1 00:23:51.163208 waagent[1571]: 2025-11-01T00:23:51.163050Z INFO Daemon Daemon Initializing goal state during protocol detection Nov 1 00:23:51.178429 waagent[1571]: 2025-11-01T00:23:51.178356Z INFO Daemon Daemon Forcing an update of the goal state.. Nov 1 00:23:51.184153 waagent[1571]: 2025-11-01T00:23:51.184091Z INFO Daemon Daemon Fetching goal state [incarnation 1] Nov 1 00:23:51.351681 waagent[1571]: 2025-11-01T00:23:51.351524Z INFO Daemon Daemon Found private key matching thumbprint F9EF45522247F20F7B94AE8C75703212E459DC63 Nov 1 00:23:51.360941 waagent[1571]: 2025-11-01T00:23:51.360867Z INFO Daemon Daemon Fetch goal state completed Nov 1 00:23:51.389299 waagent[1571]: 2025-11-01T00:23:51.389241Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: c9a9d01b-e77d-4990-a133-eaecc54cfe41 New eTag: 5156383579646525610] Nov 1 00:23:51.400648 waagent[1571]: 2025-11-01T00:23:51.400564Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Nov 1 00:23:51.416712 waagent[1571]: 2025-11-01T00:23:51.416593Z INFO Daemon Daemon Starting provisioning Nov 1 00:23:51.422402 waagent[1571]: 2025-11-01T00:23:51.422342Z INFO Daemon Daemon Handle ovf-env.xml. Nov 1 00:23:51.427491 waagent[1571]: 2025-11-01T00:23:51.427431Z INFO Daemon Daemon Set hostname [ci-3510.3.8-n-bde7a9edbb] Nov 1 00:23:51.564855 waagent[1571]: 2025-11-01T00:23:51.564728Z INFO Daemon Daemon Publish hostname [ci-3510.3.8-n-bde7a9edbb] Nov 1 00:23:51.574967 waagent[1571]: 2025-11-01T00:23:51.574886Z INFO Daemon Daemon Examine /proc/net/route for primary interface Nov 1 00:23:51.581907 waagent[1571]: 2025-11-01T00:23:51.581842Z INFO Daemon Daemon Primary interface is [eth0] Nov 1 00:23:51.598046 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Nov 1 00:23:51.598216 systemd[1]: Stopped systemd-networkd-wait-online.service. Nov 1 00:23:51.598274 systemd[1]: Stopping systemd-networkd-wait-online.service... Nov 1 00:23:51.598502 systemd[1]: Stopping systemd-networkd.service... Nov 1 00:23:51.603703 systemd-networkd[1245]: eth0: DHCPv6 lease lost Nov 1 00:23:51.605425 systemd[1]: systemd-networkd.service: Deactivated successfully. Nov 1 00:23:51.605594 systemd[1]: Stopped systemd-networkd.service. Nov 1 00:23:51.607608 systemd[1]: Starting systemd-networkd.service... Nov 1 00:23:51.636289 systemd-networkd[1645]: enP7267s1: Link UP Nov 1 00:23:51.636541 systemd-networkd[1645]: enP7267s1: Gained carrier Nov 1 00:23:51.637699 systemd-networkd[1645]: eth0: Link UP Nov 1 00:23:51.637780 systemd-networkd[1645]: eth0: Gained carrier Nov 1 00:23:51.638197 systemd-networkd[1645]: lo: Link UP Nov 1 00:23:51.638262 systemd-networkd[1645]: lo: Gained carrier Nov 1 00:23:51.638581 systemd-networkd[1645]: eth0: Gained IPv6LL Nov 1 00:23:51.639131 systemd-networkd[1645]: Enumeration completed Nov 1 00:23:51.639707 systemd[1]: Started systemd-networkd.service. Nov 1 00:23:51.641329 systemd[1]: Starting systemd-networkd-wait-online.service... Nov 1 00:23:51.647251 waagent[1571]: 2025-11-01T00:23:51.641872Z INFO Daemon Daemon Create user account if not exists Nov 1 00:23:51.648389 systemd-networkd[1645]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Nov 1 00:23:51.649039 waagent[1571]: 2025-11-01T00:23:51.648822Z INFO Daemon Daemon User core already exists, skip useradd Nov 1 00:23:51.654954 waagent[1571]: 2025-11-01T00:23:51.654878Z INFO Daemon Daemon Configure sudoer Nov 1 00:23:51.670682 systemd-networkd[1645]: eth0: DHCPv4 address 10.200.20.12/24, gateway 10.200.20.1 acquired from 168.63.129.16 Nov 1 00:23:51.672824 systemd[1]: Finished systemd-networkd-wait-online.service. Nov 1 00:23:51.696797 waagent[1571]: 2025-11-01T00:23:51.696707Z INFO Daemon Daemon Configure sshd Nov 1 00:23:51.701242 waagent[1571]: 2025-11-01T00:23:51.701178Z INFO Daemon Daemon Deploy ssh public key. Nov 1 00:23:53.078448 waagent[1571]: 2025-11-01T00:23:53.078371Z INFO Daemon Daemon Provisioning complete Nov 1 00:23:53.096085 waagent[1571]: 2025-11-01T00:23:53.096019Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Nov 1 00:23:53.102553 waagent[1571]: 2025-11-01T00:23:53.102484Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Nov 1 00:23:53.113241 waagent[1571]: 2025-11-01T00:23:53.113176Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Nov 1 00:23:53.412544 waagent[1654]: 2025-11-01T00:23:53.412399Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Nov 1 00:23:53.413690 waagent[1654]: 2025-11-01T00:23:53.413613Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Nov 1 00:23:53.413928 waagent[1654]: 2025-11-01T00:23:53.413880Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Nov 1 00:23:53.427086 waagent[1654]: 2025-11-01T00:23:53.427015Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Nov 1 00:23:53.427390 waagent[1654]: 2025-11-01T00:23:53.427339Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Nov 1 00:23:53.484730 waagent[1654]: 2025-11-01T00:23:53.484581Z INFO ExtHandler ExtHandler Found private key matching thumbprint F9EF45522247F20F7B94AE8C75703212E459DC63 Nov 1 00:23:53.485172 waagent[1654]: 2025-11-01T00:23:53.485120Z INFO ExtHandler ExtHandler Fetch goal state completed Nov 1 00:23:53.502307 waagent[1654]: 2025-11-01T00:23:53.502251Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 4822bce7-dc59-4d53-a863-52882e528901 New eTag: 5156383579646525610] Nov 1 00:23:53.503021 waagent[1654]: 2025-11-01T00:23:53.502964Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Nov 1 00:23:53.794823 waagent[1654]: 2025-11-01T00:23:53.794681Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.8; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Nov 1 00:23:53.839695 waagent[1654]: 2025-11-01T00:23:53.839590Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1654 Nov 1 00:23:53.843608 waagent[1654]: 2025-11-01T00:23:53.843540Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.8', '', 'Flatcar Container Linux by Kinvolk'] Nov 1 00:23:53.845032 waagent[1654]: 2025-11-01T00:23:53.844973Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Nov 1 00:23:54.190466 waagent[1654]: 2025-11-01T00:23:54.190359Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Nov 1 00:23:54.191041 waagent[1654]: 2025-11-01T00:23:54.190982Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Nov 1 00:23:54.198930 waagent[1654]: 2025-11-01T00:23:54.198875Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Nov 1 00:23:54.199530 waagent[1654]: 2025-11-01T00:23:54.199475Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Nov 1 00:23:54.200793 waagent[1654]: 2025-11-01T00:23:54.200731Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Nov 1 00:23:54.202254 waagent[1654]: 2025-11-01T00:23:54.202185Z INFO ExtHandler ExtHandler Starting env monitor service. Nov 1 00:23:54.202531 waagent[1654]: 2025-11-01T00:23:54.202463Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Nov 1 00:23:54.203130 waagent[1654]: 2025-11-01T00:23:54.203050Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Nov 1 00:23:54.203741 waagent[1654]: 2025-11-01T00:23:54.203670Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Nov 1 00:23:54.204403 waagent[1654]: 2025-11-01T00:23:54.204334Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Nov 1 00:23:54.204950 waagent[1654]: 2025-11-01T00:23:54.204875Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Nov 1 00:23:54.204950 waagent[1654]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Nov 1 00:23:54.204950 waagent[1654]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Nov 1 00:23:54.204950 waagent[1654]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Nov 1 00:23:54.204950 waagent[1654]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Nov 1 00:23:54.204950 waagent[1654]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Nov 1 00:23:54.204950 waagent[1654]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Nov 1 00:23:54.205348 waagent[1654]: 2025-11-01T00:23:54.205285Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Nov 1 00:23:54.206744 waagent[1654]: 2025-11-01T00:23:54.206032Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Nov 1 00:23:54.207810 waagent[1654]: 2025-11-01T00:23:54.207639Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Nov 1 00:23:54.207991 waagent[1654]: 2025-11-01T00:23:54.207918Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Nov 1 00:23:54.208968 waagent[1654]: 2025-11-01T00:23:54.208891Z INFO EnvHandler ExtHandler Configure routes Nov 1 00:23:54.209653 waagent[1654]: 2025-11-01T00:23:54.209564Z INFO EnvHandler ExtHandler Gateway:None Nov 1 00:23:54.209797 waagent[1654]: 2025-11-01T00:23:54.209744Z INFO EnvHandler ExtHandler Routes:None Nov 1 00:23:54.210816 waagent[1654]: 2025-11-01T00:23:54.210744Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Nov 1 00:23:54.210973 waagent[1654]: 2025-11-01T00:23:54.210900Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Nov 1 00:23:54.211268 waagent[1654]: 2025-11-01T00:23:54.211197Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Nov 1 00:23:54.221871 waagent[1654]: 2025-11-01T00:23:54.221803Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Nov 1 00:23:54.223411 waagent[1654]: 2025-11-01T00:23:54.223357Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Nov 1 00:23:54.224482 waagent[1654]: 2025-11-01T00:23:54.224425Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Nov 1 00:23:54.285409 waagent[1654]: 2025-11-01T00:23:54.285344Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Nov 1 00:23:54.339448 waagent[1654]: 2025-11-01T00:23:54.339314Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1645' Nov 1 00:23:54.624020 waagent[1654]: 2025-11-01T00:23:54.623926Z INFO MonitorHandler ExtHandler Network interfaces: Nov 1 00:23:54.624020 waagent[1654]: Executing ['ip', '-a', '-o', 'link']: Nov 1 00:23:54.624020 waagent[1654]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Nov 1 00:23:54.624020 waagent[1654]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:7a:74:fd brd ff:ff:ff:ff:ff:ff Nov 1 00:23:54.624020 waagent[1654]: 3: enP7267s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:7a:74:fd brd ff:ff:ff:ff:ff:ff\ altname enP7267p0s2 Nov 1 00:23:54.624020 waagent[1654]: Executing ['ip', '-4', '-a', '-o', 'address']: Nov 1 00:23:54.624020 waagent[1654]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Nov 1 00:23:54.624020 waagent[1654]: 2: eth0 inet 10.200.20.12/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Nov 1 00:23:54.624020 waagent[1654]: Executing ['ip', '-6', '-a', '-o', 'address']: Nov 1 00:23:54.624020 waagent[1654]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Nov 1 00:23:54.624020 waagent[1654]: 2: eth0 inet6 fe80::222:48ff:fe7a:74fd/64 scope link \ valid_lft forever preferred_lft forever Nov 1 00:23:54.829612 waagent[1654]: 2025-11-01T00:23:54.829548Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.15.0.1 -- exiting Nov 1 00:23:55.117770 waagent[1571]: 2025-11-01T00:23:55.117606Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Nov 1 00:23:55.124138 waagent[1571]: 2025-11-01T00:23:55.124082Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.15.0.1 to be the latest agent Nov 1 00:23:55.700318 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Nov 1 00:23:55.700490 systemd[1]: Stopped kubelet.service. Nov 1 00:23:55.701882 systemd[1]: Starting kubelet.service... Nov 1 00:23:56.165552 systemd[1]: Started kubelet.service. Nov 1 00:23:56.209401 kubelet[1688]: E1101 00:23:56.209344 1688 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Nov 1 00:23:56.211078 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Nov 1 00:23:56.211211 systemd[1]: kubelet.service: Failed with result 'exit-code'. Nov 1 00:23:56.745128 waagent[1681]: 2025-11-01T00:23:56.745033Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.15.0.1) Nov 1 00:23:56.746244 waagent[1681]: 2025-11-01T00:23:56.746186Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.8 Nov 1 00:23:56.746502 waagent[1681]: 2025-11-01T00:23:56.746453Z INFO ExtHandler ExtHandler Python: 3.9.16 Nov 1 00:23:56.746772 waagent[1681]: 2025-11-01T00:23:56.746722Z INFO ExtHandler ExtHandler CPU Arch: aarch64 Nov 1 00:23:56.761005 waagent[1681]: 2025-11-01T00:23:56.760884Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.8; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: aarch64; systemd: True; systemd_version: systemd 252 (252); LISDrivers: Absent; logrotate: logrotate 3.20.1; Nov 1 00:23:56.761600 waagent[1681]: 2025-11-01T00:23:56.761545Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Nov 1 00:23:56.761906 waagent[1681]: 2025-11-01T00:23:56.761855Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Nov 1 00:23:56.762243 waagent[1681]: 2025-11-01T00:23:56.762191Z INFO ExtHandler ExtHandler Initializing the goal state... Nov 1 00:23:56.776475 waagent[1681]: 2025-11-01T00:23:56.776408Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Nov 1 00:23:56.789119 waagent[1681]: 2025-11-01T00:23:56.789059Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.177 Nov 1 00:23:56.790394 waagent[1681]: 2025-11-01T00:23:56.790337Z INFO ExtHandler Nov 1 00:23:56.790694 waagent[1681]: 2025-11-01T00:23:56.790640Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 6a8ddf4b-60f9-4f3b-8f25-45fec6772796 eTag: 5156383579646525610 source: Fabric] Nov 1 00:23:56.791576 waagent[1681]: 2025-11-01T00:23:56.791521Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Nov 1 00:23:56.793012 waagent[1681]: 2025-11-01T00:23:56.792952Z INFO ExtHandler Nov 1 00:23:56.793276 waagent[1681]: 2025-11-01T00:23:56.793227Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Nov 1 00:23:56.803328 waagent[1681]: 2025-11-01T00:23:56.803279Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Nov 1 00:23:56.803963 waagent[1681]: 2025-11-01T00:23:56.803917Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Nov 1 00:23:56.824685 waagent[1681]: 2025-11-01T00:23:56.824604Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Nov 1 00:23:56.886515 waagent[1681]: 2025-11-01T00:23:56.886387Z INFO ExtHandler Downloaded certificate {'thumbprint': 'F9EF45522247F20F7B94AE8C75703212E459DC63', 'hasPrivateKey': True} Nov 1 00:23:56.888118 waagent[1681]: 2025-11-01T00:23:56.888056Z INFO ExtHandler Fetch goal state from WireServer completed Nov 1 00:23:56.889183 waagent[1681]: 2025-11-01T00:23:56.889126Z INFO ExtHandler ExtHandler Goal state initialization completed. Nov 1 00:23:56.907735 waagent[1681]: 2025-11-01T00:23:56.907609Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.15 3 Sep 2024 (Library: OpenSSL 3.0.15 3 Sep 2024) Nov 1 00:23:56.915886 waagent[1681]: 2025-11-01T00:23:56.915793Z INFO ExtHandler ExtHandler Using iptables [version 1.8.8] to manage firewall rules Nov 1 00:23:56.919541 waagent[1681]: 2025-11-01T00:23:56.919449Z INFO ExtHandler ExtHandler Did not find a legacy firewall rule: ['iptables', '-w', '-t', 'security', '-C', 'OUTPUT', '-d', '168.63.129.16', '-p', 'tcp', '-m', 'conntrack', '--ctstate', 'INVALID,NEW', '-j', 'ACCEPT'] Nov 1 00:23:56.919891 waagent[1681]: 2025-11-01T00:23:56.919837Z INFO ExtHandler ExtHandler Checking state of the firewall Nov 1 00:23:57.359881 waagent[1681]: 2025-11-01T00:23:57.359757Z INFO ExtHandler ExtHandler Created firewall rules for Azure Fabric: Nov 1 00:23:57.359881 waagent[1681]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Nov 1 00:23:57.359881 waagent[1681]: pkts bytes target prot opt in out source destination Nov 1 00:23:57.359881 waagent[1681]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Nov 1 00:23:57.359881 waagent[1681]: pkts bytes target prot opt in out source destination Nov 1 00:23:57.359881 waagent[1681]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Nov 1 00:23:57.359881 waagent[1681]: pkts bytes target prot opt in out source destination Nov 1 00:23:57.359881 waagent[1681]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Nov 1 00:23:57.359881 waagent[1681]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Nov 1 00:23:57.359881 waagent[1681]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Nov 1 00:23:57.361402 waagent[1681]: 2025-11-01T00:23:57.361344Z INFO ExtHandler ExtHandler Setting up persistent firewall rules Nov 1 00:23:57.364445 waagent[1681]: 2025-11-01T00:23:57.364317Z INFO ExtHandler ExtHandler The firewalld service is not present on the system Nov 1 00:23:57.365032 waagent[1681]: 2025-11-01T00:23:57.364975Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up /lib/systemd/system/waagent-network-setup.service Nov 1 00:23:57.365554 waagent[1681]: 2025-11-01T00:23:57.365497Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Nov 1 00:23:57.373529 waagent[1681]: 2025-11-01T00:23:57.373474Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Nov 1 00:23:57.374169 waagent[1681]: 2025-11-01T00:23:57.374112Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Nov 1 00:23:57.382475 waagent[1681]: 2025-11-01T00:23:57.382417Z INFO ExtHandler ExtHandler WALinuxAgent-2.15.0.1 running as process 1681 Nov 1 00:23:57.385975 waagent[1681]: 2025-11-01T00:23:57.385916Z INFO ExtHandler ExtHandler [CGI] Cgroups is not currently supported on ['flatcar', '3510.3.8', '', 'Flatcar Container Linux by Kinvolk'] Nov 1 00:23:57.386912 waagent[1681]: 2025-11-01T00:23:57.386856Z INFO ExtHandler ExtHandler [CGI] Agent will reset the quotas in case cgroup usage went from enabled to disabled Nov 1 00:23:57.387945 waagent[1681]: 2025-11-01T00:23:57.387889Z INFO ExtHandler ExtHandler [CGI] Agent cgroups enabled: False Nov 1 00:23:57.390926 waagent[1681]: 2025-11-01T00:23:57.390867Z INFO ExtHandler ExtHandler Signing certificate written to /var/lib/waagent/microsoft_root_certificate.pem Nov 1 00:23:57.391379 waagent[1681]: 2025-11-01T00:23:57.391326Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: 1. configuration enabled [True], 2. cgroups v1 enabled [False] OR cgroups v2 is in use and v2 resource limiting configuration enabled [False], 3. python supported: [True] Nov 1 00:23:57.393251 waagent[1681]: 2025-11-01T00:23:57.393183Z INFO ExtHandler ExtHandler Starting env monitor service. Nov 1 00:23:57.393507 waagent[1681]: 2025-11-01T00:23:57.393441Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Nov 1 00:23:57.394157 waagent[1681]: 2025-11-01T00:23:57.394077Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Nov 1 00:23:57.394771 waagent[1681]: 2025-11-01T00:23:57.394703Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Nov 1 00:23:57.395531 waagent[1681]: 2025-11-01T00:23:57.395462Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Nov 1 00:23:57.395941 waagent[1681]: 2025-11-01T00:23:57.395880Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Nov 1 00:23:57.396120 waagent[1681]: 2025-11-01T00:23:57.396057Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Nov 1 00:23:57.396120 waagent[1681]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Nov 1 00:23:57.396120 waagent[1681]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Nov 1 00:23:57.396120 waagent[1681]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Nov 1 00:23:57.396120 waagent[1681]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Nov 1 00:23:57.396120 waagent[1681]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Nov 1 00:23:57.396120 waagent[1681]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Nov 1 00:23:57.398686 waagent[1681]: 2025-11-01T00:23:57.398522Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Nov 1 00:23:57.399210 waagent[1681]: 2025-11-01T00:23:57.399146Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Nov 1 00:23:57.399558 waagent[1681]: 2025-11-01T00:23:57.399482Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Nov 1 00:23:57.400222 waagent[1681]: 2025-11-01T00:23:57.400144Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Nov 1 00:23:57.401277 waagent[1681]: 2025-11-01T00:23:57.401211Z INFO EnvHandler ExtHandler Configure routes Nov 1 00:23:57.401508 waagent[1681]: 2025-11-01T00:23:57.401442Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Nov 1 00:23:57.401663 waagent[1681]: 2025-11-01T00:23:57.401586Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Nov 1 00:23:57.402312 waagent[1681]: 2025-11-01T00:23:57.402251Z INFO EnvHandler ExtHandler Gateway:None Nov 1 00:23:57.404651 waagent[1681]: 2025-11-01T00:23:57.404565Z INFO EnvHandler ExtHandler Routes:None Nov 1 00:23:57.421307 waagent[1681]: 2025-11-01T00:23:57.421184Z INFO MonitorHandler ExtHandler Network interfaces: Nov 1 00:23:57.421307 waagent[1681]: Executing ['ip', '-a', '-o', 'link']: Nov 1 00:23:57.421307 waagent[1681]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Nov 1 00:23:57.421307 waagent[1681]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:7a:74:fd brd ff:ff:ff:ff:ff:ff Nov 1 00:23:57.421307 waagent[1681]: 3: enP7267s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:7a:74:fd brd ff:ff:ff:ff:ff:ff\ altname enP7267p0s2 Nov 1 00:23:57.421307 waagent[1681]: Executing ['ip', '-4', '-a', '-o', 'address']: Nov 1 00:23:57.421307 waagent[1681]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Nov 1 00:23:57.421307 waagent[1681]: 2: eth0 inet 10.200.20.12/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Nov 1 00:23:57.421307 waagent[1681]: Executing ['ip', '-6', '-a', '-o', 'address']: Nov 1 00:23:57.421307 waagent[1681]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Nov 1 00:23:57.421307 waagent[1681]: 2: eth0 inet6 fe80::222:48ff:fe7a:74fd/64 scope link \ valid_lft forever preferred_lft forever Nov 1 00:23:57.430816 waagent[1681]: 2025-11-01T00:23:57.430732Z INFO ExtHandler ExtHandler Downloading agent manifest Nov 1 00:23:57.447751 waagent[1681]: 2025-11-01T00:23:57.447666Z INFO ExtHandler ExtHandler Nov 1 00:23:57.448849 waagent[1681]: 2025-11-01T00:23:57.448774Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: e674e6db-342d-4590-a317-84152c2f236c correlation 5b8e20ee-ec83-4c1c-96c6-35b5bb68b3d3 created: 2025-11-01T00:20:17.629379Z] Nov 1 00:23:57.452737 waagent[1681]: 2025-11-01T00:23:57.452668Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Nov 1 00:23:57.459885 waagent[1681]: 2025-11-01T00:23:57.459823Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 12 ms] Nov 1 00:23:57.482090 waagent[1681]: 2025-11-01T00:23:57.482034Z INFO ExtHandler ExtHandler Looking for existing remote access users. Nov 1 00:23:57.484579 waagent[1681]: 2025-11-01T00:23:57.484522Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.15.0.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 426B430B-AB77-4365-A4F0-297F42B9C918;UpdateGSErrors: 0;AutoUpdate: 1;UpdateMode: SelfUpdate;] Nov 1 00:23:57.544333 waagent[1681]: 2025-11-01T00:23:57.544234Z INFO EnvHandler ExtHandler Using iptables [version 1.8.8] to manage firewall rules Nov 1 00:23:57.555193 waagent[1681]: 2025-11-01T00:23:57.555130Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Nov 1 00:24:04.386067 systemd[1]: Created slice system-sshd.slice. Nov 1 00:24:04.387547 systemd[1]: Started sshd@0-10.200.20.12:22-10.200.16.10:53942.service. Nov 1 00:24:05.493916 sshd[1733]: Accepted publickey for core from 10.200.16.10 port 53942 ssh2: RSA SHA256:JyxYDfrWcSc3T/AgB8prmyzM4mqcWmvKVj9wIAiMWXI Nov 1 00:24:05.536887 sshd[1733]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:24:05.540575 systemd-logind[1461]: New session 3 of user core. Nov 1 00:24:05.541037 systemd[1]: Started session-3.scope. Nov 1 00:24:05.884166 systemd[1]: Started sshd@1-10.200.20.12:22-10.200.16.10:53944.service. Nov 1 00:24:06.227341 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Nov 1 00:24:06.227569 systemd[1]: Stopped kubelet.service. Nov 1 00:24:06.228941 systemd[1]: Starting kubelet.service... Nov 1 00:24:06.301016 sshd[1738]: Accepted publickey for core from 10.200.16.10 port 53944 ssh2: RSA SHA256:JyxYDfrWcSc3T/AgB8prmyzM4mqcWmvKVj9wIAiMWXI Nov 1 00:24:06.302375 sshd[1738]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:24:06.306305 systemd-logind[1461]: New session 4 of user core. Nov 1 00:24:06.306762 systemd[1]: Started session-4.scope. Nov 1 00:24:06.560501 systemd[1]: Started kubelet.service. Nov 1 00:24:06.594511 kubelet[1746]: E1101 00:24:06.594471 1746 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Nov 1 00:24:06.596269 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Nov 1 00:24:06.596393 systemd[1]: kubelet.service: Failed with result 'exit-code'. Nov 1 00:24:06.612661 sshd[1738]: pam_unix(sshd:session): session closed for user core Nov 1 00:24:06.614971 systemd[1]: sshd@1-10.200.20.12:22-10.200.16.10:53944.service: Deactivated successfully. Nov 1 00:24:06.615654 systemd[1]: session-4.scope: Deactivated successfully. Nov 1 00:24:06.616183 systemd-logind[1461]: Session 4 logged out. Waiting for processes to exit. Nov 1 00:24:06.617078 systemd-logind[1461]: Removed session 4. Nov 1 00:24:06.680407 systemd[1]: Started sshd@2-10.200.20.12:22-10.200.16.10:53946.service. Nov 1 00:24:07.090449 sshd[1753]: Accepted publickey for core from 10.200.16.10 port 53946 ssh2: RSA SHA256:JyxYDfrWcSc3T/AgB8prmyzM4mqcWmvKVj9wIAiMWXI Nov 1 00:24:07.092051 sshd[1753]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:24:07.096192 systemd[1]: Started session-5.scope. Nov 1 00:24:07.097482 systemd-logind[1461]: New session 5 of user core. Nov 1 00:24:07.394541 sshd[1753]: pam_unix(sshd:session): session closed for user core Nov 1 00:24:07.397317 systemd[1]: sshd@2-10.200.20.12:22-10.200.16.10:53946.service: Deactivated successfully. Nov 1 00:24:07.397990 systemd[1]: session-5.scope: Deactivated successfully. Nov 1 00:24:07.398466 systemd-logind[1461]: Session 5 logged out. Waiting for processes to exit. Nov 1 00:24:07.399126 systemd-logind[1461]: Removed session 5. Nov 1 00:24:07.463130 systemd[1]: Started sshd@3-10.200.20.12:22-10.200.16.10:53950.service. Nov 1 00:24:07.874389 sshd[1759]: Accepted publickey for core from 10.200.16.10 port 53950 ssh2: RSA SHA256:JyxYDfrWcSc3T/AgB8prmyzM4mqcWmvKVj9wIAiMWXI Nov 1 00:24:07.875990 sshd[1759]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:24:07.879701 systemd-logind[1461]: New session 6 of user core. Nov 1 00:24:07.880107 systemd[1]: Started session-6.scope. Nov 1 00:24:08.195348 sshd[1759]: pam_unix(sshd:session): session closed for user core Nov 1 00:24:08.197735 systemd[1]: sshd@3-10.200.20.12:22-10.200.16.10:53950.service: Deactivated successfully. Nov 1 00:24:08.198405 systemd[1]: session-6.scope: Deactivated successfully. Nov 1 00:24:08.198954 systemd-logind[1461]: Session 6 logged out. Waiting for processes to exit. Nov 1 00:24:08.199828 systemd-logind[1461]: Removed session 6. Nov 1 00:24:08.269796 systemd[1]: Started sshd@4-10.200.20.12:22-10.200.16.10:53956.service. Nov 1 00:24:08.718450 sshd[1765]: Accepted publickey for core from 10.200.16.10 port 53956 ssh2: RSA SHA256:JyxYDfrWcSc3T/AgB8prmyzM4mqcWmvKVj9wIAiMWXI Nov 1 00:24:08.721973 sshd[1765]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:24:08.725860 systemd-logind[1461]: New session 7 of user core. Nov 1 00:24:08.726276 systemd[1]: Started session-7.scope. Nov 1 00:24:09.883736 sudo[1768]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Nov 1 00:24:09.883957 sudo[1768]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Nov 1 00:24:10.009816 dbus-daemon[1451]: avc: received setenforce notice (enforcing=1) Nov 1 00:24:10.011576 sudo[1768]: pam_unix(sudo:session): session closed for user root Nov 1 00:24:10.134892 sshd[1765]: pam_unix(sshd:session): session closed for user core Nov 1 00:24:10.137883 systemd[1]: sshd@4-10.200.20.12:22-10.200.16.10:53956.service: Deactivated successfully. Nov 1 00:24:10.138641 systemd[1]: session-7.scope: Deactivated successfully. Nov 1 00:24:10.139217 systemd-logind[1461]: Session 7 logged out. Waiting for processes to exit. Nov 1 00:24:10.140246 systemd-logind[1461]: Removed session 7. Nov 1 00:24:10.204574 systemd[1]: Started sshd@5-10.200.20.12:22-10.200.16.10:55530.service. Nov 1 00:24:10.617737 sshd[1772]: Accepted publickey for core from 10.200.16.10 port 55530 ssh2: RSA SHA256:JyxYDfrWcSc3T/AgB8prmyzM4mqcWmvKVj9wIAiMWXI Nov 1 00:24:10.619386 sshd[1772]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:24:10.623119 systemd-logind[1461]: New session 8 of user core. Nov 1 00:24:10.623540 systemd[1]: Started session-8.scope. Nov 1 00:24:10.856251 sudo[1776]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Nov 1 00:24:10.856781 sudo[1776]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Nov 1 00:24:10.859514 sudo[1776]: pam_unix(sudo:session): session closed for user root Nov 1 00:24:10.863934 sudo[1775]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Nov 1 00:24:10.864147 sudo[1775]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Nov 1 00:24:10.872172 systemd[1]: Stopping audit-rules.service... Nov 1 00:24:10.873336 auditctl[1779]: No rules Nov 1 00:24:10.872000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Nov 1 00:24:10.877322 kernel: kauditd_printk_skb: 2 callbacks suppressed Nov 1 00:24:10.877393 kernel: audit: type=1305 audit(1761956650.872:219): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Nov 1 00:24:10.872000 audit[1779]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc111eb10 a2=420 a3=0 items=0 ppid=1 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:10.882897 systemd[1]: audit-rules.service: Deactivated successfully. Nov 1 00:24:10.883070 systemd[1]: Stopped audit-rules.service. Nov 1 00:24:10.888414 systemd[1]: Starting audit-rules.service... Nov 1 00:24:10.910147 kernel: audit: type=1300 audit(1761956650.872:219): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc111eb10 a2=420 a3=0 items=0 ppid=1 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:10.918797 kernel: audit: type=1327 audit(1761956650.872:219): proctitle=2F7362696E2F617564697463746C002D44 Nov 1 00:24:10.872000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Nov 1 00:24:10.882000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:24:10.934973 kernel: audit: type=1131 audit(1761956650.882:220): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:24:10.935032 augenrules[1796]: No rules Nov 1 00:24:10.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:24:10.935517 systemd[1]: Finished audit-rules.service. Nov 1 00:24:10.937154 sudo[1775]: pam_unix(sudo:session): session closed for user root Nov 1 00:24:10.952283 kernel: audit: type=1130 audit(1761956650.935:221): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:24:10.936000 audit[1775]: USER_END pid=1775 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:24:10.970928 kernel: audit: type=1106 audit(1761956650.936:222): pid=1775 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:24:10.936000 audit[1775]: CRED_DISP pid=1775 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:24:10.987636 kernel: audit: type=1104 audit(1761956650.936:223): pid=1775 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:24:11.033097 sshd[1772]: pam_unix(sshd:session): session closed for user core Nov 1 00:24:11.033000 audit[1772]: USER_END pid=1772 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Nov 1 00:24:11.036060 systemd-logind[1461]: Session 8 logged out. Waiting for processes to exit. Nov 1 00:24:11.036825 systemd[1]: session-8.scope: Deactivated successfully. Nov 1 00:24:11.037822 systemd[1]: sshd@5-10.200.20.12:22-10.200.16.10:55530.service: Deactivated successfully. Nov 1 00:24:11.039110 systemd-logind[1461]: Removed session 8. Nov 1 00:24:11.033000 audit[1772]: CRED_DISP pid=1772 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Nov 1 00:24:11.075813 kernel: audit: type=1106 audit(1761956651.033:224): pid=1772 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Nov 1 00:24:11.075884 kernel: audit: type=1104 audit(1761956651.033:225): pid=1772 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Nov 1 00:24:11.075908 kernel: audit: type=1131 audit(1761956651.033:226): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.12:22-10.200.16.10:55530 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:24:11.033000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.12:22-10.200.16.10:55530 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:24:11.099662 update_engine[1462]: I1101 00:24:11.099038 1462 update_attempter.cc:509] Updating boot flags... Nov 1 00:24:11.100000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.12:22-10.200.16.10:55544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:24:11.101157 systemd[1]: Started sshd@6-10.200.20.12:22-10.200.16.10:55544.service. Nov 1 00:24:11.510000 audit[1803]: USER_ACCT pid=1803 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Nov 1 00:24:11.510826 sshd[1803]: Accepted publickey for core from 10.200.16.10 port 55544 ssh2: RSA SHA256:JyxYDfrWcSc3T/AgB8prmyzM4mqcWmvKVj9wIAiMWXI Nov 1 00:24:11.511000 audit[1803]: CRED_ACQ pid=1803 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Nov 1 00:24:11.511000 audit[1803]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe7210870 a2=3 a3=1 items=0 ppid=1 pid=1803 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:11.511000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Nov 1 00:24:11.512410 sshd[1803]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:24:11.516523 systemd[1]: Started session-9.scope. Nov 1 00:24:11.517597 systemd-logind[1461]: New session 9 of user core. Nov 1 00:24:11.520000 audit[1803]: USER_START pid=1803 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Nov 1 00:24:11.522000 audit[1843]: CRED_ACQ pid=1843 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Nov 1 00:24:11.746000 audit[1844]: USER_ACCT pid=1844 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:24:11.746000 audit[1844]: CRED_REFR pid=1844 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:24:11.746853 sudo[1844]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Nov 1 00:24:11.747065 sudo[1844]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Nov 1 00:24:11.748000 audit[1844]: USER_START pid=1844 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:24:11.796294 systemd[1]: Starting coreos-metadata.service... Nov 1 00:24:11.963679 coreos-metadata[1848]: Nov 01 00:24:11.963 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Nov 1 00:24:11.967010 coreos-metadata[1848]: Nov 01 00:24:11.966 INFO Fetch successful Nov 1 00:24:11.967180 coreos-metadata[1848]: Nov 01 00:24:11.967 INFO Fetching http://168.63.129.16/machine/?comp=goalstate: Attempt #1 Nov 1 00:24:11.969100 coreos-metadata[1848]: Nov 01 00:24:11.969 INFO Fetch successful Nov 1 00:24:11.969419 coreos-metadata[1848]: Nov 01 00:24:11.969 INFO Fetching http://168.63.129.16/machine/ce438294-3092-4756-a640-47452effde5d/74d497cb%2D7065%2D4b7c%2D9c33%2D1b2ede5c3078.%5Fci%2D3510.3.8%2Dn%2Dbde7a9edbb?comp=config&type=sharedConfig&incarnation=1: Attempt #1 Nov 1 00:24:11.971341 coreos-metadata[1848]: Nov 01 00:24:11.971 INFO Fetch successful Nov 1 00:24:12.006282 coreos-metadata[1848]: Nov 01 00:24:12.006 INFO Fetching http://169.254.169.254/metadata/instance/compute/vmSize?api-version=2017-08-01&format=text: Attempt #1 Nov 1 00:24:12.016614 coreos-metadata[1848]: Nov 01 00:24:12.016 INFO Fetch successful Nov 1 00:24:12.025199 systemd[1]: Finished coreos-metadata.service. Nov 1 00:24:12.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:24:12.500911 systemd[1]: Stopped kubelet.service. Nov 1 00:24:12.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:24:12.500000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:24:12.503030 systemd[1]: Starting kubelet.service... Nov 1 00:24:12.534383 systemd[1]: Reloading. Nov 1 00:24:12.617729 /usr/lib/systemd/system-generators/torcx-generator[1901]: time="2025-11-01T00:24:12Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Nov 1 00:24:12.617758 /usr/lib/systemd/system-generators/torcx-generator[1901]: time="2025-11-01T00:24:12Z" level=info msg="torcx already run" Nov 1 00:24:12.698387 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Nov 1 00:24:12.698408 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Nov 1 00:24:12.713760 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Nov 1 00:24:12.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.781000 audit: BPF prog-id=44 op=LOAD Nov 1 00:24:12.781000 audit: BPF prog-id=38 op=UNLOAD Nov 1 00:24:12.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.781000 audit: BPF prog-id=45 op=LOAD Nov 1 00:24:12.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.781000 audit: BPF prog-id=46 op=LOAD Nov 1 00:24:12.781000 audit: BPF prog-id=39 op=UNLOAD Nov 1 00:24:12.781000 audit: BPF prog-id=40 op=UNLOAD Nov 1 00:24:12.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.782000 audit: BPF prog-id=47 op=LOAD Nov 1 00:24:12.782000 audit: BPF prog-id=43 op=UNLOAD Nov 1 00:24:12.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.784000 audit: BPF prog-id=48 op=LOAD Nov 1 00:24:12.784000 audit: BPF prog-id=28 op=UNLOAD Nov 1 00:24:12.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.784000 audit: BPF prog-id=49 op=LOAD Nov 1 00:24:12.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.784000 audit: BPF prog-id=50 op=LOAD Nov 1 00:24:12.784000 audit: BPF prog-id=29 op=UNLOAD Nov 1 00:24:12.784000 audit: BPF prog-id=30 op=UNLOAD Nov 1 00:24:12.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.785000 audit: BPF prog-id=51 op=LOAD Nov 1 00:24:12.785000 audit: BPF prog-id=36 op=UNLOAD Nov 1 00:24:12.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.785000 audit: BPF prog-id=52 op=LOAD Nov 1 00:24:12.785000 audit: BPF prog-id=31 op=UNLOAD Nov 1 00:24:12.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.786000 audit: BPF prog-id=53 op=LOAD Nov 1 00:24:12.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.786000 audit: BPF prog-id=54 op=LOAD Nov 1 00:24:12.786000 audit: BPF prog-id=32 op=UNLOAD Nov 1 00:24:12.786000 audit: BPF prog-id=33 op=UNLOAD Nov 1 00:24:12.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.786000 audit: BPF prog-id=55 op=LOAD Nov 1 00:24:12.786000 audit: BPF prog-id=41 op=UNLOAD Nov 1 00:24:12.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.788000 audit: BPF prog-id=56 op=LOAD Nov 1 00:24:12.788000 audit: BPF prog-id=37 op=UNLOAD Nov 1 00:24:12.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.788000 audit: BPF prog-id=57 op=LOAD Nov 1 00:24:12.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:12.788000 audit: BPF prog-id=58 op=LOAD Nov 1 00:24:12.788000 audit: BPF prog-id=34 op=UNLOAD Nov 1 00:24:12.788000 audit: BPF prog-id=35 op=UNLOAD Nov 1 00:24:12.809000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:24:12.811177 systemd[1]: Stopping kubelet.service... Nov 1 00:24:12.812132 systemd[1]: kubelet.service: Deactivated successfully. Nov 1 00:24:12.812310 systemd[1]: Stopped kubelet.service. Nov 1 00:24:12.811000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:24:12.813876 systemd[1]: Starting kubelet.service... Nov 1 00:24:13.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:24:13.030588 systemd[1]: Started kubelet.service. Nov 1 00:24:13.175826 kubelet[1967]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Nov 1 00:24:13.176182 kubelet[1967]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Nov 1 00:24:13.176232 kubelet[1967]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Nov 1 00:24:13.176374 kubelet[1967]: I1101 00:24:13.176345 1967 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Nov 1 00:24:14.350765 kubelet[1967]: I1101 00:24:14.350722 1967 server.go:520] "Kubelet version" kubeletVersion="v1.32.4" Nov 1 00:24:14.350765 kubelet[1967]: I1101 00:24:14.350755 1967 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Nov 1 00:24:14.351120 kubelet[1967]: I1101 00:24:14.351030 1967 server.go:954] "Client rotation is on, will bootstrap in background" Nov 1 00:24:14.378603 kubelet[1967]: I1101 00:24:14.378515 1967 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Nov 1 00:24:14.385937 kubelet[1967]: E1101 00:24:14.385892 1967 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Nov 1 00:24:14.385937 kubelet[1967]: I1101 00:24:14.385925 1967 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Nov 1 00:24:14.389583 kubelet[1967]: I1101 00:24:14.389563 1967 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Nov 1 00:24:14.390568 kubelet[1967]: I1101 00:24:14.390528 1967 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Nov 1 00:24:14.390925 kubelet[1967]: I1101 00:24:14.390678 1967 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.200.20.12","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Nov 1 00:24:14.391079 kubelet[1967]: I1101 00:24:14.391065 1967 topology_manager.go:138] "Creating topology manager with none policy" Nov 1 00:24:14.391137 kubelet[1967]: I1101 00:24:14.391128 1967 container_manager_linux.go:304] "Creating device plugin manager" Nov 1 00:24:14.391334 kubelet[1967]: I1101 00:24:14.391320 1967 state_mem.go:36] "Initialized new in-memory state store" Nov 1 00:24:14.395524 kubelet[1967]: I1101 00:24:14.395502 1967 kubelet.go:446] "Attempting to sync node with API server" Nov 1 00:24:14.395695 kubelet[1967]: I1101 00:24:14.395683 1967 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" Nov 1 00:24:14.395787 kubelet[1967]: I1101 00:24:14.395776 1967 kubelet.go:352] "Adding apiserver pod source" Nov 1 00:24:14.395852 kubelet[1967]: I1101 00:24:14.395842 1967 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Nov 1 00:24:14.399609 kubelet[1967]: E1101 00:24:14.399585 1967 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:24:14.399719 kubelet[1967]: E1101 00:24:14.399698 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:24:14.402687 kubelet[1967]: I1101 00:24:14.402661 1967 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Nov 1 00:24:14.403219 kubelet[1967]: I1101 00:24:14.403196 1967 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Nov 1 00:24:14.403274 kubelet[1967]: W1101 00:24:14.403257 1967 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Nov 1 00:24:14.403897 kubelet[1967]: I1101 00:24:14.403876 1967 watchdog_linux.go:99] "Systemd watchdog is not enabled" Nov 1 00:24:14.403966 kubelet[1967]: I1101 00:24:14.403913 1967 server.go:1287] "Started kubelet" Nov 1 00:24:14.406344 kubelet[1967]: I1101 00:24:14.406307 1967 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 Nov 1 00:24:14.406000 audit[1967]: AVC avc: denied { mac_admin } for pid=1967 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:14.406000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Nov 1 00:24:14.406000 audit[1967]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400089bb30 a1=40007fd308 a2=400089bb00 a3=25 items=0 ppid=1 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:14.406000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Nov 1 00:24:14.407188 kubelet[1967]: I1101 00:24:14.406872 1967 kubelet.go:1507] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Nov 1 00:24:14.406000 audit[1967]: AVC avc: denied { mac_admin } for pid=1967 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:14.406000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Nov 1 00:24:14.406000 audit[1967]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000aa1160 a1=40007fd320 a2=400089bbc0 a3=25 items=0 ppid=1 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:14.406000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Nov 1 00:24:14.407374 kubelet[1967]: I1101 00:24:14.407207 1967 kubelet.go:1511] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Nov 1 00:24:14.407374 kubelet[1967]: I1101 00:24:14.407288 1967 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Nov 1 00:24:14.407841 kubelet[1967]: I1101 00:24:14.407823 1967 server.go:479] "Adding debug handlers to kubelet server" Nov 1 00:24:14.409527 kubelet[1967]: I1101 00:24:14.409471 1967 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Nov 1 00:24:14.409845 kubelet[1967]: I1101 00:24:14.409827 1967 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Nov 1 00:24:14.409000 audit[1980]: NETFILTER_CFG table=mangle:5 family=2 entries=2 op=nft_register_chain pid=1980 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:24:14.409000 audit[1980]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffcc42c3a0 a2=0 a3=1 items=0 ppid=1967 pid=1980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:14.409000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Nov 1 00:24:14.410000 audit[1981]: NETFILTER_CFG table=filter:6 family=2 entries=2 op=nft_register_chain pid=1981 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:24:14.410000 audit[1981]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffc23d5290 a2=0 a3=1 items=0 ppid=1967 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:14.410000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Nov 1 00:24:14.411911 kubelet[1967]: I1101 00:24:14.411858 1967 volume_manager.go:297] "Starting Kubelet Volume Manager" Nov 1 00:24:14.412177 kubelet[1967]: E1101 00:24:14.412146 1967 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Nov 1 00:24:14.414000 audit[1983]: NETFILTER_CFG table=filter:7 family=2 entries=2 op=nft_register_chain pid=1983 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:24:14.414000 audit[1983]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffffd8a3420 a2=0 a3=1 items=0 ppid=1967 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:14.414000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Nov 1 00:24:14.416578 kubelet[1967]: I1101 00:24:14.416556 1967 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Nov 1 00:24:14.421791 kubelet[1967]: I1101 00:24:14.421769 1967 factory.go:221] Registration of the systemd container factory successfully Nov 1 00:24:14.421978 kubelet[1967]: I1101 00:24:14.421960 1967 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Nov 1 00:24:14.422115 kubelet[1967]: I1101 00:24:14.422088 1967 reconciler.go:26] "Reconciler: start to sync state" Nov 1 00:24:14.422549 kubelet[1967]: I1101 00:24:14.422021 1967 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Nov 1 00:24:14.422000 audit[1985]: NETFILTER_CFG table=filter:8 family=2 entries=2 op=nft_register_chain pid=1985 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:24:14.422000 audit[1985]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffc2469d20 a2=0 a3=1 items=0 ppid=1967 pid=1985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:14.422000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Nov 1 00:24:14.425334 kubelet[1967]: I1101 00:24:14.425312 1967 factory.go:221] Registration of the containerd container factory successfully Nov 1 00:24:14.434115 kubelet[1967]: W1101 00:24:14.434093 1967 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "10.200.20.12" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Nov 1 00:24:14.434315 kubelet[1967]: E1101 00:24:14.434297 1967 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes \"10.200.20.12\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" Nov 1 00:24:14.434500 kubelet[1967]: W1101 00:24:14.434484 1967 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Nov 1 00:24:14.434584 kubelet[1967]: E1101 00:24:14.434572 1967 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" Nov 1 00:24:14.436076 kubelet[1967]: E1101 00:24:14.436042 1967 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.200.20.12\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Nov 1 00:24:14.436336 kubelet[1967]: E1101 00:24:14.436223 1967 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.200.20.12.1873ba3def613b07 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.200.20.12,UID:10.200.20.12,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:10.200.20.12,},FirstTimestamp:2025-11-01 00:24:14.403894023 +0000 UTC m=+1.369401327,LastTimestamp:2025-11-01 00:24:14.403894023 +0000 UTC m=+1.369401327,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.200.20.12,}" Nov 1 00:24:14.438960 kubelet[1967]: I1101 00:24:14.438915 1967 cpu_manager.go:221] "Starting CPU manager" policy="none" Nov 1 00:24:14.438960 kubelet[1967]: I1101 00:24:14.438940 1967 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Nov 1 00:24:14.438960 kubelet[1967]: I1101 00:24:14.438957 1967 state_mem.go:36] "Initialized new in-memory state store" Nov 1 00:24:14.445099 kubelet[1967]: I1101 00:24:14.445066 1967 policy_none.go:49] "None policy: Start" Nov 1 00:24:14.445099 kubelet[1967]: I1101 00:24:14.445093 1967 memory_manager.go:186] "Starting memorymanager" policy="None" Nov 1 00:24:14.445099 kubelet[1967]: I1101 00:24:14.445104 1967 state_mem.go:35] "Initializing new in-memory state store" Nov 1 00:24:14.446889 kubelet[1967]: E1101 00:24:14.446808 1967 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.200.20.12.1873ba3df16db4c0 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.200.20.12,UID:10.200.20.12,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientMemory,Message:Node 10.200.20.12 status is now: NodeHasSufficientMemory,Source:EventSource{Component:kubelet,Host:10.200.20.12,},FirstTimestamp:2025-11-01 00:24:14.438266048 +0000 UTC m=+1.403773352,LastTimestamp:2025-11-01 00:24:14.438266048 +0000 UTC m=+1.403773352,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.200.20.12,}" Nov 1 00:24:14.447180 kubelet[1967]: W1101 00:24:14.447159 1967 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Nov 1 00:24:14.447219 kubelet[1967]: E1101 00:24:14.447191 1967 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User \"system:anonymous\" cannot list resource \"csidrivers\" in API group \"storage.k8s.io\" at the cluster scope" logger="UnhandledError" Nov 1 00:24:14.453815 systemd[1]: Created slice kubepods.slice. Nov 1 00:24:14.458144 systemd[1]: Created slice kubepods-burstable.slice. Nov 1 00:24:14.461191 systemd[1]: Created slice kubepods-besteffort.slice. Nov 1 00:24:14.470433 kubelet[1967]: I1101 00:24:14.470401 1967 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Nov 1 00:24:14.469000 audit[1967]: AVC avc: denied { mac_admin } for pid=1967 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:14.469000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Nov 1 00:24:14.469000 audit[1967]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000de8b10 a1=4000de45d0 a2=4000de8ae0 a3=25 items=0 ppid=1 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:14.469000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Nov 1 00:24:14.470714 kubelet[1967]: I1101 00:24:14.470472 1967 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" Nov 1 00:24:14.470714 kubelet[1967]: I1101 00:24:14.470591 1967 eviction_manager.go:189] "Eviction manager: starting control loop" Nov 1 00:24:14.470714 kubelet[1967]: I1101 00:24:14.470639 1967 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Nov 1 00:24:14.471359 kubelet[1967]: I1101 00:24:14.471296 1967 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Nov 1 00:24:14.473250 kubelet[1967]: E1101 00:24:14.473206 1967 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Nov 1 00:24:14.473250 kubelet[1967]: E1101 00:24:14.473242 1967 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.200.20.12\" not found" Nov 1 00:24:14.571886 kubelet[1967]: I1101 00:24:14.571854 1967 kubelet_node_status.go:75] "Attempting to register node" node="10.200.20.12" Nov 1 00:24:14.587868 kubelet[1967]: I1101 00:24:14.587841 1967 kubelet_node_status.go:78] "Successfully registered node" node="10.200.20.12" Nov 1 00:24:14.588022 kubelet[1967]: E1101 00:24:14.588005 1967 kubelet_node_status.go:548] "Error updating node status, will retry" err="error getting node \"10.200.20.12\": node \"10.200.20.12\" not found" Nov 1 00:24:14.632000 audit[1992]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1992 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:24:14.632000 audit[1992]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffe8c735e0 a2=0 a3=1 items=0 ppid=1967 pid=1992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:14.632000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Nov 1 00:24:14.634441 kubelet[1967]: I1101 00:24:14.634377 1967 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Nov 1 00:24:14.635000 audit[1993]: NETFILTER_CFG table=mangle:10 family=10 entries=2 op=nft_register_chain pid=1993 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:24:14.635000 audit[1993]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd612a020 a2=0 a3=1 items=0 ppid=1967 pid=1993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:14.635000 audit[1994]: NETFILTER_CFG table=mangle:11 family=2 entries=1 op=nft_register_chain pid=1994 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:24:14.635000 audit[1994]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc9d080b0 a2=0 a3=1 items=0 ppid=1967 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:14.635000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Nov 1 00:24:14.635000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Nov 1 00:24:14.637225 kubelet[1967]: I1101 00:24:14.637196 1967 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Nov 1 00:24:14.637225 kubelet[1967]: I1101 00:24:14.637224 1967 status_manager.go:227] "Starting to sync pod status with apiserver" Nov 1 00:24:14.637314 kubelet[1967]: I1101 00:24:14.637243 1967 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Nov 1 00:24:14.637314 kubelet[1967]: I1101 00:24:14.637250 1967 kubelet.go:2382] "Starting kubelet main sync loop" Nov 1 00:24:14.637385 kubelet[1967]: E1101 00:24:14.637365 1967 kubelet.go:2406] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Nov 1 00:24:14.638180 kubelet[1967]: E1101 00:24:14.638162 1967 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Nov 1 00:24:14.638000 audit[1995]: NETFILTER_CFG table=nat:12 family=2 entries=2 op=nft_register_chain pid=1995 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:24:14.638000 audit[1995]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=fffffbb11a70 a2=0 a3=1 items=0 ppid=1967 pid=1995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:14.638000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Nov 1 00:24:14.638000 audit[1996]: NETFILTER_CFG table=mangle:13 family=10 entries=1 op=nft_register_chain pid=1996 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:24:14.638000 audit[1996]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc8a033f0 a2=0 a3=1 items=0 ppid=1967 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:14.638000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Nov 1 00:24:14.639000 audit[1997]: NETFILTER_CFG table=filter:14 family=2 entries=1 op=nft_register_chain pid=1997 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:24:14.639000 audit[1997]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffeb806760 a2=0 a3=1 items=0 ppid=1967 pid=1997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:14.639000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Nov 1 00:24:14.640000 audit[1998]: NETFILTER_CFG table=nat:15 family=10 entries=2 op=nft_register_chain pid=1998 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:24:14.640000 audit[1998]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffebca0bf0 a2=0 a3=1 items=0 ppid=1967 pid=1998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:14.640000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Nov 1 00:24:14.641000 audit[1999]: NETFILTER_CFG table=filter:16 family=10 entries=2 op=nft_register_chain pid=1999 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:24:14.641000 audit[1999]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffce3b5340 a2=0 a3=1 items=0 ppid=1967 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:14.641000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Nov 1 00:24:14.739214 kubelet[1967]: E1101 00:24:14.739182 1967 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Nov 1 00:24:14.839975 kubelet[1967]: E1101 00:24:14.839949 1967 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Nov 1 00:24:14.941128 kubelet[1967]: E1101 00:24:14.941021 1967 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Nov 1 00:24:15.041884 kubelet[1967]: E1101 00:24:15.041715 1967 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Nov 1 00:24:15.072919 sudo[1844]: pam_unix(sudo:session): session closed for user root Nov 1 00:24:15.072000 audit[1844]: USER_END pid=1844 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:24:15.072000 audit[1844]: CRED_DISP pid=1844 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:24:15.142357 kubelet[1967]: E1101 00:24:15.142320 1967 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Nov 1 00:24:15.153477 sshd[1803]: pam_unix(sshd:session): session closed for user core Nov 1 00:24:15.154000 audit[1803]: USER_END pid=1803 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Nov 1 00:24:15.154000 audit[1803]: CRED_DISP pid=1803 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Nov 1 00:24:15.156662 systemd[1]: sshd@6-10.200.20.12:22-10.200.16.10:55544.service: Deactivated successfully. Nov 1 00:24:15.156000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.12:22-10.200.16.10:55544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:24:15.157361 systemd[1]: session-9.scope: Deactivated successfully. Nov 1 00:24:15.157896 systemd-logind[1461]: Session 9 logged out. Waiting for processes to exit. Nov 1 00:24:15.158890 systemd-logind[1461]: Removed session 9. Nov 1 00:24:15.242938 kubelet[1967]: E1101 00:24:15.242909 1967 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Nov 1 00:24:15.343618 kubelet[1967]: E1101 00:24:15.343588 1967 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Nov 1 00:24:15.353013 kubelet[1967]: I1101 00:24:15.352991 1967 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Nov 1 00:24:15.353525 kubelet[1967]: W1101 00:24:15.353507 1967 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Nov 1 00:24:15.353647 kubelet[1967]: W1101 00:24:15.353614 1967 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.Node ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Nov 1 00:24:15.400315 kubelet[1967]: E1101 00:24:15.400276 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:24:15.404587 kubelet[1967]: I1101 00:24:15.404573 1967 apiserver.go:52] "Watching apiserver" Nov 1 00:24:15.417294 kubelet[1967]: E1101 00:24:15.417186 1967 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xmn5c" podUID="98274ee7-d1d6-4f2e-b0fd-446126b657a6" Nov 1 00:24:15.421953 systemd[1]: Created slice kubepods-besteffort-pod98576993_4b56_4dc2_9df5_d660596978cc.slice. Nov 1 00:24:15.423002 kubelet[1967]: I1101 00:24:15.422910 1967 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Nov 1 00:24:15.427593 kubelet[1967]: I1101 00:24:15.427559 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d5588874-0d5a-41d6-8f9b-adc4f1e65009-tigera-ca-bundle\") pod \"calico-node-n97dw\" (UID: \"d5588874-0d5a-41d6-8f9b-adc4f1e65009\") " pod="calico-system/calico-node-n97dw" Nov 1 00:24:15.429056 kubelet[1967]: I1101 00:24:15.429028 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/98576993-4b56-4dc2-9df5-d660596978cc-xtables-lock\") pod \"kube-proxy-dhjnb\" (UID: \"98576993-4b56-4dc2-9df5-d660596978cc\") " pod="kube-system/kube-proxy-dhjnb" Nov 1 00:24:15.429208 kubelet[1967]: I1101 00:24:15.429140 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/d5588874-0d5a-41d6-8f9b-adc4f1e65009-var-run-calico\") pod \"calico-node-n97dw\" (UID: \"d5588874-0d5a-41d6-8f9b-adc4f1e65009\") " pod="calico-system/calico-node-n97dw" Nov 1 00:24:15.429208 kubelet[1967]: I1101 00:24:15.429173 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/d5588874-0d5a-41d6-8f9b-adc4f1e65009-xtables-lock\") pod \"calico-node-n97dw\" (UID: \"d5588874-0d5a-41d6-8f9b-adc4f1e65009\") " pod="calico-system/calico-node-n97dw" Nov 1 00:24:15.430034 kubelet[1967]: I1101 00:24:15.429848 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/98274ee7-d1d6-4f2e-b0fd-446126b657a6-kubelet-dir\") pod \"csi-node-driver-xmn5c\" (UID: \"98274ee7-d1d6-4f2e-b0fd-446126b657a6\") " pod="calico-system/csi-node-driver-xmn5c" Nov 1 00:24:15.430034 kubelet[1967]: I1101 00:24:15.429908 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/98274ee7-d1d6-4f2e-b0fd-446126b657a6-varrun\") pod \"csi-node-driver-xmn5c\" (UID: \"98274ee7-d1d6-4f2e-b0fd-446126b657a6\") " pod="calico-system/csi-node-driver-xmn5c" Nov 1 00:24:15.430034 kubelet[1967]: I1101 00:24:15.429927 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4w7h7\" (UniqueName: \"kubernetes.io/projected/98576993-4b56-4dc2-9df5-d660596978cc-kube-api-access-4w7h7\") pod \"kube-proxy-dhjnb\" (UID: \"98576993-4b56-4dc2-9df5-d660596978cc\") " pod="kube-system/kube-proxy-dhjnb" Nov 1 00:24:15.430034 kubelet[1967]: I1101 00:24:15.429945 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/d5588874-0d5a-41d6-8f9b-adc4f1e65009-cni-bin-dir\") pod \"calico-node-n97dw\" (UID: \"d5588874-0d5a-41d6-8f9b-adc4f1e65009\") " pod="calico-system/calico-node-n97dw" Nov 1 00:24:15.430034 kubelet[1967]: I1101 00:24:15.429996 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/d5588874-0d5a-41d6-8f9b-adc4f1e65009-cni-net-dir\") pod \"calico-node-n97dw\" (UID: \"d5588874-0d5a-41d6-8f9b-adc4f1e65009\") " pod="calico-system/calico-node-n97dw" Nov 1 00:24:15.430668 systemd[1]: Created slice kubepods-besteffort-podd5588874_0d5a_41d6_8f9b_adc4f1e65009.slice. Nov 1 00:24:15.431228 kubelet[1967]: I1101 00:24:15.430809 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-65pwb\" (UniqueName: \"kubernetes.io/projected/98274ee7-d1d6-4f2e-b0fd-446126b657a6-kube-api-access-65pwb\") pod \"csi-node-driver-xmn5c\" (UID: \"98274ee7-d1d6-4f2e-b0fd-446126b657a6\") " pod="calico-system/csi-node-driver-xmn5c" Nov 1 00:24:15.431228 kubelet[1967]: I1101 00:24:15.430845 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/98576993-4b56-4dc2-9df5-d660596978cc-lib-modules\") pod \"kube-proxy-dhjnb\" (UID: \"98576993-4b56-4dc2-9df5-d660596978cc\") " pod="kube-system/kube-proxy-dhjnb" Nov 1 00:24:15.431228 kubelet[1967]: I1101 00:24:15.430864 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/d5588874-0d5a-41d6-8f9b-adc4f1e65009-cni-log-dir\") pod \"calico-node-n97dw\" (UID: \"d5588874-0d5a-41d6-8f9b-adc4f1e65009\") " pod="calico-system/calico-node-n97dw" Nov 1 00:24:15.431228 kubelet[1967]: I1101 00:24:15.430877 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/d5588874-0d5a-41d6-8f9b-adc4f1e65009-lib-modules\") pod \"calico-node-n97dw\" (UID: \"d5588874-0d5a-41d6-8f9b-adc4f1e65009\") " pod="calico-system/calico-node-n97dw" Nov 1 00:24:15.431228 kubelet[1967]: I1101 00:24:15.430897 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/d5588874-0d5a-41d6-8f9b-adc4f1e65009-policysync\") pod \"calico-node-n97dw\" (UID: \"d5588874-0d5a-41d6-8f9b-adc4f1e65009\") " pod="calico-system/calico-node-n97dw" Nov 1 00:24:15.431353 kubelet[1967]: I1101 00:24:15.430911 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/d5588874-0d5a-41d6-8f9b-adc4f1e65009-var-lib-calico\") pod \"calico-node-n97dw\" (UID: \"d5588874-0d5a-41d6-8f9b-adc4f1e65009\") " pod="calico-system/calico-node-n97dw" Nov 1 00:24:15.431353 kubelet[1967]: I1101 00:24:15.430926 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-v9l2v\" (UniqueName: \"kubernetes.io/projected/d5588874-0d5a-41d6-8f9b-adc4f1e65009-kube-api-access-v9l2v\") pod \"calico-node-n97dw\" (UID: \"d5588874-0d5a-41d6-8f9b-adc4f1e65009\") " pod="calico-system/calico-node-n97dw" Nov 1 00:24:15.431353 kubelet[1967]: I1101 00:24:15.430940 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/98274ee7-d1d6-4f2e-b0fd-446126b657a6-registration-dir\") pod \"csi-node-driver-xmn5c\" (UID: \"98274ee7-d1d6-4f2e-b0fd-446126b657a6\") " pod="calico-system/csi-node-driver-xmn5c" Nov 1 00:24:15.431353 kubelet[1967]: I1101 00:24:15.430963 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/98274ee7-d1d6-4f2e-b0fd-446126b657a6-socket-dir\") pod \"csi-node-driver-xmn5c\" (UID: \"98274ee7-d1d6-4f2e-b0fd-446126b657a6\") " pod="calico-system/csi-node-driver-xmn5c" Nov 1 00:24:15.431353 kubelet[1967]: I1101 00:24:15.430980 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/98576993-4b56-4dc2-9df5-d660596978cc-kube-proxy\") pod \"kube-proxy-dhjnb\" (UID: \"98576993-4b56-4dc2-9df5-d660596978cc\") " pod="kube-system/kube-proxy-dhjnb" Nov 1 00:24:15.431457 kubelet[1967]: I1101 00:24:15.430996 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/d5588874-0d5a-41d6-8f9b-adc4f1e65009-flexvol-driver-host\") pod \"calico-node-n97dw\" (UID: \"d5588874-0d5a-41d6-8f9b-adc4f1e65009\") " pod="calico-system/calico-node-n97dw" Nov 1 00:24:15.431457 kubelet[1967]: I1101 00:24:15.431011 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/d5588874-0d5a-41d6-8f9b-adc4f1e65009-node-certs\") pod \"calico-node-n97dw\" (UID: \"d5588874-0d5a-41d6-8f9b-adc4f1e65009\") " pod="calico-system/calico-node-n97dw" Nov 1 00:24:15.444431 kubelet[1967]: I1101 00:24:15.444405 1967 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Nov 1 00:24:15.444826 env[1473]: time="2025-11-01T00:24:15.444733693Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Nov 1 00:24:15.445078 kubelet[1967]: I1101 00:24:15.445048 1967 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Nov 1 00:24:15.535668 kubelet[1967]: I1101 00:24:15.534606 1967 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Nov 1 00:24:15.550113 kubelet[1967]: E1101 00:24:15.550090 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:24:15.550258 kubelet[1967]: W1101 00:24:15.550243 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:24:15.550325 kubelet[1967]: E1101 00:24:15.550313 1967 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:24:15.563045 kubelet[1967]: E1101 00:24:15.563025 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:24:15.563180 kubelet[1967]: W1101 00:24:15.563166 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:24:15.563265 kubelet[1967]: E1101 00:24:15.563253 1967 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:24:15.566366 kubelet[1967]: E1101 00:24:15.565520 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:24:15.566366 kubelet[1967]: W1101 00:24:15.565537 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:24:15.566366 kubelet[1967]: E1101 00:24:15.565557 1967 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:24:15.566366 kubelet[1967]: E1101 00:24:15.565746 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:24:15.566366 kubelet[1967]: W1101 00:24:15.565755 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:24:15.566366 kubelet[1967]: E1101 00:24:15.565765 1967 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:24:15.566799 kubelet[1967]: E1101 00:24:15.566778 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:24:15.566799 kubelet[1967]: W1101 00:24:15.566795 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:24:15.566888 kubelet[1967]: E1101 00:24:15.566807 1967 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:24:15.730070 env[1473]: time="2025-11-01T00:24:15.730014819Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-dhjnb,Uid:98576993-4b56-4dc2-9df5-d660596978cc,Namespace:kube-system,Attempt:0,}" Nov 1 00:24:15.735119 env[1473]: time="2025-11-01T00:24:15.734989268Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-n97dw,Uid:d5588874-0d5a-41d6-8f9b-adc4f1e65009,Namespace:calico-system,Attempt:0,}" Nov 1 00:24:16.400605 kubelet[1967]: E1101 00:24:16.400563 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:24:17.401707 kubelet[1967]: E1101 00:24:17.401669 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:24:17.637810 kubelet[1967]: E1101 00:24:17.637769 1967 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xmn5c" podUID="98274ee7-d1d6-4f2e-b0fd-446126b657a6" Nov 1 00:24:18.402189 kubelet[1967]: E1101 00:24:18.402157 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:24:19.402719 kubelet[1967]: E1101 00:24:19.402681 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:24:19.638209 kubelet[1967]: E1101 00:24:19.638158 1967 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xmn5c" podUID="98274ee7-d1d6-4f2e-b0fd-446126b657a6" Nov 1 00:24:20.403572 kubelet[1967]: E1101 00:24:20.403537 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:24:21.404851 kubelet[1967]: E1101 00:24:21.404817 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:24:21.637791 kubelet[1967]: E1101 00:24:21.637742 1967 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xmn5c" podUID="98274ee7-d1d6-4f2e-b0fd-446126b657a6" Nov 1 00:24:22.405797 kubelet[1967]: E1101 00:24:22.405762 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:24:23.350667 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3382703735.mount: Deactivated successfully. Nov 1 00:24:23.372572 env[1473]: time="2025-11-01T00:24:23.372525857Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:24:23.384612 env[1473]: time="2025-11-01T00:24:23.384548035Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:24:23.389753 env[1473]: time="2025-11-01T00:24:23.389725763Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:24:23.396301 env[1473]: time="2025-11-01T00:24:23.396272412Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:24:23.400171 env[1473]: time="2025-11-01T00:24:23.400136218Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:24:23.403379 env[1473]: time="2025-11-01T00:24:23.403352223Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:24:23.406108 kubelet[1967]: E1101 00:24:23.406056 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:24:23.411558 env[1473]: time="2025-11-01T00:24:23.411517195Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:24:23.412186 env[1473]: time="2025-11-01T00:24:23.412161716Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:24:23.482114 env[1473]: time="2025-11-01T00:24:23.482046300Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 00:24:23.482114 env[1473]: time="2025-11-01T00:24:23.482085220Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 00:24:23.482366 env[1473]: time="2025-11-01T00:24:23.482095980Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 00:24:23.482580 env[1473]: time="2025-11-01T00:24:23.482539820Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1e1abcb2eb76d2de544d3397c744990f93c2c59073f32de611821360a0410468 pid=2018 runtime=io.containerd.runc.v2 Nov 1 00:24:23.502291 systemd[1]: Started cri-containerd-1e1abcb2eb76d2de544d3397c744990f93c2c59073f32de611821360a0410468.scope. Nov 1 00:24:23.509569 env[1473]: time="2025-11-01T00:24:23.509381900Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 00:24:23.509569 env[1473]: time="2025-11-01T00:24:23.509418980Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 00:24:23.509569 env[1473]: time="2025-11-01T00:24:23.509432980Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 00:24:23.509808 env[1473]: time="2025-11-01T00:24:23.509591461Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fbe3d4b7c52f6e24516e0efcd151132d33ae194ac95d4afc33bc936f02059c95 pid=2045 runtime=io.containerd.runc.v2 Nov 1 00:24:23.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.518377 kernel: kauditd_printk_skb: 242 callbacks suppressed Nov 1 00:24:23.518467 kernel: audit: type=1400 audit(1761956663.513:434): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.547794 kernel: audit: type=1400 audit(1761956663.513:435): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.563684 kernel: audit: type=1400 audit(1761956663.513:436): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.566015 systemd[1]: Started cri-containerd-fbe3d4b7c52f6e24516e0efcd151132d33ae194ac95d4afc33bc936f02059c95.scope. Nov 1 00:24:23.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.583422 kernel: audit: type=1400 audit(1761956663.513:437): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.583521 kernel: audit: type=1400 audit(1761956663.513:438): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.617801 kernel: audit: type=1400 audit(1761956663.513:439): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.635545 kernel: audit: type=1400 audit(1761956663.513:440): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.638744 kubelet[1967]: E1101 00:24:23.638329 1967 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xmn5c" podUID="98274ee7-d1d6-4f2e-b0fd-446126b657a6" Nov 1 00:24:23.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.665429 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Nov 1 00:24:23.665554 kernel: audit: type=1400 audit(1761956663.513:441): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.665581 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Nov 1 00:24:23.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.513000 audit: BPF prog-id=59 op=LOAD Nov 1 00:24:23.513000 audit[2029]: AVC avc: denied { bpf } for pid=2029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.513000 audit[2029]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2018 pid=2029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:23.513000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165316162636232656237366432646535343464333339376337343439 Nov 1 00:24:23.513000 audit[2029]: AVC avc: denied { perfmon } for pid=2029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.513000 audit[2029]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2018 pid=2029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:23.513000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165316162636232656237366432646535343464333339376337343439 Nov 1 00:24:23.513000 audit[2029]: AVC avc: denied { bpf } for pid=2029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.513000 audit[2029]: AVC avc: denied { bpf } for pid=2029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.513000 audit[2029]: AVC avc: denied { bpf } for pid=2029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.513000 audit[2029]: AVC avc: denied { perfmon } for pid=2029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.513000 audit[2029]: AVC avc: denied { perfmon } for pid=2029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.513000 audit[2029]: AVC avc: denied { perfmon } for pid=2029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.513000 audit[2029]: AVC avc: denied { perfmon } for pid=2029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.513000 audit[2029]: AVC avc: denied { perfmon } for pid=2029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.513000 audit[2029]: AVC avc: denied { bpf } for pid=2029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.513000 audit[2029]: AVC avc: denied { bpf } for pid=2029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.513000 audit: BPF prog-id=60 op=LOAD Nov 1 00:24:23.513000 audit[2029]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2018 pid=2029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:23.513000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165316162636232656237366432646535343464333339376337343439 Nov 1 00:24:23.517000 audit[2029]: AVC avc: denied { bpf } for pid=2029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.517000 audit[2029]: AVC avc: denied { bpf } for pid=2029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.517000 audit[2029]: AVC avc: denied { perfmon } for pid=2029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.517000 audit[2029]: AVC avc: denied { perfmon } for pid=2029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.517000 audit[2029]: AVC avc: denied { perfmon } for pid=2029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.517000 audit[2029]: AVC avc: denied { perfmon } for pid=2029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.517000 audit[2029]: AVC avc: denied { perfmon } for pid=2029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.517000 audit[2029]: AVC avc: denied { bpf } for pid=2029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.517000 audit[2029]: AVC avc: denied { bpf } for pid=2029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.517000 audit: BPF prog-id=61 op=LOAD Nov 1 00:24:23.517000 audit[2029]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2018 pid=2029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:23.517000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165316162636232656237366432646535343464333339376337343439 Nov 1 00:24:23.538000 audit: BPF prog-id=61 op=UNLOAD Nov 1 00:24:23.538000 audit: BPF prog-id=60 op=UNLOAD Nov 1 00:24:23.538000 audit[2029]: AVC avc: denied { bpf } for pid=2029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.538000 audit[2029]: AVC avc: denied { bpf } for pid=2029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.538000 audit[2029]: AVC avc: denied { bpf } for pid=2029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.538000 audit[2029]: AVC avc: denied { perfmon } for pid=2029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.538000 audit[2029]: AVC avc: denied { perfmon } for pid=2029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.538000 audit[2029]: AVC avc: denied { perfmon } for pid=2029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.538000 audit[2029]: AVC avc: denied { perfmon } for pid=2029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.538000 audit[2029]: AVC avc: denied { perfmon } for pid=2029 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.538000 audit[2029]: AVC avc: denied { bpf } for pid=2029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.538000 audit[2029]: AVC avc: denied { bpf } for pid=2029 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.538000 audit: BPF prog-id=62 op=LOAD Nov 1 00:24:23.538000 audit[2029]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2018 pid=2029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:23.538000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165316162636232656237366432646535343464333339376337343439 Nov 1 00:24:23.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.668567 env[1473]: time="2025-11-01T00:24:23.668121336Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-n97dw,Uid:d5588874-0d5a-41d6-8f9b-adc4f1e65009,Namespace:calico-system,Attempt:0,} returns sandbox id \"1e1abcb2eb76d2de544d3397c744990f93c2c59073f32de611821360a0410468\"" Nov 1 00:24:23.668000 audit[2061]: AVC avc: denied { bpf } for pid=2061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.668000 audit[2061]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2045 pid=2061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:23.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662653364346237633532663665323435313665306566636431353131 Nov 1 00:24:23.669000 audit[2061]: AVC avc: denied { perfmon } for pid=2061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.669000 audit[2061]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2045 pid=2061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:23.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662653364346237633532663665323435313665306566636431353131 Nov 1 00:24:23.670629 env[1473]: time="2025-11-01T00:24:23.670528779Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4\"" Nov 1 00:24:23.670000 audit[2061]: AVC avc: denied { bpf } for pid=2061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.670000 audit[2061]: AVC avc: denied { bpf } for pid=2061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.670000 audit[2061]: AVC avc: denied { bpf } for pid=2061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.670000 audit[2061]: AVC avc: denied { perfmon } for pid=2061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.670000 audit[2061]: AVC avc: denied { perfmon } for pid=2061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.670000 audit[2061]: AVC avc: denied { perfmon } for pid=2061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.670000 audit[2061]: AVC avc: denied { perfmon } for pid=2061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.670000 audit[2061]: AVC avc: denied { perfmon } for pid=2061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.670000 audit[2061]: AVC avc: denied { bpf } for pid=2061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.670000 audit[2061]: AVC avc: denied { bpf } for pid=2061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.670000 audit: BPF prog-id=64 op=LOAD Nov 1 00:24:23.670000 audit[2061]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2045 pid=2061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:23.670000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662653364346237633532663665323435313665306566636431353131 Nov 1 00:24:23.670000 audit[2061]: AVC avc: denied { bpf } for pid=2061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.670000 audit[2061]: AVC avc: denied { bpf } for pid=2061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.670000 audit[2061]: AVC avc: denied { perfmon } for pid=2061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.670000 audit[2061]: AVC avc: denied { perfmon } for pid=2061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.670000 audit[2061]: AVC avc: denied { perfmon } for pid=2061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.670000 audit[2061]: AVC avc: denied { perfmon } for pid=2061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.670000 audit[2061]: AVC avc: denied { perfmon } for pid=2061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.670000 audit[2061]: AVC avc: denied { bpf } for pid=2061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.670000 audit[2061]: AVC avc: denied { bpf } for pid=2061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.670000 audit: BPF prog-id=65 op=LOAD Nov 1 00:24:23.670000 audit[2061]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2045 pid=2061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:23.670000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662653364346237633532663665323435313665306566636431353131 Nov 1 00:24:23.671000 audit: BPF prog-id=65 op=UNLOAD Nov 1 00:24:23.671000 audit: BPF prog-id=64 op=UNLOAD Nov 1 00:24:23.671000 audit[2061]: AVC avc: denied { bpf } for pid=2061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.671000 audit[2061]: AVC avc: denied { bpf } for pid=2061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.671000 audit[2061]: AVC avc: denied { bpf } for pid=2061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.671000 audit[2061]: AVC avc: denied { perfmon } for pid=2061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.671000 audit[2061]: AVC avc: denied { perfmon } for pid=2061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.671000 audit[2061]: AVC avc: denied { perfmon } for pid=2061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.671000 audit[2061]: AVC avc: denied { perfmon } for pid=2061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.671000 audit[2061]: AVC avc: denied { perfmon } for pid=2061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.671000 audit[2061]: AVC avc: denied { bpf } for pid=2061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.671000 audit[2061]: AVC avc: denied { bpf } for pid=2061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:23.671000 audit: BPF prog-id=66 op=LOAD Nov 1 00:24:23.671000 audit[2061]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2045 pid=2061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:23.671000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662653364346237633532663665323435313665306566636431353131 Nov 1 00:24:23.684744 env[1473]: time="2025-11-01T00:24:23.684705520Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-dhjnb,Uid:98576993-4b56-4dc2-9df5-d660596978cc,Namespace:kube-system,Attempt:0,} returns sandbox id \"fbe3d4b7c52f6e24516e0efcd151132d33ae194ac95d4afc33bc936f02059c95\"" Nov 1 00:24:24.407064 kubelet[1967]: E1101 00:24:24.407014 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:24:24.721732 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2551043127.mount: Deactivated successfully. Nov 1 00:24:24.856168 env[1473]: time="2025-11-01T00:24:24.856119786Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:24:24.863384 env[1473]: time="2025-11-01T00:24:24.863346956Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:90ff755393144dc5a3c05f95ffe1a3ecd2f89b98ecf36d9e4721471b80af4640,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:24:24.867752 env[1473]: time="2025-11-01T00:24:24.867724963Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:24:24.872014 env[1473]: time="2025-11-01T00:24:24.871985569Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:50bdfe370b7308fa9957ed1eaccd094aa4f27f9a4f1dfcfef2f8a7696a1551e1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:24:24.872510 env[1473]: time="2025-11-01T00:24:24.872480930Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4\" returns image reference \"sha256:90ff755393144dc5a3c05f95ffe1a3ecd2f89b98ecf36d9e4721471b80af4640\"" Nov 1 00:24:24.874432 env[1473]: time="2025-11-01T00:24:24.874399932Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.9\"" Nov 1 00:24:24.875409 env[1473]: time="2025-11-01T00:24:24.875378934Z" level=info msg="CreateContainer within sandbox \"1e1abcb2eb76d2de544d3397c744990f93c2c59073f32de611821360a0410468\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Nov 1 00:24:24.899094 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3667048622.mount: Deactivated successfully. Nov 1 00:24:24.915898 env[1473]: time="2025-11-01T00:24:24.915854952Z" level=info msg="CreateContainer within sandbox \"1e1abcb2eb76d2de544d3397c744990f93c2c59073f32de611821360a0410468\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"c0967a33ebc12976afd99fe27936241f31491f208275bfc7e3e88ecf8fc1d3e5\"" Nov 1 00:24:24.916729 env[1473]: time="2025-11-01T00:24:24.916689394Z" level=info msg="StartContainer for \"c0967a33ebc12976afd99fe27936241f31491f208275bfc7e3e88ecf8fc1d3e5\"" Nov 1 00:24:24.932588 systemd[1]: Started cri-containerd-c0967a33ebc12976afd99fe27936241f31491f208275bfc7e3e88ecf8fc1d3e5.scope. Nov 1 00:24:24.944000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:24.944000 audit[2099]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2018 pid=2099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:24.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330393637613333656263313239373661666439396665323739333632 Nov 1 00:24:24.945000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:24.945000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:24.945000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:24.945000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:24.945000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:24.945000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:24.945000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:24.945000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:24.945000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:24.945000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:24.945000 audit: BPF prog-id=67 op=LOAD Nov 1 00:24:24.945000 audit[2099]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2018 pid=2099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:24.945000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330393637613333656263313239373661666439396665323739333632 Nov 1 00:24:24.945000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:24.945000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:24.945000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:24.945000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:24.945000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:24.945000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:24.945000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:24.945000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:24.945000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:24.945000 audit: BPF prog-id=68 op=LOAD Nov 1 00:24:24.945000 audit[2099]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2018 pid=2099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:24.945000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330393637613333656263313239373661666439396665323739333632 Nov 1 00:24:24.946000 audit: BPF prog-id=68 op=UNLOAD Nov 1 00:24:24.946000 audit: BPF prog-id=67 op=UNLOAD Nov 1 00:24:24.946000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:24.946000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:24.946000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:24.946000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:24.946000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:24.946000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:24.946000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:24.946000 audit[2099]: AVC avc: denied { perfmon } for pid=2099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:24.946000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:24.946000 audit[2099]: AVC avc: denied { bpf } for pid=2099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:24.946000 audit: BPF prog-id=69 op=LOAD Nov 1 00:24:24.946000 audit[2099]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2018 pid=2099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:24.946000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330393637613333656263313239373661666439396665323739333632 Nov 1 00:24:24.970389 env[1473]: time="2025-11-01T00:24:24.970346271Z" level=info msg="StartContainer for \"c0967a33ebc12976afd99fe27936241f31491f208275bfc7e3e88ecf8fc1d3e5\" returns successfully" Nov 1 00:24:24.970786 systemd[1]: cri-containerd-c0967a33ebc12976afd99fe27936241f31491f208275bfc7e3e88ecf8fc1d3e5.scope: Deactivated successfully. Nov 1 00:24:24.976000 audit: BPF prog-id=69 op=UNLOAD Nov 1 00:24:25.107853 env[1473]: time="2025-11-01T00:24:25.107791386Z" level=info msg="shim disconnected" id=c0967a33ebc12976afd99fe27936241f31491f208275bfc7e3e88ecf8fc1d3e5 Nov 1 00:24:25.107853 env[1473]: time="2025-11-01T00:24:25.107846386Z" level=warning msg="cleaning up after shim disconnected" id=c0967a33ebc12976afd99fe27936241f31491f208275bfc7e3e88ecf8fc1d3e5 namespace=k8s.io Nov 1 00:24:25.107853 env[1473]: time="2025-11-01T00:24:25.107857306Z" level=info msg="cleaning up dead shim" Nov 1 00:24:25.115583 env[1473]: time="2025-11-01T00:24:25.115546357Z" level=warning msg="cleanup warnings time=\"2025-11-01T00:24:25Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2137 runtime=io.containerd.runc.v2\n" Nov 1 00:24:25.407666 kubelet[1967]: E1101 00:24:25.407537 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:24:25.637938 kubelet[1967]: E1101 00:24:25.637872 1967 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xmn5c" podUID="98274ee7-d1d6-4f2e-b0fd-446126b657a6" Nov 1 00:24:26.153747 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2383575862.mount: Deactivated successfully. Nov 1 00:24:26.408502 kubelet[1967]: E1101 00:24:26.408375 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:24:26.654843 env[1473]: time="2025-11-01T00:24:26.654799220Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:24:26.661498 env[1473]: time="2025-11-01T00:24:26.661419029Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:72b57ec14d31e8422925ef4c3eff44822cdc04a11fd30d13824f1897d83a16d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:24:26.665709 env[1473]: time="2025-11-01T00:24:26.665672555Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:24:26.671286 env[1473]: time="2025-11-01T00:24:26.671244082Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:886af02535dc34886e4618b902f8c140d89af57233a245621d29642224516064,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:24:26.671504 env[1473]: time="2025-11-01T00:24:26.671472123Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.9\" returns image reference \"sha256:72b57ec14d31e8422925ef4c3eff44822cdc04a11fd30d13824f1897d83a16d4\"" Nov 1 00:24:26.673471 env[1473]: time="2025-11-01T00:24:26.673445405Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.4\"" Nov 1 00:24:26.674237 env[1473]: time="2025-11-01T00:24:26.674207126Z" level=info msg="CreateContainer within sandbox \"fbe3d4b7c52f6e24516e0efcd151132d33ae194ac95d4afc33bc936f02059c95\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Nov 1 00:24:26.702989 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1959828988.mount: Deactivated successfully. Nov 1 00:24:26.706732 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2544041256.mount: Deactivated successfully. Nov 1 00:24:26.722609 env[1473]: time="2025-11-01T00:24:26.722549353Z" level=info msg="CreateContainer within sandbox \"fbe3d4b7c52f6e24516e0efcd151132d33ae194ac95d4afc33bc936f02059c95\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"696e32939daf8680cb1a1379c7d9efc1ef3c3b285c3571dbae19c2ded1475d91\"" Nov 1 00:24:26.723140 env[1473]: time="2025-11-01T00:24:26.723114113Z" level=info msg="StartContainer for \"696e32939daf8680cb1a1379c7d9efc1ef3c3b285c3571dbae19c2ded1475d91\"" Nov 1 00:24:26.740231 systemd[1]: Started cri-containerd-696e32939daf8680cb1a1379c7d9efc1ef3c3b285c3571dbae19c2ded1475d91.scope. Nov 1 00:24:26.752000 audit[2163]: AVC avc: denied { perfmon } for pid=2163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:26.752000 audit[2163]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2045 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:26.752000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639366533323933396461663836383063623161313337396337643965 Nov 1 00:24:26.752000 audit[2163]: AVC avc: denied { bpf } for pid=2163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:26.752000 audit[2163]: AVC avc: denied { bpf } for pid=2163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:26.752000 audit[2163]: AVC avc: denied { bpf } for pid=2163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:26.752000 audit[2163]: AVC avc: denied { perfmon } for pid=2163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:26.752000 audit[2163]: AVC avc: denied { perfmon } for pid=2163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:26.752000 audit[2163]: AVC avc: denied { perfmon } for pid=2163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:26.752000 audit[2163]: AVC avc: denied { perfmon } for pid=2163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:26.752000 audit[2163]: AVC avc: denied { perfmon } for pid=2163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:26.752000 audit[2163]: AVC avc: denied { bpf } for pid=2163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:26.752000 audit[2163]: AVC avc: denied { bpf } for pid=2163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:26.752000 audit: BPF prog-id=70 op=LOAD Nov 1 00:24:26.752000 audit[2163]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2045 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:26.752000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639366533323933396461663836383063623161313337396337643965 Nov 1 00:24:26.752000 audit[2163]: AVC avc: denied { bpf } for pid=2163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:26.752000 audit[2163]: AVC avc: denied { bpf } for pid=2163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:26.752000 audit[2163]: AVC avc: denied { perfmon } for pid=2163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:26.752000 audit[2163]: AVC avc: denied { perfmon } for pid=2163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:26.752000 audit[2163]: AVC avc: denied { perfmon } for pid=2163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:26.752000 audit[2163]: AVC avc: denied { perfmon } for pid=2163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:26.752000 audit[2163]: AVC avc: denied { perfmon } for pid=2163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:26.752000 audit[2163]: AVC avc: denied { bpf } for pid=2163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:26.752000 audit[2163]: AVC avc: denied { bpf } for pid=2163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:26.752000 audit: BPF prog-id=71 op=LOAD Nov 1 00:24:26.752000 audit[2163]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2045 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:26.752000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639366533323933396461663836383063623161313337396337643965 Nov 1 00:24:26.752000 audit: BPF prog-id=71 op=UNLOAD Nov 1 00:24:26.752000 audit: BPF prog-id=70 op=UNLOAD Nov 1 00:24:26.752000 audit[2163]: AVC avc: denied { bpf } for pid=2163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:26.752000 audit[2163]: AVC avc: denied { bpf } for pid=2163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:26.752000 audit[2163]: AVC avc: denied { bpf } for pid=2163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:26.752000 audit[2163]: AVC avc: denied { perfmon } for pid=2163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:26.752000 audit[2163]: AVC avc: denied { perfmon } for pid=2163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:26.752000 audit[2163]: AVC avc: denied { perfmon } for pid=2163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:26.752000 audit[2163]: AVC avc: denied { perfmon } for pid=2163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:26.752000 audit[2163]: AVC avc: denied { perfmon } for pid=2163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:26.752000 audit[2163]: AVC avc: denied { bpf } for pid=2163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:26.752000 audit[2163]: AVC avc: denied { bpf } for pid=2163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:26.752000 audit: BPF prog-id=72 op=LOAD Nov 1 00:24:26.752000 audit[2163]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2045 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:26.752000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639366533323933396461663836383063623161313337396337643965 Nov 1 00:24:26.772784 env[1473]: time="2025-11-01T00:24:26.772743941Z" level=info msg="StartContainer for \"696e32939daf8680cb1a1379c7d9efc1ef3c3b285c3571dbae19c2ded1475d91\" returns successfully" Nov 1 00:24:26.935000 audit[2222]: NETFILTER_CFG table=mangle:17 family=2 entries=1 op=nft_register_chain pid=2222 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:24:26.935000 audit[2222]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc05f5bf0 a2=0 a3=1 items=0 ppid=2174 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:26.935000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Nov 1 00:24:26.937000 audit[2224]: NETFILTER_CFG table=mangle:18 family=10 entries=1 op=nft_register_chain pid=2224 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:24:26.937000 audit[2224]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffce23de60 a2=0 a3=1 items=0 ppid=2174 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:26.937000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Nov 1 00:24:26.938000 audit[2225]: NETFILTER_CFG table=nat:19 family=2 entries=1 op=nft_register_chain pid=2225 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:24:26.938000 audit[2225]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd708d9d0 a2=0 a3=1 items=0 ppid=2174 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:26.938000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Nov 1 00:24:26.939000 audit[2227]: NETFILTER_CFG table=nat:20 family=10 entries=1 op=nft_register_chain pid=2227 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:24:26.939000 audit[2227]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd783e200 a2=0 a3=1 items=0 ppid=2174 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:26.939000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Nov 1 00:24:26.941000 audit[2229]: NETFILTER_CFG table=filter:21 family=10 entries=1 op=nft_register_chain pid=2229 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:24:26.941000 audit[2229]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc8ac5640 a2=0 a3=1 items=0 ppid=2174 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:26.941000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Nov 1 00:24:26.941000 audit[2228]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_chain pid=2228 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:24:26.941000 audit[2228]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff72caae0 a2=0 a3=1 items=0 ppid=2174 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:26.941000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Nov 1 00:24:27.039000 audit[2230]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2230 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:24:27.039000 audit[2230]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffe5290e50 a2=0 a3=1 items=0 ppid=2174 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:27.039000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Nov 1 00:24:27.042000 audit[2232]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2232 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:24:27.042000 audit[2232]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffc3b050a0 a2=0 a3=1 items=0 ppid=2174 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:27.042000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Nov 1 00:24:27.046000 audit[2235]: NETFILTER_CFG table=filter:25 family=2 entries=2 op=nft_register_chain pid=2235 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:24:27.046000 audit[2235]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffffe42b4c0 a2=0 a3=1 items=0 ppid=2174 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:27.046000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Nov 1 00:24:27.047000 audit[2236]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_chain pid=2236 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:24:27.047000 audit[2236]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc33aff20 a2=0 a3=1 items=0 ppid=2174 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:27.047000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Nov 1 00:24:27.049000 audit[2238]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2238 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:24:27.049000 audit[2238]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff2800260 a2=0 a3=1 items=0 ppid=2174 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:27.049000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Nov 1 00:24:27.050000 audit[2239]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2239 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:24:27.050000 audit[2239]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc05fe1e0 a2=0 a3=1 items=0 ppid=2174 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:27.050000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Nov 1 00:24:27.053000 audit[2241]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2241 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:24:27.053000 audit[2241]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffffc048f00 a2=0 a3=1 items=0 ppid=2174 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:27.053000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Nov 1 00:24:27.056000 audit[2244]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2244 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:24:27.056000 audit[2244]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd0c2c110 a2=0 a3=1 items=0 ppid=2174 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:27.056000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Nov 1 00:24:27.058000 audit[2245]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_chain pid=2245 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:24:27.058000 audit[2245]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe0202050 a2=0 a3=1 items=0 ppid=2174 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:27.058000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Nov 1 00:24:27.060000 audit[2247]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2247 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:24:27.060000 audit[2247]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc30ba6f0 a2=0 a3=1 items=0 ppid=2174 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:27.060000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Nov 1 00:24:27.061000 audit[2248]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_chain pid=2248 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:24:27.061000 audit[2248]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdd530e00 a2=0 a3=1 items=0 ppid=2174 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:27.061000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Nov 1 00:24:27.064000 audit[2250]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_rule pid=2250 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:24:27.064000 audit[2250]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc20785f0 a2=0 a3=1 items=0 ppid=2174 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:27.064000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Nov 1 00:24:27.067000 audit[2253]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_rule pid=2253 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:24:27.067000 audit[2253]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd5c62570 a2=0 a3=1 items=0 ppid=2174 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:27.067000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Nov 1 00:24:27.070000 audit[2256]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_rule pid=2256 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:24:27.070000 audit[2256]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff8c09ee0 a2=0 a3=1 items=0 ppid=2174 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:27.070000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Nov 1 00:24:27.071000 audit[2257]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2257 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:24:27.071000 audit[2257]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff2f061e0 a2=0 a3=1 items=0 ppid=2174 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:27.071000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Nov 1 00:24:27.073000 audit[2259]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2259 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:24:27.073000 audit[2259]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffd173a3a0 a2=0 a3=1 items=0 ppid=2174 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:27.073000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Nov 1 00:24:27.266000 audit[2263]: NETFILTER_CFG table=nat:39 family=2 entries=2 op=nft_register_chain pid=2263 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:24:27.266000 audit[2263]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffc8e73ad0 a2=0 a3=1 items=0 ppid=2174 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:27.266000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Nov 1 00:24:27.267000 audit[2264]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2264 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:24:27.267000 audit[2264]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe0f1d580 a2=0 a3=1 items=0 ppid=2174 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:27.267000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Nov 1 00:24:27.269000 audit[2266]: NETFILTER_CFG table=nat:41 family=2 entries=2 op=nft_register_chain pid=2266 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:24:27.269000 audit[2266]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffc98389e0 a2=0 a3=1 items=0 ppid=2174 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:27.269000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Nov 1 00:24:27.409467 kubelet[1967]: E1101 00:24:27.409428 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:24:27.531000 audit[2272]: NETFILTER_CFG table=filter:42 family=2 entries=8 op=nft_register_rule pid=2272 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:24:27.531000 audit[2272]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffe69b3e40 a2=0 a3=1 items=0 ppid=2174 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:27.531000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:24:27.638367 kubelet[1967]: E1101 00:24:27.637984 1967 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xmn5c" podUID="98274ee7-d1d6-4f2e-b0fd-446126b657a6" Nov 1 00:24:27.791000 audit[2272]: NETFILTER_CFG table=nat:43 family=2 entries=54 op=nft_register_chain pid=2272 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:24:27.791000 audit[2272]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=25476 a0=3 a1=ffffe69b3e40 a2=0 a3=1 items=0 ppid=2174 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:27.791000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:24:28.172000 audit[2281]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2281 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:24:28.172000 audit[2281]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffe4fc57b0 a2=0 a3=1 items=0 ppid=2174 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:28.172000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Nov 1 00:24:28.176000 audit[2283]: NETFILTER_CFG table=filter:45 family=10 entries=2 op=nft_register_chain pid=2283 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:24:28.176000 audit[2283]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffdbd1c620 a2=0 a3=1 items=0 ppid=2174 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:28.176000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Nov 1 00:24:28.181000 audit[2286]: NETFILTER_CFG table=filter:46 family=10 entries=2 op=nft_register_chain pid=2286 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:24:28.181000 audit[2286]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffc25c6a60 a2=0 a3=1 items=0 ppid=2174 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:28.181000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Nov 1 00:24:28.183000 audit[2287]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_chain pid=2287 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:24:28.183000 audit[2287]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffee511a10 a2=0 a3=1 items=0 ppid=2174 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:28.183000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Nov 1 00:24:28.185000 audit[2289]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_rule pid=2289 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:24:28.185000 audit[2289]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc3ee3df0 a2=0 a3=1 items=0 ppid=2174 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:28.185000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Nov 1 00:24:28.186000 audit[2290]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2290 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:24:28.186000 audit[2290]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe6746630 a2=0 a3=1 items=0 ppid=2174 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:28.186000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Nov 1 00:24:28.189000 audit[2292]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2292 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:24:28.189000 audit[2292]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffffb589950 a2=0 a3=1 items=0 ppid=2174 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:28.189000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Nov 1 00:24:28.192000 audit[2295]: NETFILTER_CFG table=filter:51 family=10 entries=2 op=nft_register_chain pid=2295 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:24:28.192000 audit[2295]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffec44f280 a2=0 a3=1 items=0 ppid=2174 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:28.192000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Nov 1 00:24:28.193000 audit[2296]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_chain pid=2296 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:24:28.193000 audit[2296]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe165e570 a2=0 a3=1 items=0 ppid=2174 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:28.193000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Nov 1 00:24:28.196000 audit[2298]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2298 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:24:28.196000 audit[2298]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd438cea0 a2=0 a3=1 items=0 ppid=2174 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:28.196000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Nov 1 00:24:28.197000 audit[2299]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_chain pid=2299 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:24:28.197000 audit[2299]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff5768970 a2=0 a3=1 items=0 ppid=2174 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:28.197000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Nov 1 00:24:28.199000 audit[2301]: NETFILTER_CFG table=filter:55 family=10 entries=1 op=nft_register_rule pid=2301 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:24:28.199000 audit[2301]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffcc230590 a2=0 a3=1 items=0 ppid=2174 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:28.199000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Nov 1 00:24:28.202000 audit[2304]: NETFILTER_CFG table=filter:56 family=10 entries=1 op=nft_register_rule pid=2304 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:24:28.202000 audit[2304]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdbe4b400 a2=0 a3=1 items=0 ppid=2174 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:28.202000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Nov 1 00:24:28.205000 audit[2307]: NETFILTER_CFG table=filter:57 family=10 entries=1 op=nft_register_rule pid=2307 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:24:28.205000 audit[2307]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc3b6e470 a2=0 a3=1 items=0 ppid=2174 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:28.205000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Nov 1 00:24:28.206000 audit[2308]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2308 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:24:28.206000 audit[2308]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffe5be0830 a2=0 a3=1 items=0 ppid=2174 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:28.206000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Nov 1 00:24:28.208000 audit[2310]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2310 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:24:28.208000 audit[2310]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffc30e8640 a2=0 a3=1 items=0 ppid=2174 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:28.208000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Nov 1 00:24:28.212000 audit[2313]: NETFILTER_CFG table=nat:60 family=10 entries=2 op=nft_register_chain pid=2313 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:24:28.212000 audit[2313]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=fffff0c3b1b0 a2=0 a3=1 items=0 ppid=2174 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:28.212000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Nov 1 00:24:28.213000 audit[2314]: NETFILTER_CFG table=nat:61 family=10 entries=1 op=nft_register_chain pid=2314 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:24:28.213000 audit[2314]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff53b2f20 a2=0 a3=1 items=0 ppid=2174 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:28.213000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Nov 1 00:24:28.216000 audit[2316]: NETFILTER_CFG table=nat:62 family=10 entries=2 op=nft_register_chain pid=2316 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:24:28.216000 audit[2316]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffdf478830 a2=0 a3=1 items=0 ppid=2174 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:28.216000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Nov 1 00:24:28.217000 audit[2317]: NETFILTER_CFG table=filter:63 family=10 entries=1 op=nft_register_chain pid=2317 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:24:28.217000 audit[2317]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe8cbdd60 a2=0 a3=1 items=0 ppid=2174 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:28.217000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Nov 1 00:24:28.219000 audit[2319]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_rule pid=2319 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:24:28.219000 audit[2319]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd9f245c0 a2=0 a3=1 items=0 ppid=2174 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:28.219000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Nov 1 00:24:28.223000 audit[2322]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_rule pid=2322 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:24:28.223000 audit[2322]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffffc6ca010 a2=0 a3=1 items=0 ppid=2174 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:28.223000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Nov 1 00:24:28.226000 audit[2324]: NETFILTER_CFG table=filter:66 family=10 entries=3 op=nft_register_rule pid=2324 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Nov 1 00:24:28.226000 audit[2324]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2088 a0=3 a1=ffffdd692450 a2=0 a3=1 items=0 ppid=2174 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:28.226000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:24:28.227000 audit[2324]: NETFILTER_CFG table=nat:67 family=10 entries=7 op=nft_register_chain pid=2324 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Nov 1 00:24:28.227000 audit[2324]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffdd692450 a2=0 a3=1 items=0 ppid=2174 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:28.227000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:24:28.410603 kubelet[1967]: E1101 00:24:28.410555 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:24:29.276858 env[1473]: time="2025-11-01T00:24:29.276795962Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:24:29.283033 env[1473]: time="2025-11-01T00:24:29.282986610Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e60d442b6496497355efdf45eaa3ea72f5a2b28a5187aeab33442933f3c735d2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:24:29.288983 env[1473]: time="2025-11-01T00:24:29.288953738Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:24:29.292778 env[1473]: time="2025-11-01T00:24:29.292737262Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:273501a9cfbd848ade2b6a8452dfafdd3adb4f9bf9aec45c398a5d19b8026627,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:24:29.293449 env[1473]: time="2025-11-01T00:24:29.293418903Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.4\" returns image reference \"sha256:e60d442b6496497355efdf45eaa3ea72f5a2b28a5187aeab33442933f3c735d2\"" Nov 1 00:24:29.296113 env[1473]: time="2025-11-01T00:24:29.296080547Z" level=info msg="CreateContainer within sandbox \"1e1abcb2eb76d2de544d3397c744990f93c2c59073f32de611821360a0410468\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Nov 1 00:24:29.319971 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount56189443.mount: Deactivated successfully. Nov 1 00:24:29.335414 env[1473]: time="2025-11-01T00:24:29.335344917Z" level=info msg="CreateContainer within sandbox \"1e1abcb2eb76d2de544d3397c744990f93c2c59073f32de611821360a0410468\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"175059dbc61a1ec7bce88b7c6573e9196baeb2373d51923c51c72c2325fa7963\"" Nov 1 00:24:29.336026 env[1473]: time="2025-11-01T00:24:29.335998117Z" level=info msg="StartContainer for \"175059dbc61a1ec7bce88b7c6573e9196baeb2373d51923c51c72c2325fa7963\"" Nov 1 00:24:29.361679 systemd[1]: Started cri-containerd-175059dbc61a1ec7bce88b7c6573e9196baeb2373d51923c51c72c2325fa7963.scope. Nov 1 00:24:29.376000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:29.382440 kernel: kauditd_printk_skb: 346 callbacks suppressed Nov 1 00:24:29.382540 kernel: audit: type=1400 audit(1761956669.376:533): avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:29.376000 audit[2332]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2018 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:29.411698 kubelet[1967]: E1101 00:24:29.411646 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:24:29.429261 kernel: audit: type=1300 audit(1761956669.376:533): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2018 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:29.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137353035396462633631613165633762636538386237633635373365 Nov 1 00:24:29.452998 kernel: audit: type=1327 audit(1761956669.376:533): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137353035396462633631613165633762636538386237633635373365 Nov 1 00:24:29.376000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:29.470230 kernel: audit: type=1400 audit(1761956669.376:534): avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:29.376000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:29.487251 kernel: audit: type=1400 audit(1761956669.376:534): avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:29.376000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:29.504784 kernel: audit: type=1400 audit(1761956669.376:534): avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:29.376000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:29.522447 kernel: audit: type=1400 audit(1761956669.376:534): avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:29.522691 kernel: audit: type=1400 audit(1761956669.376:534): avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:29.376000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:29.376000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:29.556900 kernel: audit: type=1400 audit(1761956669.376:534): avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:29.557231 env[1473]: time="2025-11-01T00:24:29.557189358Z" level=info msg="StartContainer for \"175059dbc61a1ec7bce88b7c6573e9196baeb2373d51923c51c72c2325fa7963\" returns successfully" Nov 1 00:24:29.376000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:29.574256 kernel: audit: type=1400 audit(1761956669.376:534): avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:29.376000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:29.376000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:29.376000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:29.376000 audit: BPF prog-id=73 op=LOAD Nov 1 00:24:29.376000 audit[2332]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2018 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:29.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137353035396462633631613165633762636538386237633635373365 Nov 1 00:24:29.376000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:29.376000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:29.376000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:29.376000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:29.376000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:29.376000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:29.376000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:29.376000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:29.376000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:29.376000 audit: BPF prog-id=74 op=LOAD Nov 1 00:24:29.376000 audit[2332]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2018 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:29.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137353035396462633631613165633762636538386237633635373365 Nov 1 00:24:29.376000 audit: BPF prog-id=74 op=UNLOAD Nov 1 00:24:29.376000 audit: BPF prog-id=73 op=UNLOAD Nov 1 00:24:29.376000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:29.376000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:29.376000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:29.376000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:29.376000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:29.376000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:29.376000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:29.376000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:29.376000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:29.376000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:29.376000 audit: BPF prog-id=75 op=LOAD Nov 1 00:24:29.376000 audit[2332]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2018 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:29.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137353035396462633631613165633762636538386237633635373365 Nov 1 00:24:29.638650 kubelet[1967]: E1101 00:24:29.638395 1967 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xmn5c" podUID="98274ee7-d1d6-4f2e-b0fd-446126b657a6" Nov 1 00:24:29.703605 kubelet[1967]: I1101 00:24:29.703133 1967 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-dhjnb" podStartSLOduration=12.716566861 podStartE2EDuration="15.703112743s" podCreationTimestamp="2025-11-01 00:24:14 +0000 UTC" firstStartedPulling="2025-11-01 00:24:23.685992522 +0000 UTC m=+10.651499826" lastFinishedPulling="2025-11-01 00:24:26.672538364 +0000 UTC m=+13.638045708" observedRunningTime="2025-11-01 00:24:27.732169511 +0000 UTC m=+14.697676775" watchObservedRunningTime="2025-11-01 00:24:29.703112743 +0000 UTC m=+16.668620047" Nov 1 00:24:30.317616 systemd[1]: run-containerd-runc-k8s.io-175059dbc61a1ec7bce88b7c6573e9196baeb2373d51923c51c72c2325fa7963-runc.per5jb.mount: Deactivated successfully. Nov 1 00:24:30.412715 kubelet[1967]: E1101 00:24:30.412678 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:24:31.414080 kubelet[1967]: E1101 00:24:31.414039 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:24:31.638388 kubelet[1967]: E1101 00:24:31.638165 1967 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xmn5c" podUID="98274ee7-d1d6-4f2e-b0fd-446126b657a6" Nov 1 00:24:31.807665 env[1473]: time="2025-11-01T00:24:31.807434690Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Nov 1 00:24:31.809709 systemd[1]: cri-containerd-175059dbc61a1ec7bce88b7c6573e9196baeb2373d51923c51c72c2325fa7963.scope: Deactivated successfully. Nov 1 00:24:31.814000 audit: BPF prog-id=75 op=UNLOAD Nov 1 00:24:31.826143 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-175059dbc61a1ec7bce88b7c6573e9196baeb2373d51923c51c72c2325fa7963-rootfs.mount: Deactivated successfully. Nov 1 00:24:31.841778 kubelet[1967]: I1101 00:24:31.841503 1967 kubelet_node_status.go:501] "Fast updating node status as it just became ready" Nov 1 00:24:32.197146 env[1473]: time="2025-11-01T00:24:32.197033834Z" level=info msg="shim disconnected" id=175059dbc61a1ec7bce88b7c6573e9196baeb2373d51923c51c72c2325fa7963 Nov 1 00:24:32.197558 env[1473]: time="2025-11-01T00:24:32.197529154Z" level=warning msg="cleaning up after shim disconnected" id=175059dbc61a1ec7bce88b7c6573e9196baeb2373d51923c51c72c2325fa7963 namespace=k8s.io Nov 1 00:24:32.197680 env[1473]: time="2025-11-01T00:24:32.197663715Z" level=info msg="cleaning up dead shim" Nov 1 00:24:32.204289 env[1473]: time="2025-11-01T00:24:32.204257882Z" level=warning msg="cleanup warnings time=\"2025-11-01T00:24:32Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2371 runtime=io.containerd.runc.v2\n" Nov 1 00:24:32.414754 kubelet[1967]: E1101 00:24:32.414716 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:24:32.688389 env[1473]: time="2025-11-01T00:24:32.688353411Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.4\"" Nov 1 00:24:33.415753 kubelet[1967]: E1101 00:24:33.415707 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:24:33.645385 systemd[1]: Created slice kubepods-besteffort-pod98274ee7_d1d6_4f2e_b0fd_446126b657a6.slice. Nov 1 00:24:33.654324 env[1473]: time="2025-11-01T00:24:33.654283848Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xmn5c,Uid:98274ee7-d1d6-4f2e-b0fd-446126b657a6,Namespace:calico-system,Attempt:0,}" Nov 1 00:24:33.769754 env[1473]: time="2025-11-01T00:24:33.769680540Z" level=error msg="Failed to destroy network for sandbox \"15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:24:33.772655 env[1473]: time="2025-11-01T00:24:33.771405302Z" level=error msg="encountered an error cleaning up failed sandbox \"15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:24:33.772655 env[1473]: time="2025-11-01T00:24:33.771464022Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xmn5c,Uid:98274ee7-d1d6-4f2e-b0fd-446126b657a6,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:24:33.772787 kubelet[1967]: E1101 00:24:33.771693 1967 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:24:33.772787 kubelet[1967]: E1101 00:24:33.771777 1967 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-xmn5c" Nov 1 00:24:33.772787 kubelet[1967]: E1101 00:24:33.771799 1967 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-xmn5c" Nov 1 00:24:33.772874 kubelet[1967]: E1101 00:24:33.771843 1967 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-xmn5c_calico-system(98274ee7-d1d6-4f2e-b0fd-446126b657a6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-xmn5c_calico-system(98274ee7-d1d6-4f2e-b0fd-446126b657a6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-xmn5c" podUID="98274ee7-d1d6-4f2e-b0fd-446126b657a6" Nov 1 00:24:33.773520 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd-shm.mount: Deactivated successfully. Nov 1 00:24:34.396793 kubelet[1967]: E1101 00:24:34.396733 1967 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:24:34.416024 kubelet[1967]: E1101 00:24:34.415981 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:24:34.691596 kubelet[1967]: I1101 00:24:34.691387 1967 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd" Nov 1 00:24:34.692499 env[1473]: time="2025-11-01T00:24:34.692465419Z" level=info msg="StopPodSandbox for \"15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd\"" Nov 1 00:24:34.715202 env[1473]: time="2025-11-01T00:24:34.715138164Z" level=error msg="StopPodSandbox for \"15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd\" failed" error="failed to destroy network for sandbox \"15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:24:34.715422 kubelet[1967]: E1101 00:24:34.715384 1967 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd" Nov 1 00:24:34.715506 kubelet[1967]: E1101 00:24:34.715462 1967 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd"} Nov 1 00:24:34.715541 kubelet[1967]: E1101 00:24:34.715530 1967 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"98274ee7-d1d6-4f2e-b0fd-446126b657a6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Nov 1 00:24:34.715604 kubelet[1967]: E1101 00:24:34.715552 1967 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"98274ee7-d1d6-4f2e-b0fd-446126b657a6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-xmn5c" podUID="98274ee7-d1d6-4f2e-b0fd-446126b657a6" Nov 1 00:24:34.971726 systemd[1]: Created slice kubepods-besteffort-pod01a4fea2_ddc5_4cff_9fb7_c0578bdda197.slice. Nov 1 00:24:35.046090 kubelet[1967]: I1101 00:24:35.046050 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-w2gp5\" (UniqueName: \"kubernetes.io/projected/01a4fea2-ddc5-4cff-9fb7-c0578bdda197-kube-api-access-w2gp5\") pod \"nginx-deployment-7fcdb87857-t2l54\" (UID: \"01a4fea2-ddc5-4cff-9fb7-c0578bdda197\") " pod="default/nginx-deployment-7fcdb87857-t2l54" Nov 1 00:24:35.275717 env[1473]: time="2025-11-01T00:24:35.275464223Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-t2l54,Uid:01a4fea2-ddc5-4cff-9fb7-c0578bdda197,Namespace:default,Attempt:0,}" Nov 1 00:24:35.405639 env[1473]: time="2025-11-01T00:24:35.405566085Z" level=error msg="Failed to destroy network for sandbox \"b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:24:35.407263 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef-shm.mount: Deactivated successfully. Nov 1 00:24:35.409653 env[1473]: time="2025-11-01T00:24:35.408572728Z" level=error msg="encountered an error cleaning up failed sandbox \"b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:24:35.409653 env[1473]: time="2025-11-01T00:24:35.408659248Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-t2l54,Uid:01a4fea2-ddc5-4cff-9fb7-c0578bdda197,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:24:35.409828 kubelet[1967]: E1101 00:24:35.408869 1967 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:24:35.409828 kubelet[1967]: E1101 00:24:35.408925 1967 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-t2l54" Nov 1 00:24:35.409828 kubelet[1967]: E1101 00:24:35.408949 1967 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-t2l54" Nov 1 00:24:35.409930 kubelet[1967]: E1101 00:24:35.408986 1967 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-7fcdb87857-t2l54_default(01a4fea2-ddc5-4cff-9fb7-c0578bdda197)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-7fcdb87857-t2l54_default(01a4fea2-ddc5-4cff-9fb7-c0578bdda197)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-t2l54" podUID="01a4fea2-ddc5-4cff-9fb7-c0578bdda197" Nov 1 00:24:35.416775 kubelet[1967]: E1101 00:24:35.416738 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:24:35.693516 kubelet[1967]: I1101 00:24:35.693421 1967 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef" Nov 1 00:24:35.694400 env[1473]: time="2025-11-01T00:24:35.694368680Z" level=info msg="StopPodSandbox for \"b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef\"" Nov 1 00:24:35.725562 env[1473]: time="2025-11-01T00:24:35.725501274Z" level=error msg="StopPodSandbox for \"b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef\" failed" error="failed to destroy network for sandbox \"b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:24:35.725787 kubelet[1967]: E1101 00:24:35.725747 1967 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef" Nov 1 00:24:35.725839 kubelet[1967]: E1101 00:24:35.725797 1967 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef"} Nov 1 00:24:35.725839 kubelet[1967]: E1101 00:24:35.725832 1967 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"01a4fea2-ddc5-4cff-9fb7-c0578bdda197\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Nov 1 00:24:35.725926 kubelet[1967]: E1101 00:24:35.725853 1967 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"01a4fea2-ddc5-4cff-9fb7-c0578bdda197\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-t2l54" podUID="01a4fea2-ddc5-4cff-9fb7-c0578bdda197" Nov 1 00:24:36.417247 kubelet[1967]: E1101 00:24:36.417200 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:24:37.418357 kubelet[1967]: E1101 00:24:37.418292 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:24:37.627746 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount266303192.mount: Deactivated successfully. Nov 1 00:24:37.673688 env[1473]: time="2025-11-01T00:24:37.673523977Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:24:37.680867 env[1473]: time="2025-11-01T00:24:37.680822664Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:43a5290057a103af76996c108856f92ed902f34573d7a864f55f15b8aaf4683b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:24:37.686118 env[1473]: time="2025-11-01T00:24:37.686089950Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:24:37.689833 env[1473]: time="2025-11-01T00:24:37.689808634Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e92cca333202c87d07bf57f38182fd68f0779f912ef55305eda1fccc9f33667c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:24:37.690207 env[1473]: time="2025-11-01T00:24:37.690176274Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.4\" returns image reference \"sha256:43a5290057a103af76996c108856f92ed902f34573d7a864f55f15b8aaf4683b\"" Nov 1 00:24:37.705441 env[1473]: time="2025-11-01T00:24:37.705403130Z" level=info msg="CreateContainer within sandbox \"1e1abcb2eb76d2de544d3397c744990f93c2c59073f32de611821360a0410468\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Nov 1 00:24:37.747374 env[1473]: time="2025-11-01T00:24:37.747301013Z" level=info msg="CreateContainer within sandbox \"1e1abcb2eb76d2de544d3397c744990f93c2c59073f32de611821360a0410468\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"d510be3f3380a4b9f6eb328472b717a676effc37ae9b82968691560a514a4f5b\"" Nov 1 00:24:37.748118 env[1473]: time="2025-11-01T00:24:37.748090134Z" level=info msg="StartContainer for \"d510be3f3380a4b9f6eb328472b717a676effc37ae9b82968691560a514a4f5b\"" Nov 1 00:24:37.763785 systemd[1]: Started cri-containerd-d510be3f3380a4b9f6eb328472b717a676effc37ae9b82968691560a514a4f5b.scope. Nov 1 00:24:37.781000 audit[2484]: AVC avc: denied { perfmon } for pid=2484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:37.787671 kernel: kauditd_printk_skb: 34 callbacks suppressed Nov 1 00:24:37.787763 kernel: audit: type=1400 audit(1761956677.781:540): avc: denied { perfmon } for pid=2484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:37.781000 audit[2484]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400014f5a0 a2=3c a3=0 items=0 ppid=2018 pid=2484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:37.831212 kernel: audit: type=1300 audit(1761956677.781:540): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400014f5a0 a2=3c a3=0 items=0 ppid=2018 pid=2484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:37.831297 kernel: audit: type=1327 audit(1761956677.781:540): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435313062653366333338306134623966366562333238343732623731 Nov 1 00:24:37.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435313062653366333338306134623966366562333238343732623731 Nov 1 00:24:37.781000 audit[2484]: AVC avc: denied { bpf } for pid=2484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:37.873085 kernel: audit: type=1400 audit(1761956677.781:541): avc: denied { bpf } for pid=2484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:37.781000 audit[2484]: AVC avc: denied { bpf } for pid=2484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:37.890707 kernel: audit: type=1400 audit(1761956677.781:541): avc: denied { bpf } for pid=2484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:37.781000 audit[2484]: AVC avc: denied { bpf } for pid=2484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:37.908089 kernel: audit: type=1400 audit(1761956677.781:541): avc: denied { bpf } for pid=2484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:37.781000 audit[2484]: AVC avc: denied { perfmon } for pid=2484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:37.926018 kernel: audit: type=1400 audit(1761956677.781:541): avc: denied { perfmon } for pid=2484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:37.781000 audit[2484]: AVC avc: denied { perfmon } for pid=2484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:37.944869 kernel: audit: type=1400 audit(1761956677.781:541): avc: denied { perfmon } for pid=2484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:37.781000 audit[2484]: AVC avc: denied { perfmon } for pid=2484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:37.962104 kernel: audit: type=1400 audit(1761956677.781:541): avc: denied { perfmon } for pid=2484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:37.962269 kernel: audit: type=1400 audit(1761956677.781:541): avc: denied { perfmon } for pid=2484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:37.781000 audit[2484]: AVC avc: denied { perfmon } for pid=2484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:37.781000 audit[2484]: AVC avc: denied { perfmon } for pid=2484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:37.781000 audit[2484]: AVC avc: denied { bpf } for pid=2484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:37.781000 audit[2484]: AVC avc: denied { bpf } for pid=2484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:37.781000 audit: BPF prog-id=76 op=LOAD Nov 1 00:24:37.781000 audit[2484]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014f8e0 a2=78 a3=0 items=0 ppid=2018 pid=2484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:37.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435313062653366333338306134623966366562333238343732623731 Nov 1 00:24:37.787000 audit[2484]: AVC avc: denied { bpf } for pid=2484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:37.787000 audit[2484]: AVC avc: denied { bpf } for pid=2484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:37.787000 audit[2484]: AVC avc: denied { perfmon } for pid=2484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:37.787000 audit[2484]: AVC avc: denied { perfmon } for pid=2484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:37.787000 audit[2484]: AVC avc: denied { perfmon } for pid=2484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:37.787000 audit[2484]: AVC avc: denied { perfmon } for pid=2484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:37.787000 audit[2484]: AVC avc: denied { perfmon } for pid=2484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:37.787000 audit[2484]: AVC avc: denied { bpf } for pid=2484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:37.787000 audit[2484]: AVC avc: denied { bpf } for pid=2484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:37.787000 audit: BPF prog-id=77 op=LOAD Nov 1 00:24:37.787000 audit[2484]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400014f670 a2=78 a3=0 items=0 ppid=2018 pid=2484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:37.787000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435313062653366333338306134623966366562333238343732623731 Nov 1 00:24:37.804000 audit: BPF prog-id=77 op=UNLOAD Nov 1 00:24:37.804000 audit: BPF prog-id=76 op=UNLOAD Nov 1 00:24:37.804000 audit[2484]: AVC avc: denied { bpf } for pid=2484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:37.804000 audit[2484]: AVC avc: denied { bpf } for pid=2484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:37.804000 audit[2484]: AVC avc: denied { bpf } for pid=2484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:37.804000 audit[2484]: AVC avc: denied { perfmon } for pid=2484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:37.804000 audit[2484]: AVC avc: denied { perfmon } for pid=2484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:37.804000 audit[2484]: AVC avc: denied { perfmon } for pid=2484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:37.804000 audit[2484]: AVC avc: denied { perfmon } for pid=2484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:37.804000 audit[2484]: AVC avc: denied { perfmon } for pid=2484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:37.804000 audit[2484]: AVC avc: denied { bpf } for pid=2484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:37.804000 audit[2484]: AVC avc: denied { bpf } for pid=2484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:37.804000 audit: BPF prog-id=78 op=LOAD Nov 1 00:24:37.804000 audit[2484]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014fb40 a2=78 a3=0 items=0 ppid=2018 pid=2484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:37.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435313062653366333338306134623966366562333238343732623731 Nov 1 00:24:37.981201 env[1473]: time="2025-11-01T00:24:37.981149976Z" level=info msg="StartContainer for \"d510be3f3380a4b9f6eb328472b717a676effc37ae9b82968691560a514a4f5b\" returns successfully" Nov 1 00:24:38.419242 kubelet[1967]: E1101 00:24:38.419213 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:24:38.691784 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Nov 1 00:24:38.691973 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Nov 1 00:24:38.723627 systemd[1]: run-containerd-runc-k8s.io-d510be3f3380a4b9f6eb328472b717a676effc37ae9b82968691560a514a4f5b-runc.MiOmOA.mount: Deactivated successfully. Nov 1 00:24:39.420448 kubelet[1967]: E1101 00:24:39.420412 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:24:39.721856 systemd[1]: run-containerd-runc-k8s.io-d510be3f3380a4b9f6eb328472b717a676effc37ae9b82968691560a514a4f5b-runc.OGaFcB.mount: Deactivated successfully. Nov 1 00:24:40.069000 audit[2642]: AVC avc: denied { write } for pid=2642 comm="tee" name="fd" dev="proc" ino=17133 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 00:24:40.069000 audit[2642]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff523e7c0 a2=241 a3=1b6 items=1 ppid=2592 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.069000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Nov 1 00:24:40.073000 audit[2648]: AVC avc: denied { write } for pid=2648 comm="tee" name="fd" dev="proc" ino=18306 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 00:24:40.073000 audit[2648]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffb1947bf a2=241 a3=1b6 items=1 ppid=2588 pid=2648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.073000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Nov 1 00:24:40.073000 audit: PATH item=0 name="/dev/fd/63" inode=18300 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:24:40.073000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 00:24:40.074000 audit[2633]: AVC avc: denied { write } for pid=2633 comm="tee" name="fd" dev="proc" ino=18310 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 00:24:40.074000 audit[2633]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe6add7d0 a2=241 a3=1b6 items=1 ppid=2603 pid=2633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.074000 audit: CWD cwd="/etc/service/enabled/bird/log" Nov 1 00:24:40.074000 audit: PATH item=0 name="/dev/fd/63" inode=18295 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:24:40.074000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 00:24:40.069000 audit: PATH item=0 name="/dev/fd/63" inode=17117 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:24:40.069000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 00:24:40.083000 audit[2652]: AVC avc: denied { write } for pid=2652 comm="tee" name="fd" dev="proc" ino=17139 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 00:24:40.085000 audit[2656]: AVC avc: denied { write } for pid=2656 comm="tee" name="fd" dev="proc" ino=18314 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 00:24:40.085000 audit[2656]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd587b7cf a2=241 a3=1b6 items=1 ppid=2593 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.085000 audit: CWD cwd="/etc/service/enabled/confd/log" Nov 1 00:24:40.085000 audit: PATH item=0 name="/dev/fd/63" inode=18302 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:24:40.085000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 00:24:40.086000 audit[2651]: AVC avc: denied { write } for pid=2651 comm="tee" name="fd" dev="proc" ino=17140 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 00:24:40.086000 audit[2651]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe076a7d1 a2=241 a3=1b6 items=1 ppid=2598 pid=2651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.086000 audit: CWD cwd="/etc/service/enabled/cni/log" Nov 1 00:24:40.086000 audit: PATH item=0 name="/dev/fd/63" inode=18301 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:24:40.083000 audit[2652]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe6c5f7cf a2=241 a3=1b6 items=1 ppid=2596 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.086000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 00:24:40.083000 audit: CWD cwd="/etc/service/enabled/felix/log" Nov 1 00:24:40.083000 audit: PATH item=0 name="/dev/fd/63" inode=17124 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:24:40.083000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 00:24:40.088000 audit[2659]: AVC avc: denied { write } for pid=2659 comm="tee" name="fd" dev="proc" ino=17145 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 00:24:40.088000 audit[2659]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffec5257cf a2=241 a3=1b6 items=1 ppid=2600 pid=2659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.088000 audit: CWD cwd="/etc/service/enabled/bird6/log" Nov 1 00:24:40.088000 audit: PATH item=0 name="/dev/fd/63" inode=18303 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:24:40.088000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 00:24:40.282000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.282000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.282000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.282000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.282000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.282000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.282000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.282000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.282000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.282000 audit: BPF prog-id=79 op=LOAD Nov 1 00:24:40.282000 audit[2696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc32dd468 a2=98 a3=ffffc32dd458 items=0 ppid=2597 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.282000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Nov 1 00:24:40.282000 audit: BPF prog-id=79 op=UNLOAD Nov 1 00:24:40.282000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.282000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.282000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.282000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.282000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.282000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.282000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.282000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.282000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.282000 audit: BPF prog-id=80 op=LOAD Nov 1 00:24:40.282000 audit[2696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc32dd318 a2=74 a3=95 items=0 ppid=2597 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.282000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Nov 1 00:24:40.282000 audit: BPF prog-id=80 op=UNLOAD Nov 1 00:24:40.282000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.282000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.282000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.282000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.282000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.282000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.282000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.282000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.282000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.282000 audit: BPF prog-id=81 op=LOAD Nov 1 00:24:40.282000 audit[2696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc32dd348 a2=40 a3=ffffc32dd378 items=0 ppid=2597 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.282000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Nov 1 00:24:40.282000 audit: BPF prog-id=81 op=UNLOAD Nov 1 00:24:40.282000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.282000 audit[2696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=ffffc32dd460 a2=50 a3=0 items=0 ppid=2597 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.282000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Nov 1 00:24:40.283000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.283000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.283000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.283000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.283000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.283000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.283000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.283000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.283000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.283000 audit: BPF prog-id=82 op=LOAD Nov 1 00:24:40.283000 audit[2697]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffea69538 a2=98 a3=fffffea69528 items=0 ppid=2597 pid=2697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.283000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:24:40.284000 audit: BPF prog-id=82 op=UNLOAD Nov 1 00:24:40.284000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.284000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.284000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.284000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.284000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.284000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.284000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.284000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.284000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.284000 audit: BPF prog-id=83 op=LOAD Nov 1 00:24:40.284000 audit[2697]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffffea691c8 a2=74 a3=95 items=0 ppid=2597 pid=2697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.284000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:24:40.285000 audit: BPF prog-id=83 op=UNLOAD Nov 1 00:24:40.285000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.285000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.285000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.285000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.285000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.285000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.285000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.285000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.285000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.285000 audit: BPF prog-id=84 op=LOAD Nov 1 00:24:40.285000 audit[2697]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffffea69228 a2=94 a3=2 items=0 ppid=2597 pid=2697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.285000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:24:40.285000 audit: BPF prog-id=84 op=UNLOAD Nov 1 00:24:40.379000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.379000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.379000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.379000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.379000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.379000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.379000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.379000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.379000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.379000 audit: BPF prog-id=85 op=LOAD Nov 1 00:24:40.379000 audit[2697]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffffea691e8 a2=40 a3=fffffea69218 items=0 ppid=2597 pid=2697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.379000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:24:40.380000 audit: BPF prog-id=85 op=UNLOAD Nov 1 00:24:40.380000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.380000 audit[2697]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=fffffea69300 a2=50 a3=0 items=0 ppid=2597 pid=2697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.380000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:24:40.388000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.388000 audit[2697]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffea69258 a2=28 a3=fffffea69388 items=0 ppid=2597 pid=2697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.388000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:24:40.388000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.388000 audit[2697]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffea69288 a2=28 a3=fffffea693b8 items=0 ppid=2597 pid=2697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.388000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:24:40.388000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.388000 audit[2697]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffea69138 a2=28 a3=fffffea69268 items=0 ppid=2597 pid=2697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.388000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:24:40.388000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.388000 audit[2697]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffea692a8 a2=28 a3=fffffea693d8 items=0 ppid=2597 pid=2697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.388000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:24:40.388000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.388000 audit[2697]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffea69288 a2=28 a3=fffffea693b8 items=0 ppid=2597 pid=2697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.388000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:24:40.388000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.388000 audit[2697]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffea69278 a2=28 a3=fffffea693a8 items=0 ppid=2597 pid=2697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.388000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:24:40.388000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.388000 audit[2697]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffea692a8 a2=28 a3=fffffea693d8 items=0 ppid=2597 pid=2697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.388000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:24:40.388000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.388000 audit[2697]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffea69288 a2=28 a3=fffffea693b8 items=0 ppid=2597 pid=2697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.388000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:24:40.388000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.388000 audit[2697]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffea692a8 a2=28 a3=fffffea693d8 items=0 ppid=2597 pid=2697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.388000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:24:40.388000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.388000 audit[2697]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffea69278 a2=28 a3=fffffea693a8 items=0 ppid=2597 pid=2697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.388000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:24:40.388000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.388000 audit[2697]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffea692f8 a2=28 a3=fffffea69438 items=0 ppid=2597 pid=2697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.388000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:24:40.388000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.388000 audit[2697]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffffea69030 a2=50 a3=0 items=0 ppid=2597 pid=2697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.388000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:24:40.388000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.388000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.388000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.388000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.388000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.388000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.388000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.388000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.388000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.388000 audit: BPF prog-id=86 op=LOAD Nov 1 00:24:40.388000 audit[2697]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffffea69038 a2=94 a3=5 items=0 ppid=2597 pid=2697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.388000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:24:40.389000 audit: BPF prog-id=86 op=UNLOAD Nov 1 00:24:40.389000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.389000 audit[2697]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffffea69140 a2=50 a3=0 items=0 ppid=2597 pid=2697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.389000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:24:40.389000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.389000 audit[2697]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=fffffea69288 a2=4 a3=3 items=0 ppid=2597 pid=2697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.389000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:24:40.389000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.389000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.389000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.389000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.389000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.389000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.389000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.389000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.389000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.389000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.389000 audit[2697]: AVC avc: denied { confidentiality } for pid=2697 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:24:40.389000 audit[2697]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffffea69268 a2=94 a3=6 items=0 ppid=2597 pid=2697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.389000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:24:40.389000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.389000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.389000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.389000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.389000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.389000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.389000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.389000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.389000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.389000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.389000 audit[2697]: AVC avc: denied { confidentiality } for pid=2697 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:24:40.389000 audit[2697]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffffea68a38 a2=94 a3=83 items=0 ppid=2597 pid=2697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.389000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:24:40.389000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.389000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.389000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.389000 audit[2697]: AVC avc: denied { bpf } for pid=2697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.389000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.389000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.389000 audit[2697]: AVC avc: denied { perfmon } for pid=2697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.389000 audit[2697]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffffea68a38 a2=94 a3=83 items=0 ppid=2597 pid=2697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.389000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:24:40.397000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.397000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.397000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.397000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.397000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.397000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.397000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.397000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.397000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.397000 audit: BPF prog-id=87 op=LOAD Nov 1 00:24:40.397000 audit[2700]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcb3330e8 a2=98 a3=ffffcb3330d8 items=0 ppid=2597 pid=2700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.397000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Nov 1 00:24:40.397000 audit: BPF prog-id=87 op=UNLOAD Nov 1 00:24:40.397000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.397000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.397000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.397000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.397000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.397000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.397000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.397000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.397000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.397000 audit: BPF prog-id=88 op=LOAD Nov 1 00:24:40.397000 audit[2700]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcb332f98 a2=74 a3=95 items=0 ppid=2597 pid=2700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.397000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Nov 1 00:24:40.397000 audit: BPF prog-id=88 op=UNLOAD Nov 1 00:24:40.397000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.397000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.397000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.397000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.397000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.397000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.397000 audit[2700]: AVC avc: denied { perfmon } for pid=2700 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.397000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.397000 audit[2700]: AVC avc: denied { bpf } for pid=2700 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.397000 audit: BPF prog-id=89 op=LOAD Nov 1 00:24:40.397000 audit[2700]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcb332fc8 a2=40 a3=ffffcb332ff8 items=0 ppid=2597 pid=2700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.397000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Nov 1 00:24:40.397000 audit: BPF prog-id=89 op=UNLOAD Nov 1 00:24:40.421395 kubelet[1967]: E1101 00:24:40.421356 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:24:40.664175 systemd-networkd[1645]: vxlan.calico: Link UP Nov 1 00:24:40.664184 systemd-networkd[1645]: vxlan.calico: Gained carrier Nov 1 00:24:40.759000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.759000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.759000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.759000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.759000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.759000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.759000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.759000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.759000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.759000 audit: BPF prog-id=90 op=LOAD Nov 1 00:24:40.759000 audit[2728]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffff579a98 a2=98 a3=ffffff579a88 items=0 ppid=2597 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.759000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:24:40.760000 audit: BPF prog-id=90 op=UNLOAD Nov 1 00:24:40.760000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.760000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.760000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.760000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.760000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.760000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.760000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.760000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.760000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.760000 audit: BPF prog-id=91 op=LOAD Nov 1 00:24:40.760000 audit[2728]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffff579778 a2=74 a3=95 items=0 ppid=2597 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.760000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:24:40.760000 audit: BPF prog-id=91 op=UNLOAD Nov 1 00:24:40.760000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.760000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.760000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.760000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.760000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.760000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.760000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.760000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.760000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.760000 audit: BPF prog-id=92 op=LOAD Nov 1 00:24:40.760000 audit[2728]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffff5797d8 a2=94 a3=2 items=0 ppid=2597 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.760000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:24:40.760000 audit: BPF prog-id=92 op=UNLOAD Nov 1 00:24:40.760000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.760000 audit[2728]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffff579808 a2=28 a3=ffffff579938 items=0 ppid=2597 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.760000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:24:40.760000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.760000 audit[2728]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffff579838 a2=28 a3=ffffff579968 items=0 ppid=2597 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.760000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:24:40.760000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.760000 audit[2728]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffff5796e8 a2=28 a3=ffffff579818 items=0 ppid=2597 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.760000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:24:40.760000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.760000 audit[2728]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffff579858 a2=28 a3=ffffff579988 items=0 ppid=2597 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.760000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:24:40.760000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.760000 audit[2728]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffff579838 a2=28 a3=ffffff579968 items=0 ppid=2597 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.760000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:24:40.760000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.760000 audit[2728]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffff579828 a2=28 a3=ffffff579958 items=0 ppid=2597 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.760000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:24:40.760000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.760000 audit[2728]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffff579858 a2=28 a3=ffffff579988 items=0 ppid=2597 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.760000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:24:40.760000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.760000 audit[2728]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffff579838 a2=28 a3=ffffff579968 items=0 ppid=2597 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.760000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:24:40.760000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.760000 audit[2728]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffff579858 a2=28 a3=ffffff579988 items=0 ppid=2597 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.760000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:24:40.760000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.760000 audit[2728]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffff579828 a2=28 a3=ffffff579958 items=0 ppid=2597 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.760000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:24:40.760000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.760000 audit[2728]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffff5798a8 a2=28 a3=ffffff5799e8 items=0 ppid=2597 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.760000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:24:40.760000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.760000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.760000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.760000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.760000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.760000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.760000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.760000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.760000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.760000 audit: BPF prog-id=93 op=LOAD Nov 1 00:24:40.760000 audit[2728]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffff5796c8 a2=40 a3=ffffff5796f8 items=0 ppid=2597 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.760000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:24:40.760000 audit: BPF prog-id=93 op=UNLOAD Nov 1 00:24:40.763000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.763000 audit[2728]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffff5796f0 a2=50 a3=0 items=0 ppid=2597 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.763000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:24:40.763000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.763000 audit[2728]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffff5796f0 a2=50 a3=0 items=0 ppid=2597 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.763000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:24:40.763000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.763000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.763000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.763000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.763000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.763000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.763000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.763000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.763000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.763000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.763000 audit: BPF prog-id=94 op=LOAD Nov 1 00:24:40.763000 audit[2728]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffff578e58 a2=94 a3=2 items=0 ppid=2597 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.763000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:24:40.763000 audit: BPF prog-id=94 op=UNLOAD Nov 1 00:24:40.763000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.763000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.763000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.763000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.763000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.763000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.763000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.763000 audit[2728]: AVC avc: denied { perfmon } for pid=2728 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.763000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.763000 audit[2728]: AVC avc: denied { bpf } for pid=2728 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.763000 audit: BPF prog-id=95 op=LOAD Nov 1 00:24:40.763000 audit[2728]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffff578fe8 a2=94 a3=30 items=0 ppid=2597 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.763000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:24:40.769000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.769000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.769000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.769000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.769000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.769000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.769000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.769000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.769000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.769000 audit: BPF prog-id=96 op=LOAD Nov 1 00:24:40.769000 audit[2730]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd8f1d378 a2=98 a3=ffffd8f1d368 items=0 ppid=2597 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.769000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:24:40.769000 audit: BPF prog-id=96 op=UNLOAD Nov 1 00:24:40.769000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.769000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.769000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.769000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.769000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.769000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.769000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.769000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.769000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.769000 audit: BPF prog-id=97 op=LOAD Nov 1 00:24:40.769000 audit[2730]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd8f1d008 a2=74 a3=95 items=0 ppid=2597 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.769000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:24:40.769000 audit: BPF prog-id=97 op=UNLOAD Nov 1 00:24:40.769000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.769000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.769000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.769000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.769000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.769000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.769000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.769000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.769000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.769000 audit: BPF prog-id=98 op=LOAD Nov 1 00:24:40.769000 audit[2730]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd8f1d068 a2=94 a3=2 items=0 ppid=2597 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.769000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:24:40.770000 audit: BPF prog-id=98 op=UNLOAD Nov 1 00:24:40.866000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.866000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.866000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.866000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.866000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.866000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.866000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.866000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.866000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.866000 audit: BPF prog-id=99 op=LOAD Nov 1 00:24:40.866000 audit[2730]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd8f1d028 a2=40 a3=ffffd8f1d058 items=0 ppid=2597 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.866000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:24:40.866000 audit: BPF prog-id=99 op=UNLOAD Nov 1 00:24:40.866000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.866000 audit[2730]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffd8f1d140 a2=50 a3=0 items=0 ppid=2597 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.866000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:24:40.874000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.874000 audit[2730]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd8f1d098 a2=28 a3=ffffd8f1d1c8 items=0 ppid=2597 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.874000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:24:40.874000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.874000 audit[2730]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd8f1d0c8 a2=28 a3=ffffd8f1d1f8 items=0 ppid=2597 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.874000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:24:40.874000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.874000 audit[2730]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd8f1cf78 a2=28 a3=ffffd8f1d0a8 items=0 ppid=2597 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.874000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:24:40.874000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.874000 audit[2730]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd8f1d0e8 a2=28 a3=ffffd8f1d218 items=0 ppid=2597 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.874000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:24:40.874000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.874000 audit[2730]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd8f1d0c8 a2=28 a3=ffffd8f1d1f8 items=0 ppid=2597 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.874000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:24:40.874000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.874000 audit[2730]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd8f1d0b8 a2=28 a3=ffffd8f1d1e8 items=0 ppid=2597 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.874000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:24:40.874000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.874000 audit[2730]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd8f1d0e8 a2=28 a3=ffffd8f1d218 items=0 ppid=2597 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.874000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:24:40.874000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.874000 audit[2730]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd8f1d0c8 a2=28 a3=ffffd8f1d1f8 items=0 ppid=2597 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.874000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:24:40.874000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.874000 audit[2730]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd8f1d0e8 a2=28 a3=ffffd8f1d218 items=0 ppid=2597 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.874000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:24:40.874000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.874000 audit[2730]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd8f1d0b8 a2=28 a3=ffffd8f1d1e8 items=0 ppid=2597 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.874000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:24:40.874000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.874000 audit[2730]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd8f1d138 a2=28 a3=ffffd8f1d278 items=0 ppid=2597 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.874000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:24:40.875000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.875000 audit[2730]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffd8f1ce70 a2=50 a3=0 items=0 ppid=2597 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.875000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:24:40.875000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.875000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.875000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.875000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.875000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.875000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.875000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.875000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.875000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.875000 audit: BPF prog-id=100 op=LOAD Nov 1 00:24:40.875000 audit[2730]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffd8f1ce78 a2=94 a3=5 items=0 ppid=2597 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.875000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:24:40.875000 audit: BPF prog-id=100 op=UNLOAD Nov 1 00:24:40.875000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.875000 audit[2730]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffd8f1cf80 a2=50 a3=0 items=0 ppid=2597 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.875000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:24:40.875000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.875000 audit[2730]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffd8f1d0c8 a2=4 a3=3 items=0 ppid=2597 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.875000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:24:40.875000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.875000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.875000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.875000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.875000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.875000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.875000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.875000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.875000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.875000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.875000 audit[2730]: AVC avc: denied { confidentiality } for pid=2730 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:24:40.875000 audit[2730]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd8f1d0a8 a2=94 a3=6 items=0 ppid=2597 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.875000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:24:40.875000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.875000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.875000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.875000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.875000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.875000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.875000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.875000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.875000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.875000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.875000 audit[2730]: AVC avc: denied { confidentiality } for pid=2730 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:24:40.875000 audit[2730]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd8f1c878 a2=94 a3=83 items=0 ppid=2597 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.875000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:24:40.875000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.875000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.875000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.875000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.875000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.875000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.875000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.875000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.875000 audit[2730]: AVC avc: denied { perfmon } for pid=2730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.875000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.875000 audit[2730]: AVC avc: denied { confidentiality } for pid=2730 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:24:40.875000 audit[2730]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd8f1c878 a2=94 a3=83 items=0 ppid=2597 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.875000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:24:40.875000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.875000 audit[2730]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd8f1e2b8 a2=10 a3=ffffd8f1e3a8 items=0 ppid=2597 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.875000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:24:40.875000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.875000 audit[2730]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd8f1e178 a2=10 a3=ffffd8f1e268 items=0 ppid=2597 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.875000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:24:40.875000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.875000 audit[2730]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd8f1e0e8 a2=10 a3=ffffd8f1e268 items=0 ppid=2597 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.875000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:24:40.875000 audit[2730]: AVC avc: denied { bpf } for pid=2730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:40.875000 audit[2730]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd8f1e0e8 a2=10 a3=ffffd8f1e268 items=0 ppid=2597 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:40.875000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:24:40.881000 audit: BPF prog-id=95 op=UNLOAD Nov 1 00:24:41.170000 audit[2756]: NETFILTER_CFG table=mangle:68 family=2 entries=16 op=nft_register_chain pid=2756 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 00:24:41.170000 audit[2756]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffc0597990 a2=0 a3=ffff8c4fafa8 items=0 ppid=2597 pid=2756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:41.170000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 00:24:41.269000 audit[2758]: NETFILTER_CFG table=nat:69 family=2 entries=15 op=nft_register_chain pid=2758 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 00:24:41.269000 audit[2758]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffdb5a2520 a2=0 a3=ffff968aafa8 items=0 ppid=2597 pid=2758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:41.269000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 00:24:41.270000 audit[2757]: NETFILTER_CFG table=filter:70 family=2 entries=39 op=nft_register_chain pid=2757 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 00:24:41.270000 audit[2757]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=fffff8db0c60 a2=0 a3=ffffa030afa8 items=0 ppid=2597 pid=2757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:41.270000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 00:24:41.325000 audit[2755]: NETFILTER_CFG table=raw:71 family=2 entries=21 op=nft_register_chain pid=2755 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 00:24:41.325000 audit[2755]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=ffffdaa24e30 a2=0 a3=ffff8c60cfa8 items=0 ppid=2597 pid=2755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:41.325000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 00:24:41.421782 kubelet[1967]: E1101 00:24:41.421656 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:24:42.129802 systemd-networkd[1645]: vxlan.calico: Gained IPv6LL Nov 1 00:24:42.422308 kubelet[1967]: E1101 00:24:42.422190 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:24:43.422861 kubelet[1967]: E1101 00:24:43.422819 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:24:44.423025 kubelet[1967]: E1101 00:24:44.422976 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:24:45.424080 kubelet[1967]: E1101 00:24:45.424040 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:24:46.425105 kubelet[1967]: E1101 00:24:46.425065 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:24:47.425206 kubelet[1967]: E1101 00:24:47.425171 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:24:48.426677 kubelet[1967]: E1101 00:24:48.426636 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:24:49.427372 kubelet[1967]: E1101 00:24:49.427333 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:24:49.638653 env[1473]: time="2025-11-01T00:24:49.638323239Z" level=info msg="StopPodSandbox for \"15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd\"" Nov 1 00:24:49.638653 env[1473]: time="2025-11-01T00:24:49.638436159Z" level=info msg="StopPodSandbox for \"b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef\"" Nov 1 00:24:49.694505 kubelet[1967]: I1101 00:24:49.694379 1967 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-n97dw" podStartSLOduration=21.673026547 podStartE2EDuration="35.694360123s" podCreationTimestamp="2025-11-01 00:24:14 +0000 UTC" firstStartedPulling="2025-11-01 00:24:23.669933139 +0000 UTC m=+10.635440443" lastFinishedPulling="2025-11-01 00:24:37.691266715 +0000 UTC m=+24.656774019" observedRunningTime="2025-11-01 00:24:38.730364376 +0000 UTC m=+25.695871680" watchObservedRunningTime="2025-11-01 00:24:49.694360123 +0000 UTC m=+36.659867427" Nov 1 00:24:49.732325 env[1473]: 2025-11-01 00:24:49.696 [INFO][2796] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef" Nov 1 00:24:49.732325 env[1473]: 2025-11-01 00:24:49.697 [INFO][2796] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef" iface="eth0" netns="/var/run/netns/cni-3435132a-1653-90d5-f5fc-87d88c6ad7cf" Nov 1 00:24:49.732325 env[1473]: 2025-11-01 00:24:49.697 [INFO][2796] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef" iface="eth0" netns="/var/run/netns/cni-3435132a-1653-90d5-f5fc-87d88c6ad7cf" Nov 1 00:24:49.732325 env[1473]: 2025-11-01 00:24:49.697 [INFO][2796] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef" iface="eth0" netns="/var/run/netns/cni-3435132a-1653-90d5-f5fc-87d88c6ad7cf" Nov 1 00:24:49.732325 env[1473]: 2025-11-01 00:24:49.697 [INFO][2796] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef" Nov 1 00:24:49.732325 env[1473]: 2025-11-01 00:24:49.697 [INFO][2796] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef" Nov 1 00:24:49.732325 env[1473]: 2025-11-01 00:24:49.715 [INFO][2815] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef" HandleID="k8s-pod-network.b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef" Workload="10.200.20.12-k8s-nginx--deployment--7fcdb87857--t2l54-eth0" Nov 1 00:24:49.732325 env[1473]: 2025-11-01 00:24:49.716 [INFO][2815] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:24:49.732325 env[1473]: 2025-11-01 00:24:49.716 [INFO][2815] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:24:49.732325 env[1473]: 2025-11-01 00:24:49.726 [WARNING][2815] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef" HandleID="k8s-pod-network.b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef" Workload="10.200.20.12-k8s-nginx--deployment--7fcdb87857--t2l54-eth0" Nov 1 00:24:49.732325 env[1473]: 2025-11-01 00:24:49.726 [INFO][2815] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef" HandleID="k8s-pod-network.b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef" Workload="10.200.20.12-k8s-nginx--deployment--7fcdb87857--t2l54-eth0" Nov 1 00:24:49.732325 env[1473]: 2025-11-01 00:24:49.728 [INFO][2815] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:24:49.732325 env[1473]: 2025-11-01 00:24:49.731 [INFO][2796] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef" Nov 1 00:24:49.734762 env[1473]: time="2025-11-01T00:24:49.734722114Z" level=info msg="TearDown network for sandbox \"b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef\" successfully" Nov 1 00:24:49.734868 env[1473]: time="2025-11-01T00:24:49.734850195Z" level=info msg="StopPodSandbox for \"b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef\" returns successfully" Nov 1 00:24:49.735077 systemd[1]: run-netns-cni\x2d3435132a\x2d1653\x2d90d5\x2df5fc\x2d87d88c6ad7cf.mount: Deactivated successfully. Nov 1 00:24:49.736643 env[1473]: time="2025-11-01T00:24:49.736585796Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-t2l54,Uid:01a4fea2-ddc5-4cff-9fb7-c0578bdda197,Namespace:default,Attempt:1,}" Nov 1 00:24:49.747912 env[1473]: 2025-11-01 00:24:49.693 [INFO][2792] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd" Nov 1 00:24:49.747912 env[1473]: 2025-11-01 00:24:49.693 [INFO][2792] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd" iface="eth0" netns="/var/run/netns/cni-9767ba5e-1fa7-52c2-932e-149167f10f02" Nov 1 00:24:49.747912 env[1473]: 2025-11-01 00:24:49.694 [INFO][2792] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd" iface="eth0" netns="/var/run/netns/cni-9767ba5e-1fa7-52c2-932e-149167f10f02" Nov 1 00:24:49.747912 env[1473]: 2025-11-01 00:24:49.694 [INFO][2792] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd" iface="eth0" netns="/var/run/netns/cni-9767ba5e-1fa7-52c2-932e-149167f10f02" Nov 1 00:24:49.747912 env[1473]: 2025-11-01 00:24:49.694 [INFO][2792] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd" Nov 1 00:24:49.747912 env[1473]: 2025-11-01 00:24:49.694 [INFO][2792] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd" Nov 1 00:24:49.747912 env[1473]: 2025-11-01 00:24:49.715 [INFO][2809] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd" HandleID="k8s-pod-network.15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd" Workload="10.200.20.12-k8s-csi--node--driver--xmn5c-eth0" Nov 1 00:24:49.747912 env[1473]: 2025-11-01 00:24:49.716 [INFO][2809] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:24:49.747912 env[1473]: 2025-11-01 00:24:49.728 [INFO][2809] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:24:49.747912 env[1473]: 2025-11-01 00:24:49.743 [WARNING][2809] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd" HandleID="k8s-pod-network.15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd" Workload="10.200.20.12-k8s-csi--node--driver--xmn5c-eth0" Nov 1 00:24:49.747912 env[1473]: 2025-11-01 00:24:49.743 [INFO][2809] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd" HandleID="k8s-pod-network.15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd" Workload="10.200.20.12-k8s-csi--node--driver--xmn5c-eth0" Nov 1 00:24:49.747912 env[1473]: 2025-11-01 00:24:49.745 [INFO][2809] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:24:49.747912 env[1473]: 2025-11-01 00:24:49.746 [INFO][2792] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd" Nov 1 00:24:49.750180 env[1473]: time="2025-11-01T00:24:49.750143767Z" level=info msg="TearDown network for sandbox \"15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd\" successfully" Nov 1 00:24:49.752254 env[1473]: time="2025-11-01T00:24:49.750237327Z" level=info msg="StopPodSandbox for \"15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd\" returns successfully" Nov 1 00:24:49.752254 env[1473]: time="2025-11-01T00:24:49.750971447Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xmn5c,Uid:98274ee7-d1d6-4f2e-b0fd-446126b657a6,Namespace:calico-system,Attempt:1,}" Nov 1 00:24:49.751514 systemd[1]: run-netns-cni\x2d9767ba5e\x2d1fa7\x2d52c2\x2d932e\x2d149167f10f02.mount: Deactivated successfully. Nov 1 00:24:49.943223 systemd-networkd[1645]: cali8ea71959d34: Link UP Nov 1 00:24:49.957418 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Nov 1 00:24:49.957539 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8ea71959d34: link becomes ready Nov 1 00:24:49.961539 systemd-networkd[1645]: cali8ea71959d34: Gained carrier Nov 1 00:24:49.979771 env[1473]: 2025-11-01 00:24:49.850 [INFO][2822] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.12-k8s-nginx--deployment--7fcdb87857--t2l54-eth0 nginx-deployment-7fcdb87857- default 01a4fea2-ddc5-4cff-9fb7-c0578bdda197 2016 0 2025-11-01 00:24:34 +0000 UTC map[app:nginx pod-template-hash:7fcdb87857 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.12 nginx-deployment-7fcdb87857-t2l54 eth0 default [] [] [kns.default ksa.default.default] cali8ea71959d34 [] [] }} ContainerID="6f37617453eac8dbad24ef5fcf3e7694945fd0dfa8a75d066d6f7d28559478d8" Namespace="default" Pod="nginx-deployment-7fcdb87857-t2l54" WorkloadEndpoint="10.200.20.12-k8s-nginx--deployment--7fcdb87857--t2l54-" Nov 1 00:24:49.979771 env[1473]: 2025-11-01 00:24:49.851 [INFO][2822] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="6f37617453eac8dbad24ef5fcf3e7694945fd0dfa8a75d066d6f7d28559478d8" Namespace="default" Pod="nginx-deployment-7fcdb87857-t2l54" WorkloadEndpoint="10.200.20.12-k8s-nginx--deployment--7fcdb87857--t2l54-eth0" Nov 1 00:24:49.979771 env[1473]: 2025-11-01 00:24:49.886 [INFO][2850] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6f37617453eac8dbad24ef5fcf3e7694945fd0dfa8a75d066d6f7d28559478d8" HandleID="k8s-pod-network.6f37617453eac8dbad24ef5fcf3e7694945fd0dfa8a75d066d6f7d28559478d8" Workload="10.200.20.12-k8s-nginx--deployment--7fcdb87857--t2l54-eth0" Nov 1 00:24:49.979771 env[1473]: 2025-11-01 00:24:49.886 [INFO][2850] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="6f37617453eac8dbad24ef5fcf3e7694945fd0dfa8a75d066d6f7d28559478d8" HandleID="k8s-pod-network.6f37617453eac8dbad24ef5fcf3e7694945fd0dfa8a75d066d6f7d28559478d8" Workload="10.200.20.12-k8s-nginx--deployment--7fcdb87857--t2l54-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002c2fe0), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.12", "pod":"nginx-deployment-7fcdb87857-t2l54", "timestamp":"2025-11-01 00:24:49.886812074 +0000 UTC"}, Hostname:"10.200.20.12", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Nov 1 00:24:49.979771 env[1473]: 2025-11-01 00:24:49.887 [INFO][2850] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:24:49.979771 env[1473]: 2025-11-01 00:24:49.887 [INFO][2850] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:24:49.979771 env[1473]: 2025-11-01 00:24:49.887 [INFO][2850] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.12' Nov 1 00:24:49.979771 env[1473]: 2025-11-01 00:24:49.898 [INFO][2850] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.6f37617453eac8dbad24ef5fcf3e7694945fd0dfa8a75d066d6f7d28559478d8" host="10.200.20.12" Nov 1 00:24:49.979771 env[1473]: 2025-11-01 00:24:49.902 [INFO][2850] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.20.12" Nov 1 00:24:49.979771 env[1473]: 2025-11-01 00:24:49.907 [INFO][2850] ipam/ipam.go 511: Trying affinity for 192.168.119.0/26 host="10.200.20.12" Nov 1 00:24:49.979771 env[1473]: 2025-11-01 00:24:49.910 [INFO][2850] ipam/ipam.go 158: Attempting to load block cidr=192.168.119.0/26 host="10.200.20.12" Nov 1 00:24:49.979771 env[1473]: 2025-11-01 00:24:49.913 [INFO][2850] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.119.0/26 host="10.200.20.12" Nov 1 00:24:49.979771 env[1473]: 2025-11-01 00:24:49.913 [INFO][2850] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.119.0/26 handle="k8s-pod-network.6f37617453eac8dbad24ef5fcf3e7694945fd0dfa8a75d066d6f7d28559478d8" host="10.200.20.12" Nov 1 00:24:49.979771 env[1473]: 2025-11-01 00:24:49.914 [INFO][2850] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.6f37617453eac8dbad24ef5fcf3e7694945fd0dfa8a75d066d6f7d28559478d8 Nov 1 00:24:49.979771 env[1473]: 2025-11-01 00:24:49.920 [INFO][2850] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.119.0/26 handle="k8s-pod-network.6f37617453eac8dbad24ef5fcf3e7694945fd0dfa8a75d066d6f7d28559478d8" host="10.200.20.12" Nov 1 00:24:49.979771 env[1473]: 2025-11-01 00:24:49.934 [INFO][2850] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.119.1/26] block=192.168.119.0/26 handle="k8s-pod-network.6f37617453eac8dbad24ef5fcf3e7694945fd0dfa8a75d066d6f7d28559478d8" host="10.200.20.12" Nov 1 00:24:49.979771 env[1473]: 2025-11-01 00:24:49.934 [INFO][2850] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.119.1/26] handle="k8s-pod-network.6f37617453eac8dbad24ef5fcf3e7694945fd0dfa8a75d066d6f7d28559478d8" host="10.200.20.12" Nov 1 00:24:49.979771 env[1473]: 2025-11-01 00:24:49.934 [INFO][2850] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:24:49.979771 env[1473]: 2025-11-01 00:24:49.935 [INFO][2850] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.119.1/26] IPv6=[] ContainerID="6f37617453eac8dbad24ef5fcf3e7694945fd0dfa8a75d066d6f7d28559478d8" HandleID="k8s-pod-network.6f37617453eac8dbad24ef5fcf3e7694945fd0dfa8a75d066d6f7d28559478d8" Workload="10.200.20.12-k8s-nginx--deployment--7fcdb87857--t2l54-eth0" Nov 1 00:24:49.980389 env[1473]: 2025-11-01 00:24:49.936 [INFO][2822] cni-plugin/k8s.go 418: Populated endpoint ContainerID="6f37617453eac8dbad24ef5fcf3e7694945fd0dfa8a75d066d6f7d28559478d8" Namespace="default" Pod="nginx-deployment-7fcdb87857-t2l54" WorkloadEndpoint="10.200.20.12-k8s-nginx--deployment--7fcdb87857--t2l54-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12-k8s-nginx--deployment--7fcdb87857--t2l54-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"01a4fea2-ddc5-4cff-9fb7-c0578bdda197", ResourceVersion:"2016", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 24, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.12", ContainerID:"", Pod:"nginx-deployment-7fcdb87857-t2l54", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.119.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali8ea71959d34", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:24:49.980389 env[1473]: 2025-11-01 00:24:49.937 [INFO][2822] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.119.1/32] ContainerID="6f37617453eac8dbad24ef5fcf3e7694945fd0dfa8a75d066d6f7d28559478d8" Namespace="default" Pod="nginx-deployment-7fcdb87857-t2l54" WorkloadEndpoint="10.200.20.12-k8s-nginx--deployment--7fcdb87857--t2l54-eth0" Nov 1 00:24:49.980389 env[1473]: 2025-11-01 00:24:49.937 [INFO][2822] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali8ea71959d34 ContainerID="6f37617453eac8dbad24ef5fcf3e7694945fd0dfa8a75d066d6f7d28559478d8" Namespace="default" Pod="nginx-deployment-7fcdb87857-t2l54" WorkloadEndpoint="10.200.20.12-k8s-nginx--deployment--7fcdb87857--t2l54-eth0" Nov 1 00:24:49.980389 env[1473]: 2025-11-01 00:24:49.962 [INFO][2822] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="6f37617453eac8dbad24ef5fcf3e7694945fd0dfa8a75d066d6f7d28559478d8" Namespace="default" Pod="nginx-deployment-7fcdb87857-t2l54" WorkloadEndpoint="10.200.20.12-k8s-nginx--deployment--7fcdb87857--t2l54-eth0" Nov 1 00:24:49.980389 env[1473]: 2025-11-01 00:24:49.964 [INFO][2822] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="6f37617453eac8dbad24ef5fcf3e7694945fd0dfa8a75d066d6f7d28559478d8" Namespace="default" Pod="nginx-deployment-7fcdb87857-t2l54" WorkloadEndpoint="10.200.20.12-k8s-nginx--deployment--7fcdb87857--t2l54-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12-k8s-nginx--deployment--7fcdb87857--t2l54-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"01a4fea2-ddc5-4cff-9fb7-c0578bdda197", ResourceVersion:"2016", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 24, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.12", ContainerID:"6f37617453eac8dbad24ef5fcf3e7694945fd0dfa8a75d066d6f7d28559478d8", Pod:"nginx-deployment-7fcdb87857-t2l54", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.119.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali8ea71959d34", MAC:"02:ae:4f:31:54:77", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:24:49.980389 env[1473]: 2025-11-01 00:24:49.975 [INFO][2822] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="6f37617453eac8dbad24ef5fcf3e7694945fd0dfa8a75d066d6f7d28559478d8" Namespace="default" Pod="nginx-deployment-7fcdb87857-t2l54" WorkloadEndpoint="10.200.20.12-k8s-nginx--deployment--7fcdb87857--t2l54-eth0" Nov 1 00:24:49.997331 env[1473]: time="2025-11-01T00:24:49.997142441Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 00:24:49.997331 env[1473]: time="2025-11-01T00:24:49.997183121Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 00:24:49.997331 env[1473]: time="2025-11-01T00:24:49.997192721Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 00:24:49.997536 env[1473]: time="2025-11-01T00:24:49.997358201Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6f37617453eac8dbad24ef5fcf3e7694945fd0dfa8a75d066d6f7d28559478d8 pid=2883 runtime=io.containerd.runc.v2 Nov 1 00:24:50.010550 systemd[1]: Started cri-containerd-6f37617453eac8dbad24ef5fcf3e7694945fd0dfa8a75d066d6f7d28559478d8.scope. Nov 1 00:24:50.029779 kernel: kauditd_printk_skb: 598 callbacks suppressed Nov 1 00:24:50.029926 kernel: audit: type=1400 audit(1761956690.023:655): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.065818 kernel: audit: type=1400 audit(1761956690.023:656): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.087548 kernel: audit: type=1400 audit(1761956690.023:657): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.094092 systemd-networkd[1645]: cali6c00c4e8561: Link UP Nov 1 00:24:50.119720 env[1473]: time="2025-11-01T00:24:50.119375335Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-t2l54,Uid:01a4fea2-ddc5-4cff-9fb7-c0578bdda197,Namespace:default,Attempt:1,} returns sandbox id \"6f37617453eac8dbad24ef5fcf3e7694945fd0dfa8a75d066d6f7d28559478d8\"" Nov 1 00:24:50.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.133950 env[1473]: time="2025-11-01T00:24:50.133911906Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Nov 1 00:24:50.135707 kernel: audit: type=1400 audit(1761956690.023:658): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.135870 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6c00c4e8561: link becomes ready Nov 1 00:24:50.135904 kernel: audit: type=1400 audit(1761956690.023:659): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.135444 systemd-networkd[1645]: cali6c00c4e8561: Gained carrier Nov 1 00:24:50.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.164317 kernel: audit: type=1400 audit(1761956690.023:660): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.167954 env[1473]: 2025-11-01 00:24:49.864 [INFO][2835] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.12-k8s-csi--node--driver--xmn5c-eth0 csi-node-driver- calico-system 98274ee7-d1d6-4f2e-b0fd-446126b657a6 2015 0 2025-11-01 00:24:14 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:857b56db8f k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.200.20.12 csi-node-driver-xmn5c eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali6c00c4e8561 [] [] }} ContainerID="0e09fd7fef065172776b89961b20634c4480e61ce307d32d6e9403167cbc0e14" Namespace="calico-system" Pod="csi-node-driver-xmn5c" WorkloadEndpoint="10.200.20.12-k8s-csi--node--driver--xmn5c-" Nov 1 00:24:50.167954 env[1473]: 2025-11-01 00:24:49.864 [INFO][2835] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="0e09fd7fef065172776b89961b20634c4480e61ce307d32d6e9403167cbc0e14" Namespace="calico-system" Pod="csi-node-driver-xmn5c" WorkloadEndpoint="10.200.20.12-k8s-csi--node--driver--xmn5c-eth0" Nov 1 00:24:50.167954 env[1473]: 2025-11-01 00:24:49.902 [INFO][2856] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0e09fd7fef065172776b89961b20634c4480e61ce307d32d6e9403167cbc0e14" HandleID="k8s-pod-network.0e09fd7fef065172776b89961b20634c4480e61ce307d32d6e9403167cbc0e14" Workload="10.200.20.12-k8s-csi--node--driver--xmn5c-eth0" Nov 1 00:24:50.167954 env[1473]: 2025-11-01 00:24:49.902 [INFO][2856] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="0e09fd7fef065172776b89961b20634c4480e61ce307d32d6e9403167cbc0e14" HandleID="k8s-pod-network.0e09fd7fef065172776b89961b20634c4480e61ce307d32d6e9403167cbc0e14" Workload="10.200.20.12-k8s-csi--node--driver--xmn5c-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002c3200), Attrs:map[string]string{"namespace":"calico-system", "node":"10.200.20.12", "pod":"csi-node-driver-xmn5c", "timestamp":"2025-11-01 00:24:49.902273246 +0000 UTC"}, Hostname:"10.200.20.12", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Nov 1 00:24:50.167954 env[1473]: 2025-11-01 00:24:49.902 [INFO][2856] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:24:50.167954 env[1473]: 2025-11-01 00:24:49.934 [INFO][2856] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:24:50.167954 env[1473]: 2025-11-01 00:24:49.935 [INFO][2856] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.12' Nov 1 00:24:50.167954 env[1473]: 2025-11-01 00:24:49.998 [INFO][2856] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.0e09fd7fef065172776b89961b20634c4480e61ce307d32d6e9403167cbc0e14" host="10.200.20.12" Nov 1 00:24:50.167954 env[1473]: 2025-11-01 00:24:50.005 [INFO][2856] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.20.12" Nov 1 00:24:50.167954 env[1473]: 2025-11-01 00:24:50.009 [INFO][2856] ipam/ipam.go 511: Trying affinity for 192.168.119.0/26 host="10.200.20.12" Nov 1 00:24:50.167954 env[1473]: 2025-11-01 00:24:50.014 [INFO][2856] ipam/ipam.go 158: Attempting to load block cidr=192.168.119.0/26 host="10.200.20.12" Nov 1 00:24:50.167954 env[1473]: 2025-11-01 00:24:50.018 [INFO][2856] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.119.0/26 host="10.200.20.12" Nov 1 00:24:50.167954 env[1473]: 2025-11-01 00:24:50.018 [INFO][2856] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.119.0/26 handle="k8s-pod-network.0e09fd7fef065172776b89961b20634c4480e61ce307d32d6e9403167cbc0e14" host="10.200.20.12" Nov 1 00:24:50.167954 env[1473]: 2025-11-01 00:24:50.019 [INFO][2856] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.0e09fd7fef065172776b89961b20634c4480e61ce307d32d6e9403167cbc0e14 Nov 1 00:24:50.167954 env[1473]: 2025-11-01 00:24:50.066 [INFO][2856] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.119.0/26 handle="k8s-pod-network.0e09fd7fef065172776b89961b20634c4480e61ce307d32d6e9403167cbc0e14" host="10.200.20.12" Nov 1 00:24:50.167954 env[1473]: 2025-11-01 00:24:50.087 [INFO][2856] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.119.2/26] block=192.168.119.0/26 handle="k8s-pod-network.0e09fd7fef065172776b89961b20634c4480e61ce307d32d6e9403167cbc0e14" host="10.200.20.12" Nov 1 00:24:50.167954 env[1473]: 2025-11-01 00:24:50.088 [INFO][2856] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.119.2/26] handle="k8s-pod-network.0e09fd7fef065172776b89961b20634c4480e61ce307d32d6e9403167cbc0e14" host="10.200.20.12" Nov 1 00:24:50.167954 env[1473]: 2025-11-01 00:24:50.088 [INFO][2856] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:24:50.167954 env[1473]: 2025-11-01 00:24:50.088 [INFO][2856] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.119.2/26] IPv6=[] ContainerID="0e09fd7fef065172776b89961b20634c4480e61ce307d32d6e9403167cbc0e14" HandleID="k8s-pod-network.0e09fd7fef065172776b89961b20634c4480e61ce307d32d6e9403167cbc0e14" Workload="10.200.20.12-k8s-csi--node--driver--xmn5c-eth0" Nov 1 00:24:50.168644 env[1473]: 2025-11-01 00:24:50.090 [INFO][2835] cni-plugin/k8s.go 418: Populated endpoint ContainerID="0e09fd7fef065172776b89961b20634c4480e61ce307d32d6e9403167cbc0e14" Namespace="calico-system" Pod="csi-node-driver-xmn5c" WorkloadEndpoint="10.200.20.12-k8s-csi--node--driver--xmn5c-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12-k8s-csi--node--driver--xmn5c-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"98274ee7-d1d6-4f2e-b0fd-446126b657a6", ResourceVersion:"2015", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 24, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.12", ContainerID:"", Pod:"csi-node-driver-xmn5c", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.119.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali6c00c4e8561", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:24:50.168644 env[1473]: 2025-11-01 00:24:50.090 [INFO][2835] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.119.2/32] ContainerID="0e09fd7fef065172776b89961b20634c4480e61ce307d32d6e9403167cbc0e14" Namespace="calico-system" Pod="csi-node-driver-xmn5c" WorkloadEndpoint="10.200.20.12-k8s-csi--node--driver--xmn5c-eth0" Nov 1 00:24:50.168644 env[1473]: 2025-11-01 00:24:50.090 [INFO][2835] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali6c00c4e8561 ContainerID="0e09fd7fef065172776b89961b20634c4480e61ce307d32d6e9403167cbc0e14" Namespace="calico-system" Pod="csi-node-driver-xmn5c" WorkloadEndpoint="10.200.20.12-k8s-csi--node--driver--xmn5c-eth0" Nov 1 00:24:50.168644 env[1473]: 2025-11-01 00:24:50.094 [INFO][2835] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0e09fd7fef065172776b89961b20634c4480e61ce307d32d6e9403167cbc0e14" Namespace="calico-system" Pod="csi-node-driver-xmn5c" WorkloadEndpoint="10.200.20.12-k8s-csi--node--driver--xmn5c-eth0" Nov 1 00:24:50.168644 env[1473]: 2025-11-01 00:24:50.136 [INFO][2835] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="0e09fd7fef065172776b89961b20634c4480e61ce307d32d6e9403167cbc0e14" Namespace="calico-system" Pod="csi-node-driver-xmn5c" WorkloadEndpoint="10.200.20.12-k8s-csi--node--driver--xmn5c-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12-k8s-csi--node--driver--xmn5c-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"98274ee7-d1d6-4f2e-b0fd-446126b657a6", ResourceVersion:"2015", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 24, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.12", ContainerID:"0e09fd7fef065172776b89961b20634c4480e61ce307d32d6e9403167cbc0e14", Pod:"csi-node-driver-xmn5c", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.119.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali6c00c4e8561", MAC:"9a:9d:a3:31:3b:83", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:24:50.168644 env[1473]: 2025-11-01 00:24:50.165 [INFO][2835] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="0e09fd7fef065172776b89961b20634c4480e61ce307d32d6e9403167cbc0e14" Namespace="calico-system" Pod="csi-node-driver-xmn5c" WorkloadEndpoint="10.200.20.12-k8s-csi--node--driver--xmn5c-eth0" Nov 1 00:24:50.184391 kernel: audit: type=1400 audit(1761956690.023:661): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.203345 kernel: audit: type=1400 audit(1761956690.023:662): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.203500 kernel: audit: type=1400 audit(1761956690.023:663): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.241464 kernel: audit: type=1400 audit(1761956690.047:664): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.047000 audit: BPF prog-id=101 op=LOAD Nov 1 00:24:50.047000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.047000 audit[2893]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2883 pid=2893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:50.047000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666333736313734353365616338646261643234656635666366336537 Nov 1 00:24:50.047000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.047000 audit[2893]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2883 pid=2893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:50.047000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666333736313734353365616338646261643234656635666366336537 Nov 1 00:24:50.047000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.047000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.047000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.047000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.047000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.047000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.047000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.047000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.047000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.047000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.047000 audit: BPF prog-id=102 op=LOAD Nov 1 00:24:50.047000 audit[2893]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2883 pid=2893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:50.047000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666333736313734353365616338646261643234656635666366336537 Nov 1 00:24:50.065000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.065000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.065000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.065000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.065000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.065000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.065000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.065000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.065000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.065000 audit: BPF prog-id=103 op=LOAD Nov 1 00:24:50.065000 audit[2893]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2883 pid=2893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:50.065000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666333736313734353365616338646261643234656635666366336537 Nov 1 00:24:50.065000 audit: BPF prog-id=103 op=UNLOAD Nov 1 00:24:50.065000 audit: BPF prog-id=102 op=UNLOAD Nov 1 00:24:50.065000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.065000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.065000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.065000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.065000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.065000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.065000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.065000 audit[2893]: AVC avc: denied { perfmon } for pid=2893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.065000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.065000 audit[2893]: AVC avc: denied { bpf } for pid=2893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.065000 audit: BPF prog-id=104 op=LOAD Nov 1 00:24:50.065000 audit[2893]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2883 pid=2893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:50.065000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666333736313734353365616338646261643234656635666366336537 Nov 1 00:24:50.068000 audit[2873]: NETFILTER_CFG table=filter:72 family=2 entries=38 op=nft_register_chain pid=2873 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 00:24:50.068000 audit[2873]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21324 a0=3 a1=fffffeb755b0 a2=0 a3=ffffb8e62fa8 items=0 ppid=2597 pid=2873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:50.068000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 00:24:50.250374 env[1473]: time="2025-11-01T00:24:50.248097754Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 00:24:50.250374 env[1473]: time="2025-11-01T00:24:50.248140154Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 00:24:50.250374 env[1473]: time="2025-11-01T00:24:50.248149994Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 00:24:50.250374 env[1473]: time="2025-11-01T00:24:50.248299714Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0e09fd7fef065172776b89961b20634c4480e61ce307d32d6e9403167cbc0e14 pid=2935 runtime=io.containerd.runc.v2 Nov 1 00:24:50.258000 audit[2947]: NETFILTER_CFG table=filter:73 family=2 entries=42 op=nft_register_chain pid=2947 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 00:24:50.258000 audit[2947]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22552 a0=3 a1=ffffeb39f2d0 a2=0 a3=ffff8afc2fa8 items=0 ppid=2597 pid=2947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:50.258000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 00:24:50.270952 systemd[1]: Started cri-containerd-0e09fd7fef065172776b89961b20634c4480e61ce307d32d6e9403167cbc0e14.scope. Nov 1 00:24:50.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.280000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.280000 audit: BPF prog-id=105 op=LOAD Nov 1 00:24:50.281000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.281000 audit[2948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=2935 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:50.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065303966643766656630363531373237373662383939363162323036 Nov 1 00:24:50.281000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.281000 audit[2948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=2935 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:50.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065303966643766656630363531373237373662383939363162323036 Nov 1 00:24:50.281000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.281000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.281000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.281000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.281000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.281000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.281000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.281000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.281000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.281000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.281000 audit: BPF prog-id=106 op=LOAD Nov 1 00:24:50.281000 audit[2948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=2935 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:50.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065303966643766656630363531373237373662383939363162323036 Nov 1 00:24:50.282000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.282000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.282000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.282000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.282000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.282000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.282000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.282000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.282000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.282000 audit: BPF prog-id=107 op=LOAD Nov 1 00:24:50.282000 audit[2948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=2935 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:50.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065303966643766656630363531373237373662383939363162323036 Nov 1 00:24:50.283000 audit: BPF prog-id=107 op=UNLOAD Nov 1 00:24:50.283000 audit: BPF prog-id=106 op=UNLOAD Nov 1 00:24:50.283000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.283000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.283000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.283000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.283000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.283000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.283000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.283000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.283000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.283000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:50.283000 audit: BPF prog-id=108 op=LOAD Nov 1 00:24:50.283000 audit[2948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=2935 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:50.283000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065303966643766656630363531373237373662383939363162323036 Nov 1 00:24:50.296011 env[1473]: time="2025-11-01T00:24:50.295968111Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xmn5c,Uid:98274ee7-d1d6-4f2e-b0fd-446126b657a6,Namespace:calico-system,Attempt:1,} returns sandbox id \"0e09fd7fef065172776b89961b20634c4480e61ce307d32d6e9403167cbc0e14\"" Nov 1 00:24:50.428494 kubelet[1967]: E1101 00:24:50.428416 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:24:51.154280 systemd-networkd[1645]: cali8ea71959d34: Gained IPv6LL Nov 1 00:24:51.428793 kubelet[1967]: E1101 00:24:51.428686 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:24:52.115267 systemd-networkd[1645]: cali6c00c4e8561: Gained IPv6LL Nov 1 00:24:52.349702 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount805291272.mount: Deactivated successfully. Nov 1 00:24:52.429084 kubelet[1967]: E1101 00:24:52.428979 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:24:53.429899 kubelet[1967]: E1101 00:24:53.429832 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:24:53.599882 env[1473]: time="2025-11-01T00:24:53.599830054Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:24:53.606036 env[1473]: time="2025-11-01T00:24:53.605995099Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:93a0bb2334812af7cad47dff33d3bbc1ced8774dea82e727e7d8cb917ca9a024,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:24:53.610299 env[1473]: time="2025-11-01T00:24:53.610267862Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:24:53.614124 env[1473]: time="2025-11-01T00:24:53.614087225Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:0537df20ac7c5485a0f6b7bfb8e3fbbc8714fce070bab2a6344e5cadfba58d90,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:24:53.614922 env[1473]: time="2025-11-01T00:24:53.614891745Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:93a0bb2334812af7cad47dff33d3bbc1ced8774dea82e727e7d8cb917ca9a024\"" Nov 1 00:24:53.617294 env[1473]: time="2025-11-01T00:24:53.617269987Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Nov 1 00:24:53.618264 env[1473]: time="2025-11-01T00:24:53.618235948Z" level=info msg="CreateContainer within sandbox \"6f37617453eac8dbad24ef5fcf3e7694945fd0dfa8a75d066d6f7d28559478d8\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Nov 1 00:24:53.647654 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4169822069.mount: Deactivated successfully. Nov 1 00:24:53.665377 env[1473]: time="2025-11-01T00:24:53.665316062Z" level=info msg="CreateContainer within sandbox \"6f37617453eac8dbad24ef5fcf3e7694945fd0dfa8a75d066d6f7d28559478d8\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"98ec7fca409266944f171677abdeb4dc39626bc1467c2e965cd2c20e8f26fc0b\"" Nov 1 00:24:53.666316 env[1473]: time="2025-11-01T00:24:53.666290902Z" level=info msg="StartContainer for \"98ec7fca409266944f171677abdeb4dc39626bc1467c2e965cd2c20e8f26fc0b\"" Nov 1 00:24:53.684715 systemd[1]: Started cri-containerd-98ec7fca409266944f171677abdeb4dc39626bc1467c2e965cd2c20e8f26fc0b.scope. Nov 1 00:24:53.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:53.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:53.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:53.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:53.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:53.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:53.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:53.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:53.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:53.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:53.697000 audit: BPF prog-id=109 op=LOAD Nov 1 00:24:53.698000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:53.698000 audit[2983]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2883 pid=2983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:53.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938656337666361343039323636393434663137313637376162646562 Nov 1 00:24:53.698000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:53.698000 audit[2983]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2883 pid=2983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:53.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938656337666361343039323636393434663137313637376162646562 Nov 1 00:24:53.699000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:53.699000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:53.699000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:53.699000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:53.699000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:53.699000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:53.699000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:53.699000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:53.699000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:53.699000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:53.699000 audit: BPF prog-id=110 op=LOAD Nov 1 00:24:53.699000 audit[2983]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2883 pid=2983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:53.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938656337666361343039323636393434663137313637376162646562 Nov 1 00:24:53.700000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:53.700000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:53.700000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:53.700000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:53.700000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:53.700000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:53.700000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:53.700000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:53.700000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:53.700000 audit: BPF prog-id=111 op=LOAD Nov 1 00:24:53.700000 audit[2983]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2883 pid=2983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:53.700000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938656337666361343039323636393434663137313637376162646562 Nov 1 00:24:53.701000 audit: BPF prog-id=111 op=UNLOAD Nov 1 00:24:53.701000 audit: BPF prog-id=110 op=UNLOAD Nov 1 00:24:53.701000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:53.701000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:53.701000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:53.701000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:53.701000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:53.701000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:53.701000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:53.701000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:53.701000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:53.701000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:24:53.701000 audit: BPF prog-id=112 op=LOAD Nov 1 00:24:53.701000 audit[2983]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2883 pid=2983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:24:53.701000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938656337666361343039323636393434663137313637376162646562 Nov 1 00:24:53.723801 env[1473]: time="2025-11-01T00:24:53.723762144Z" level=info msg="StartContainer for \"98ec7fca409266944f171677abdeb4dc39626bc1467c2e965cd2c20e8f26fc0b\" returns successfully" Nov 1 00:24:53.750120 kubelet[1967]: I1101 00:24:53.750053 1967 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-7fcdb87857-t2l54" podStartSLOduration=16.267016683 podStartE2EDuration="19.750038523s" podCreationTimestamp="2025-11-01 00:24:34 +0000 UTC" firstStartedPulling="2025-11-01 00:24:50.133298306 +0000 UTC m=+37.098805610" lastFinishedPulling="2025-11-01 00:24:53.616320066 +0000 UTC m=+40.581827450" observedRunningTime="2025-11-01 00:24:53.749843043 +0000 UTC m=+40.715350307" watchObservedRunningTime="2025-11-01 00:24:53.750038523 +0000 UTC m=+40.715545827" Nov 1 00:24:53.864542 env[1473]: time="2025-11-01T00:24:53.864489805Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:24:53.868119 env[1473]: time="2025-11-01T00:24:53.868027488Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Nov 1 00:24:53.868369 kubelet[1967]: E1101 00:24:53.868327 1967 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Nov 1 00:24:53.868444 kubelet[1967]: E1101 00:24:53.868393 1967 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Nov 1 00:24:53.868604 kubelet[1967]: E1101 00:24:53.868554 1967 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-65pwb,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-xmn5c_calico-system(98274ee7-d1d6-4f2e-b0fd-446126b657a6): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Nov 1 00:24:53.870602 env[1473]: time="2025-11-01T00:24:53.870573930Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Nov 1 00:24:54.103871 env[1473]: time="2025-11-01T00:24:54.103812576Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:24:54.110425 env[1473]: time="2025-11-01T00:24:54.110375181Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Nov 1 00:24:54.110664 kubelet[1967]: E1101 00:24:54.110609 1967 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Nov 1 00:24:54.110733 kubelet[1967]: E1101 00:24:54.110676 1967 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Nov 1 00:24:54.110828 kubelet[1967]: E1101 00:24:54.110784 1967 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-65pwb,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-xmn5c_calico-system(98274ee7-d1d6-4f2e-b0fd-446126b657a6): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Nov 1 00:24:54.112183 kubelet[1967]: E1101 00:24:54.112151 1967 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-xmn5c" podUID="98274ee7-d1d6-4f2e-b0fd-446126b657a6" Nov 1 00:24:54.396869 kubelet[1967]: E1101 00:24:54.396743 1967 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:24:54.430202 kubelet[1967]: E1101 00:24:54.430170 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:24:54.736201 kubelet[1967]: E1101 00:24:54.736126 1967 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-xmn5c" podUID="98274ee7-d1d6-4f2e-b0fd-446126b657a6" Nov 1 00:24:55.431277 kubelet[1967]: E1101 00:24:55.431239 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:24:56.432282 kubelet[1967]: E1101 00:24:56.432241 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:24:57.433344 kubelet[1967]: E1101 00:24:57.433308 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:24:58.434074 kubelet[1967]: E1101 00:24:58.434027 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:24:59.435166 kubelet[1967]: E1101 00:24:59.435127 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:25:00.436254 kubelet[1967]: E1101 00:25:00.436210 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:25:01.436944 kubelet[1967]: E1101 00:25:01.436908 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:25:02.066000 audit[3042]: NETFILTER_CFG table=filter:74 family=2 entries=26 op=nft_register_rule pid=3042 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:25:02.072473 kernel: kauditd_printk_skb: 167 callbacks suppressed Nov 1 00:25:02.072551 kernel: audit: type=1325 audit(1761956702.066:711): table=filter:74 family=2 entries=26 op=nft_register_rule pid=3042 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:25:02.066000 audit[3042]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14176 a0=3 a1=ffffde039300 a2=0 a3=1 items=0 ppid=2174 pid=3042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:25:02.114192 kernel: audit: type=1300 audit(1761956702.066:711): arch=c00000b7 syscall=211 success=yes exit=14176 a0=3 a1=ffffde039300 a2=0 a3=1 items=0 ppid=2174 pid=3042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:25:02.114332 kernel: audit: type=1327 audit(1761956702.066:711): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:25:02.066000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:25:02.085000 audit[3042]: NETFILTER_CFG table=nat:75 family=2 entries=20 op=nft_register_rule pid=3042 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:25:02.142784 kernel: audit: type=1325 audit(1761956702.085:712): table=nat:75 family=2 entries=20 op=nft_register_rule pid=3042 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:25:02.142884 kernel: audit: type=1300 audit(1761956702.085:712): arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffde039300 a2=0 a3=1 items=0 ppid=2174 pid=3042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:25:02.085000 audit[3042]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffde039300 a2=0 a3=1 items=0 ppid=2174 pid=3042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:25:02.148844 systemd[1]: Created slice kubepods-besteffort-pod66b90122_f388_4d72_8c1d_583d9b8cb887.slice. Nov 1 00:25:02.085000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:25:02.184096 kernel: audit: type=1327 audit(1761956702.085:712): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:25:02.189000 audit[3044]: NETFILTER_CFG table=filter:76 family=2 entries=38 op=nft_register_rule pid=3044 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:25:02.189000 audit[3044]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14176 a0=3 a1=fffffb2928f0 a2=0 a3=1 items=0 ppid=2174 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:25:02.232182 kernel: audit: type=1325 audit(1761956702.189:713): table=filter:76 family=2 entries=38 op=nft_register_rule pid=3044 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:25:02.232326 kernel: audit: type=1300 audit(1761956702.189:713): arch=c00000b7 syscall=211 success=yes exit=14176 a0=3 a1=fffffb2928f0 a2=0 a3=1 items=0 ppid=2174 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:25:02.232357 kernel: audit: type=1327 audit(1761956702.189:713): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:25:02.189000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:25:02.232000 audit[3044]: NETFILTER_CFG table=nat:77 family=2 entries=20 op=nft_register_rule pid=3044 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:25:02.258605 kernel: audit: type=1325 audit(1761956702.232:714): table=nat:77 family=2 entries=20 op=nft_register_rule pid=3044 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:25:02.232000 audit[3044]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=fffffb2928f0 a2=0 a3=1 items=0 ppid=2174 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:25:02.232000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:25:02.292573 kubelet[1967]: I1101 00:25:02.292539 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/66b90122-f388-4d72-8c1d-583d9b8cb887-data\") pod \"nfs-server-provisioner-0\" (UID: \"66b90122-f388-4d72-8c1d-583d9b8cb887\") " pod="default/nfs-server-provisioner-0" Nov 1 00:25:02.292800 kubelet[1967]: I1101 00:25:02.292783 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7jqg4\" (UniqueName: \"kubernetes.io/projected/66b90122-f388-4d72-8c1d-583d9b8cb887-kube-api-access-7jqg4\") pod \"nfs-server-provisioner-0\" (UID: \"66b90122-f388-4d72-8c1d-583d9b8cb887\") " pod="default/nfs-server-provisioner-0" Nov 1 00:25:02.438073 kubelet[1967]: E1101 00:25:02.437974 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:25:02.452802 env[1473]: time="2025-11-01T00:25:02.452758445Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:66b90122-f388-4d72-8c1d-583d9b8cb887,Namespace:default,Attempt:0,}" Nov 1 00:25:02.617540 systemd-networkd[1645]: cali60e51b789ff: Link UP Nov 1 00:25:02.629514 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Nov 1 00:25:02.629656 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Nov 1 00:25:02.631403 systemd-networkd[1645]: cali60e51b789ff: Gained carrier Nov 1 00:25:02.673417 env[1473]: 2025-11-01 00:25:02.523 [INFO][3047] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.12-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 66b90122-f388-4d72-8c1d-583d9b8cb887 2090 0 2025-11-01 00:25:02 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.200.20.12 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="79bb093d122d34f2fe7a4efac5da89deb4706a84d2add001620320a8b1a9895e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.12-k8s-nfs--server--provisioner--0-" Nov 1 00:25:02.673417 env[1473]: 2025-11-01 00:25:02.523 [INFO][3047] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="79bb093d122d34f2fe7a4efac5da89deb4706a84d2add001620320a8b1a9895e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.12-k8s-nfs--server--provisioner--0-eth0" Nov 1 00:25:02.673417 env[1473]: 2025-11-01 00:25:02.548 [INFO][3060] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="79bb093d122d34f2fe7a4efac5da89deb4706a84d2add001620320a8b1a9895e" HandleID="k8s-pod-network.79bb093d122d34f2fe7a4efac5da89deb4706a84d2add001620320a8b1a9895e" Workload="10.200.20.12-k8s-nfs--server--provisioner--0-eth0" Nov 1 00:25:02.673417 env[1473]: 2025-11-01 00:25:02.548 [INFO][3060] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="79bb093d122d34f2fe7a4efac5da89deb4706a84d2add001620320a8b1a9895e" HandleID="k8s-pod-network.79bb093d122d34f2fe7a4efac5da89deb4706a84d2add001620320a8b1a9895e" Workload="10.200.20.12-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002c16e0), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.12", "pod":"nfs-server-provisioner-0", "timestamp":"2025-11-01 00:25:02.548677622 +0000 UTC"}, Hostname:"10.200.20.12", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Nov 1 00:25:02.673417 env[1473]: 2025-11-01 00:25:02.549 [INFO][3060] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:25:02.673417 env[1473]: 2025-11-01 00:25:02.549 [INFO][3060] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:25:02.673417 env[1473]: 2025-11-01 00:25:02.549 [INFO][3060] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.12' Nov 1 00:25:02.673417 env[1473]: 2025-11-01 00:25:02.560 [INFO][3060] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.79bb093d122d34f2fe7a4efac5da89deb4706a84d2add001620320a8b1a9895e" host="10.200.20.12" Nov 1 00:25:02.673417 env[1473]: 2025-11-01 00:25:02.564 [INFO][3060] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.20.12" Nov 1 00:25:02.673417 env[1473]: 2025-11-01 00:25:02.569 [INFO][3060] ipam/ipam.go 511: Trying affinity for 192.168.119.0/26 host="10.200.20.12" Nov 1 00:25:02.673417 env[1473]: 2025-11-01 00:25:02.570 [INFO][3060] ipam/ipam.go 158: Attempting to load block cidr=192.168.119.0/26 host="10.200.20.12" Nov 1 00:25:02.673417 env[1473]: 2025-11-01 00:25:02.572 [INFO][3060] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.119.0/26 host="10.200.20.12" Nov 1 00:25:02.673417 env[1473]: 2025-11-01 00:25:02.573 [INFO][3060] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.119.0/26 handle="k8s-pod-network.79bb093d122d34f2fe7a4efac5da89deb4706a84d2add001620320a8b1a9895e" host="10.200.20.12" Nov 1 00:25:02.673417 env[1473]: 2025-11-01 00:25:02.574 [INFO][3060] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.79bb093d122d34f2fe7a4efac5da89deb4706a84d2add001620320a8b1a9895e Nov 1 00:25:02.673417 env[1473]: 2025-11-01 00:25:02.583 [INFO][3060] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.119.0/26 handle="k8s-pod-network.79bb093d122d34f2fe7a4efac5da89deb4706a84d2add001620320a8b1a9895e" host="10.200.20.12" Nov 1 00:25:02.673417 env[1473]: 2025-11-01 00:25:02.610 [INFO][3060] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.119.3/26] block=192.168.119.0/26 handle="k8s-pod-network.79bb093d122d34f2fe7a4efac5da89deb4706a84d2add001620320a8b1a9895e" host="10.200.20.12" Nov 1 00:25:02.673417 env[1473]: 2025-11-01 00:25:02.610 [INFO][3060] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.119.3/26] handle="k8s-pod-network.79bb093d122d34f2fe7a4efac5da89deb4706a84d2add001620320a8b1a9895e" host="10.200.20.12" Nov 1 00:25:02.673417 env[1473]: 2025-11-01 00:25:02.610 [INFO][3060] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:25:02.673417 env[1473]: 2025-11-01 00:25:02.610 [INFO][3060] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.119.3/26] IPv6=[] ContainerID="79bb093d122d34f2fe7a4efac5da89deb4706a84d2add001620320a8b1a9895e" HandleID="k8s-pod-network.79bb093d122d34f2fe7a4efac5da89deb4706a84d2add001620320a8b1a9895e" Workload="10.200.20.12-k8s-nfs--server--provisioner--0-eth0" Nov 1 00:25:02.674109 env[1473]: 2025-11-01 00:25:02.612 [INFO][3047] cni-plugin/k8s.go 418: Populated endpoint ContainerID="79bb093d122d34f2fe7a4efac5da89deb4706a84d2add001620320a8b1a9895e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.12-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"66b90122-f388-4d72-8c1d-583d9b8cb887", ResourceVersion:"2090", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 25, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.12", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.119.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:25:02.674109 env[1473]: 2025-11-01 00:25:02.612 [INFO][3047] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.119.3/32] ContainerID="79bb093d122d34f2fe7a4efac5da89deb4706a84d2add001620320a8b1a9895e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.12-k8s-nfs--server--provisioner--0-eth0" Nov 1 00:25:02.674109 env[1473]: 2025-11-01 00:25:02.612 [INFO][3047] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="79bb093d122d34f2fe7a4efac5da89deb4706a84d2add001620320a8b1a9895e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.12-k8s-nfs--server--provisioner--0-eth0" Nov 1 00:25:02.674109 env[1473]: 2025-11-01 00:25:02.632 [INFO][3047] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="79bb093d122d34f2fe7a4efac5da89deb4706a84d2add001620320a8b1a9895e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.12-k8s-nfs--server--provisioner--0-eth0" Nov 1 00:25:02.674250 env[1473]: 2025-11-01 00:25:02.632 [INFO][3047] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="79bb093d122d34f2fe7a4efac5da89deb4706a84d2add001620320a8b1a9895e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.12-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"66b90122-f388-4d72-8c1d-583d9b8cb887", ResourceVersion:"2090", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 25, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.12", ContainerID:"79bb093d122d34f2fe7a4efac5da89deb4706a84d2add001620320a8b1a9895e", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.119.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"96:2c:e8:96:9a:39", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:25:02.674250 env[1473]: 2025-11-01 00:25:02.671 [INFO][3047] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="79bb093d122d34f2fe7a4efac5da89deb4706a84d2add001620320a8b1a9895e" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.12-k8s-nfs--server--provisioner--0-eth0" Nov 1 00:25:02.684853 env[1473]: time="2025-11-01T00:25:02.684782664Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 00:25:02.685023 env[1473]: time="2025-11-01T00:25:02.684999104Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 00:25:02.685134 env[1473]: time="2025-11-01T00:25:02.685111745Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 00:25:02.685487 env[1473]: time="2025-11-01T00:25:02.685438065Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/79bb093d122d34f2fe7a4efac5da89deb4706a84d2add001620320a8b1a9895e pid=3080 runtime=io.containerd.runc.v2 Nov 1 00:25:02.701817 systemd[1]: Started cri-containerd-79bb093d122d34f2fe7a4efac5da89deb4706a84d2add001620320a8b1a9895e.scope. Nov 1 00:25:02.717000 audit[3102]: NETFILTER_CFG table=filter:78 family=2 entries=46 op=nft_register_chain pid=3102 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 00:25:02.717000 audit[3102]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=23608 a0=3 a1=ffffe84a8ac0 a2=0 a3=ffff96daafa8 items=0 ppid=2597 pid=3102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:25:02.717000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 00:25:02.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:02.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:02.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:02.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:02.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:02.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:02.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:02.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:02.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:02.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:02.730000 audit: BPF prog-id=113 op=LOAD Nov 1 00:25:02.730000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:02.730000 audit[3090]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=3080 pid=3090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:25:02.730000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739626230393364313232643334663266653761346566616335646138 Nov 1 00:25:02.730000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:02.730000 audit[3090]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3080 pid=3090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:25:02.730000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739626230393364313232643334663266653761346566616335646138 Nov 1 00:25:02.730000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:02.730000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:02.730000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:02.730000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:02.730000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:02.730000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:02.730000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:02.730000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:02.730000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:02.730000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:02.730000 audit: BPF prog-id=114 op=LOAD Nov 1 00:25:02.730000 audit[3090]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3080 pid=3090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:25:02.730000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739626230393364313232643334663266653761346566616335646138 Nov 1 00:25:02.730000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:02.730000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:02.730000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:02.730000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:02.730000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:02.730000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:02.730000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:02.730000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:02.730000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:02.730000 audit: BPF prog-id=115 op=LOAD Nov 1 00:25:02.730000 audit[3090]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3080 pid=3090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:25:02.730000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739626230393364313232643334663266653761346566616335646138 Nov 1 00:25:02.730000 audit: BPF prog-id=115 op=UNLOAD Nov 1 00:25:02.730000 audit: BPF prog-id=114 op=UNLOAD Nov 1 00:25:02.731000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:02.731000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:02.731000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:02.731000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:02.731000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:02.731000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:02.731000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:02.731000 audit[3090]: AVC avc: denied { perfmon } for pid=3090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:02.731000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:02.731000 audit[3090]: AVC avc: denied { bpf } for pid=3090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:02.731000 audit: BPF prog-id=116 op=LOAD Nov 1 00:25:02.731000 audit[3090]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3080 pid=3090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:25:02.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739626230393364313232643334663266653761346566616335646138 Nov 1 00:25:02.751079 env[1473]: time="2025-11-01T00:25:02.751030264Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:66b90122-f388-4d72-8c1d-583d9b8cb887,Namespace:default,Attempt:0,} returns sandbox id \"79bb093d122d34f2fe7a4efac5da89deb4706a84d2add001620320a8b1a9895e\"" Nov 1 00:25:02.752780 env[1473]: time="2025-11-01T00:25:02.752752225Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Nov 1 00:25:03.405616 systemd[1]: run-containerd-runc-k8s.io-79bb093d122d34f2fe7a4efac5da89deb4706a84d2add001620320a8b1a9895e-runc.z5UhiK.mount: Deactivated successfully. Nov 1 00:25:03.439200 kubelet[1967]: E1101 00:25:03.439145 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:25:04.337984 systemd-networkd[1645]: cali60e51b789ff: Gained IPv6LL Nov 1 00:25:04.439522 kubelet[1967]: E1101 00:25:04.439477 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:25:05.410148 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount191051887.mount: Deactivated successfully. Nov 1 00:25:05.440567 kubelet[1967]: E1101 00:25:05.440526 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:25:06.441599 kubelet[1967]: E1101 00:25:06.441551 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:25:07.441887 kubelet[1967]: E1101 00:25:07.441833 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:25:07.442453 env[1473]: time="2025-11-01T00:25:07.442418277Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:25:07.451240 env[1473]: time="2025-11-01T00:25:07.451208042Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:25:07.456283 env[1473]: time="2025-11-01T00:25:07.456243605Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:25:07.460411 env[1473]: time="2025-11-01T00:25:07.460384767Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:25:07.461071 env[1473]: time="2025-11-01T00:25:07.461038807Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\"" Nov 1 00:25:07.463943 env[1473]: time="2025-11-01T00:25:07.463912369Z" level=info msg="CreateContainer within sandbox \"79bb093d122d34f2fe7a4efac5da89deb4706a84d2add001620320a8b1a9895e\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Nov 1 00:25:07.490326 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1517115581.mount: Deactivated successfully. Nov 1 00:25:07.497129 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3038065458.mount: Deactivated successfully. Nov 1 00:25:07.514811 env[1473]: time="2025-11-01T00:25:07.514750157Z" level=info msg="CreateContainer within sandbox \"79bb093d122d34f2fe7a4efac5da89deb4706a84d2add001620320a8b1a9895e\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"770aa73ee1d3712caa52f52bb3339b465c187bfff763c8c518786101e40cbfa0\"" Nov 1 00:25:07.515532 env[1473]: time="2025-11-01T00:25:07.515503557Z" level=info msg="StartContainer for \"770aa73ee1d3712caa52f52bb3339b465c187bfff763c8c518786101e40cbfa0\"" Nov 1 00:25:07.533442 systemd[1]: Started cri-containerd-770aa73ee1d3712caa52f52bb3339b465c187bfff763c8c518786101e40cbfa0.scope. Nov 1 00:25:07.550668 kernel: kauditd_printk_skb: 62 callbacks suppressed Nov 1 00:25:07.550781 kernel: audit: type=1400 audit(1761956707.544:734): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:07.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:07.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:07.584721 kernel: audit: type=1400 audit(1761956707.544:735): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:07.584820 kernel: audit: type=1400 audit(1761956707.544:736): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:07.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:07.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:07.619604 kernel: audit: type=1400 audit(1761956707.544:737): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:07.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:07.637634 kernel: audit: type=1400 audit(1761956707.544:738): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:07.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:07.640905 env[1473]: time="2025-11-01T00:25:07.640874506Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Nov 1 00:25:07.656042 kernel: audit: type=1400 audit(1761956707.544:739): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:07.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:07.675040 kernel: audit: type=1400 audit(1761956707.544:740): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:07.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:07.694797 kernel: audit: type=1400 audit(1761956707.544:741): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:07.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:07.712568 kernel: audit: type=1400 audit(1761956707.544:742): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:07.730433 kernel: audit: type=1400 audit(1761956707.549:743): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:07.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:07.549000 audit: BPF prog-id=117 op=LOAD Nov 1 00:25:07.566000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:07.566000 audit[3124]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3080 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:25:07.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737306161373365653164333731326361613532663532626233333339 Nov 1 00:25:07.566000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:07.566000 audit[3124]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3080 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:25:07.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737306161373365653164333731326361613532663532626233333339 Nov 1 00:25:07.566000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:07.566000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:07.566000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:07.566000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:07.566000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:07.566000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:07.566000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:07.566000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:07.566000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:07.566000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:07.566000 audit: BPF prog-id=118 op=LOAD Nov 1 00:25:07.566000 audit[3124]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3080 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:25:07.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737306161373365653164333731326361613532663532626233333339 Nov 1 00:25:07.566000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:07.566000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:07.566000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:07.566000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:07.566000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:07.566000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:07.566000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:07.566000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:07.566000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:07.566000 audit: BPF prog-id=119 op=LOAD Nov 1 00:25:07.566000 audit[3124]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3080 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:25:07.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737306161373365653164333731326361613532663532626233333339 Nov 1 00:25:07.566000 audit: BPF prog-id=119 op=UNLOAD Nov 1 00:25:07.566000 audit: BPF prog-id=118 op=UNLOAD Nov 1 00:25:07.566000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:07.566000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:07.566000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:07.566000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:07.566000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:07.566000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:07.566000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:07.566000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:07.566000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:07.566000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:07.566000 audit: BPF prog-id=120 op=LOAD Nov 1 00:25:07.566000 audit[3124]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3080 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:25:07.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737306161373365653164333731326361613532663532626233333339 Nov 1 00:25:07.731000 audit[3155]: AVC avc: denied { search } for pid=3155 comm="rpcbind" name="crypto" dev="proc" ino=20888 scontext=system_u:system_r:svirt_lxc_net_t:s0:c686,c968 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Nov 1 00:25:07.731000 audit[3155]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff9251f000 a2=0 a3=0 items=0 ppid=3135 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c686,c968 key=(null) Nov 1 00:25:07.731000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Nov 1 00:25:07.732549 env[1473]: time="2025-11-01T00:25:07.732495236Z" level=info msg="StartContainer for \"770aa73ee1d3712caa52f52bb3339b465c187bfff763c8c518786101e40cbfa0\" returns successfully" Nov 1 00:25:07.773326 kubelet[1967]: I1101 00:25:07.772982 1967 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.062994796 podStartE2EDuration="5.772961859s" podCreationTimestamp="2025-11-01 00:25:02 +0000 UTC" firstStartedPulling="2025-11-01 00:25:02.752416425 +0000 UTC m=+49.717923689" lastFinishedPulling="2025-11-01 00:25:07.462383448 +0000 UTC m=+54.427890752" observedRunningTime="2025-11-01 00:25:07.772863979 +0000 UTC m=+54.738371283" watchObservedRunningTime="2025-11-01 00:25:07.772961859 +0000 UTC m=+54.738469163" Nov 1 00:25:07.777000 audit[3161]: AVC avc: denied { search } for pid=3161 comm="dbus-daemon" name="crypto" dev="proc" ino=20888 scontext=system_u:system_r:svirt_lxc_net_t:s0:c686,c968 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Nov 1 00:25:07.777000 audit[3161]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffb6aff000 a2=0 a3=0 items=0 ppid=3135 pid=3161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c686,c968 key=(null) Nov 1 00:25:07.777000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Nov 1 00:25:07.780000 audit[3162]: AVC avc: denied { watch } for pid=3162 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537377 scontext=system_u:system_r:svirt_lxc_net_t:s0:c686,c968 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c686,c968 tclass=dir permissive=0 Nov 1 00:25:07.780000 audit[3162]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaab07f4bfb0 a2=2c8 a3=aaab07f31a60 items=0 ppid=3135 pid=3162 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c686,c968 key=(null) Nov 1 00:25:07.780000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Nov 1 00:25:07.785000 audit[3163]: AVC avc: denied { read } for pid=3163 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=20988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c686,c968 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Nov 1 00:25:07.785000 audit[3163]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffff9c a1=ffff8c48a570 a2=80000 a3=0 items=0 ppid=3135 pid=3163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c686,c968 key=(null) Nov 1 00:25:07.785000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Nov 1 00:25:07.785000 audit[3163]: AVC avc: denied { search } for pid=3163 comm="ganesha.nfsd" name="crypto" dev="proc" ino=20888 scontext=system_u:system_r:svirt_lxc_net_t:s0:c686,c968 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Nov 1 00:25:07.785000 audit[3163]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff8b81f000 a2=0 a3=0 items=0 ppid=3135 pid=3163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c686,c968 key=(null) Nov 1 00:25:07.785000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Nov 1 00:25:07.794000 audit[3168]: NETFILTER_CFG table=filter:79 family=2 entries=26 op=nft_register_rule pid=3168 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:25:07.794000 audit[3168]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffe3933670 a2=0 a3=1 items=0 ppid=2174 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:25:07.794000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:25:07.801000 audit[3168]: NETFILTER_CFG table=nat:80 family=2 entries=104 op=nft_register_chain pid=3168 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:25:07.801000 audit[3168]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=48684 a0=3 a1=ffffe3933670 a2=0 a3=1 items=0 ppid=2174 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:25:07.801000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:25:07.891878 env[1473]: time="2025-11-01T00:25:07.891820364Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:25:07.895820 env[1473]: time="2025-11-01T00:25:07.895762046Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Nov 1 00:25:07.896006 kubelet[1967]: E1101 00:25:07.895968 1967 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Nov 1 00:25:07.896088 kubelet[1967]: E1101 00:25:07.896018 1967 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Nov 1 00:25:07.896178 kubelet[1967]: E1101 00:25:07.896127 1967 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-65pwb,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-xmn5c_calico-system(98274ee7-d1d6-4f2e-b0fd-446126b657a6): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Nov 1 00:25:07.898260 env[1473]: time="2025-11-01T00:25:07.898232087Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Nov 1 00:25:08.149800 env[1473]: time="2025-11-01T00:25:08.149746904Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:25:08.154570 env[1473]: time="2025-11-01T00:25:08.154495707Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Nov 1 00:25:08.154963 kubelet[1967]: E1101 00:25:08.154920 1967 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Nov 1 00:25:08.155051 kubelet[1967]: E1101 00:25:08.154972 1967 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Nov 1 00:25:08.155143 kubelet[1967]: E1101 00:25:08.155100 1967 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-65pwb,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-xmn5c_calico-system(98274ee7-d1d6-4f2e-b0fd-446126b657a6): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Nov 1 00:25:08.156443 kubelet[1967]: E1101 00:25:08.156388 1967 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-xmn5c" podUID="98274ee7-d1d6-4f2e-b0fd-446126b657a6" Nov 1 00:25:08.442788 kubelet[1967]: E1101 00:25:08.442686 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:25:09.443045 kubelet[1967]: E1101 00:25:09.443001 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:25:09.725139 systemd[1]: run-containerd-runc-k8s.io-d510be3f3380a4b9f6eb328472b717a676effc37ae9b82968691560a514a4f5b-runc.AtPenW.mount: Deactivated successfully. Nov 1 00:25:10.443549 kubelet[1967]: E1101 00:25:10.443513 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:25:11.444868 kubelet[1967]: E1101 00:25:11.444835 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:25:12.445822 kubelet[1967]: E1101 00:25:12.445774 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:25:13.446578 kubelet[1967]: E1101 00:25:13.446539 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:25:14.396050 kubelet[1967]: E1101 00:25:14.396007 1967 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:25:14.440082 env[1473]: time="2025-11-01T00:25:14.440032903Z" level=info msg="StopPodSandbox for \"b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef\"" Nov 1 00:25:14.447605 kubelet[1967]: E1101 00:25:14.447563 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:25:14.515857 env[1473]: 2025-11-01 00:25:14.479 [WARNING][3198] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12-k8s-nginx--deployment--7fcdb87857--t2l54-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"01a4fea2-ddc5-4cff-9fb7-c0578bdda197", ResourceVersion:"2038", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 24, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.12", ContainerID:"6f37617453eac8dbad24ef5fcf3e7694945fd0dfa8a75d066d6f7d28559478d8", Pod:"nginx-deployment-7fcdb87857-t2l54", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.119.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali8ea71959d34", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:25:14.515857 env[1473]: 2025-11-01 00:25:14.479 [INFO][3198] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef" Nov 1 00:25:14.515857 env[1473]: 2025-11-01 00:25:14.479 [INFO][3198] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef" iface="eth0" netns="" Nov 1 00:25:14.515857 env[1473]: 2025-11-01 00:25:14.479 [INFO][3198] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef" Nov 1 00:25:14.515857 env[1473]: 2025-11-01 00:25:14.479 [INFO][3198] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef" Nov 1 00:25:14.515857 env[1473]: 2025-11-01 00:25:14.499 [INFO][3205] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef" HandleID="k8s-pod-network.b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef" Workload="10.200.20.12-k8s-nginx--deployment--7fcdb87857--t2l54-eth0" Nov 1 00:25:14.515857 env[1473]: 2025-11-01 00:25:14.499 [INFO][3205] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:25:14.515857 env[1473]: 2025-11-01 00:25:14.499 [INFO][3205] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:25:14.515857 env[1473]: 2025-11-01 00:25:14.511 [WARNING][3205] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef" HandleID="k8s-pod-network.b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef" Workload="10.200.20.12-k8s-nginx--deployment--7fcdb87857--t2l54-eth0" Nov 1 00:25:14.515857 env[1473]: 2025-11-01 00:25:14.511 [INFO][3205] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef" HandleID="k8s-pod-network.b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef" Workload="10.200.20.12-k8s-nginx--deployment--7fcdb87857--t2l54-eth0" Nov 1 00:25:14.515857 env[1473]: 2025-11-01 00:25:14.513 [INFO][3205] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:25:14.515857 env[1473]: 2025-11-01 00:25:14.514 [INFO][3198] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef" Nov 1 00:25:14.516499 env[1473]: time="2025-11-01T00:25:14.516463020Z" level=info msg="TearDown network for sandbox \"b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef\" successfully" Nov 1 00:25:14.516569 env[1473]: time="2025-11-01T00:25:14.516551660Z" level=info msg="StopPodSandbox for \"b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef\" returns successfully" Nov 1 00:25:14.517391 env[1473]: time="2025-11-01T00:25:14.517335141Z" level=info msg="RemovePodSandbox for \"b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef\"" Nov 1 00:25:14.517573 env[1473]: time="2025-11-01T00:25:14.517516661Z" level=info msg="Forcibly stopping sandbox \"b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef\"" Nov 1 00:25:14.595421 env[1473]: 2025-11-01 00:25:14.561 [WARNING][3221] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12-k8s-nginx--deployment--7fcdb87857--t2l54-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"01a4fea2-ddc5-4cff-9fb7-c0578bdda197", ResourceVersion:"2038", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 24, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.12", ContainerID:"6f37617453eac8dbad24ef5fcf3e7694945fd0dfa8a75d066d6f7d28559478d8", Pod:"nginx-deployment-7fcdb87857-t2l54", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.119.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali8ea71959d34", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:25:14.595421 env[1473]: 2025-11-01 00:25:14.561 [INFO][3221] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef" Nov 1 00:25:14.595421 env[1473]: 2025-11-01 00:25:14.561 [INFO][3221] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef" iface="eth0" netns="" Nov 1 00:25:14.595421 env[1473]: 2025-11-01 00:25:14.561 [INFO][3221] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef" Nov 1 00:25:14.595421 env[1473]: 2025-11-01 00:25:14.561 [INFO][3221] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef" Nov 1 00:25:14.595421 env[1473]: 2025-11-01 00:25:14.579 [INFO][3228] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef" HandleID="k8s-pod-network.b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef" Workload="10.200.20.12-k8s-nginx--deployment--7fcdb87857--t2l54-eth0" Nov 1 00:25:14.595421 env[1473]: 2025-11-01 00:25:14.579 [INFO][3228] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:25:14.595421 env[1473]: 2025-11-01 00:25:14.579 [INFO][3228] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:25:14.595421 env[1473]: 2025-11-01 00:25:14.591 [WARNING][3228] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef" HandleID="k8s-pod-network.b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef" Workload="10.200.20.12-k8s-nginx--deployment--7fcdb87857--t2l54-eth0" Nov 1 00:25:14.595421 env[1473]: 2025-11-01 00:25:14.591 [INFO][3228] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef" HandleID="k8s-pod-network.b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef" Workload="10.200.20.12-k8s-nginx--deployment--7fcdb87857--t2l54-eth0" Nov 1 00:25:14.595421 env[1473]: 2025-11-01 00:25:14.593 [INFO][3228] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:25:14.595421 env[1473]: 2025-11-01 00:25:14.594 [INFO][3221] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef" Nov 1 00:25:14.595995 env[1473]: time="2025-11-01T00:25:14.595950539Z" level=info msg="TearDown network for sandbox \"b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef\" successfully" Nov 1 00:25:14.603607 env[1473]: time="2025-11-01T00:25:14.603562743Z" level=info msg="RemovePodSandbox \"b8b0ffe96541eb427f7e9dae6853856338bfbbf66e922057ba862424f9146cef\" returns successfully" Nov 1 00:25:14.604411 env[1473]: time="2025-11-01T00:25:14.604373983Z" level=info msg="StopPodSandbox for \"15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd\"" Nov 1 00:25:14.678492 env[1473]: 2025-11-01 00:25:14.644 [WARNING][3242] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12-k8s-csi--node--driver--xmn5c-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"98274ee7-d1d6-4f2e-b0fd-446126b657a6", ResourceVersion:"2118", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 24, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.12", ContainerID:"0e09fd7fef065172776b89961b20634c4480e61ce307d32d6e9403167cbc0e14", Pod:"csi-node-driver-xmn5c", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.119.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali6c00c4e8561", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:25:14.678492 env[1473]: 2025-11-01 00:25:14.644 [INFO][3242] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd" Nov 1 00:25:14.678492 env[1473]: 2025-11-01 00:25:14.644 [INFO][3242] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd" iface="eth0" netns="" Nov 1 00:25:14.678492 env[1473]: 2025-11-01 00:25:14.644 [INFO][3242] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd" Nov 1 00:25:14.678492 env[1473]: 2025-11-01 00:25:14.644 [INFO][3242] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd" Nov 1 00:25:14.678492 env[1473]: 2025-11-01 00:25:14.662 [INFO][3251] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd" HandleID="k8s-pod-network.15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd" Workload="10.200.20.12-k8s-csi--node--driver--xmn5c-eth0" Nov 1 00:25:14.678492 env[1473]: 2025-11-01 00:25:14.663 [INFO][3251] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:25:14.678492 env[1473]: 2025-11-01 00:25:14.663 [INFO][3251] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:25:14.678492 env[1473]: 2025-11-01 00:25:14.673 [WARNING][3251] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd" HandleID="k8s-pod-network.15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd" Workload="10.200.20.12-k8s-csi--node--driver--xmn5c-eth0" Nov 1 00:25:14.678492 env[1473]: 2025-11-01 00:25:14.673 [INFO][3251] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd" HandleID="k8s-pod-network.15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd" Workload="10.200.20.12-k8s-csi--node--driver--xmn5c-eth0" Nov 1 00:25:14.678492 env[1473]: 2025-11-01 00:25:14.674 [INFO][3251] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:25:14.678492 env[1473]: 2025-11-01 00:25:14.675 [INFO][3242] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd" Nov 1 00:25:14.678492 env[1473]: time="2025-11-01T00:25:14.677219939Z" level=info msg="TearDown network for sandbox \"15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd\" successfully" Nov 1 00:25:14.678492 env[1473]: time="2025-11-01T00:25:14.677251019Z" level=info msg="StopPodSandbox for \"15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd\" returns successfully" Nov 1 00:25:14.679754 env[1473]: time="2025-11-01T00:25:14.679729180Z" level=info msg="RemovePodSandbox for \"15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd\"" Nov 1 00:25:14.679895 env[1473]: time="2025-11-01T00:25:14.679858500Z" level=info msg="Forcibly stopping sandbox \"15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd\"" Nov 1 00:25:14.746946 env[1473]: 2025-11-01 00:25:14.713 [WARNING][3265] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12-k8s-csi--node--driver--xmn5c-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"98274ee7-d1d6-4f2e-b0fd-446126b657a6", ResourceVersion:"2118", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 24, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.12", ContainerID:"0e09fd7fef065172776b89961b20634c4480e61ce307d32d6e9403167cbc0e14", Pod:"csi-node-driver-xmn5c", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.119.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali6c00c4e8561", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:25:14.746946 env[1473]: 2025-11-01 00:25:14.714 [INFO][3265] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd" Nov 1 00:25:14.746946 env[1473]: 2025-11-01 00:25:14.714 [INFO][3265] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd" iface="eth0" netns="" Nov 1 00:25:14.746946 env[1473]: 2025-11-01 00:25:14.714 [INFO][3265] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd" Nov 1 00:25:14.746946 env[1473]: 2025-11-01 00:25:14.714 [INFO][3265] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd" Nov 1 00:25:14.746946 env[1473]: 2025-11-01 00:25:14.732 [INFO][3272] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd" HandleID="k8s-pod-network.15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd" Workload="10.200.20.12-k8s-csi--node--driver--xmn5c-eth0" Nov 1 00:25:14.746946 env[1473]: 2025-11-01 00:25:14.732 [INFO][3272] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:25:14.746946 env[1473]: 2025-11-01 00:25:14.732 [INFO][3272] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:25:14.746946 env[1473]: 2025-11-01 00:25:14.742 [WARNING][3272] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd" HandleID="k8s-pod-network.15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd" Workload="10.200.20.12-k8s-csi--node--driver--xmn5c-eth0" Nov 1 00:25:14.746946 env[1473]: 2025-11-01 00:25:14.742 [INFO][3272] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd" HandleID="k8s-pod-network.15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd" Workload="10.200.20.12-k8s-csi--node--driver--xmn5c-eth0" Nov 1 00:25:14.746946 env[1473]: 2025-11-01 00:25:14.744 [INFO][3272] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:25:14.746946 env[1473]: 2025-11-01 00:25:14.745 [INFO][3265] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd" Nov 1 00:25:14.747500 env[1473]: time="2025-11-01T00:25:14.746982093Z" level=info msg="TearDown network for sandbox \"15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd\" successfully" Nov 1 00:25:14.755850 env[1473]: time="2025-11-01T00:25:14.755809657Z" level=info msg="RemovePodSandbox \"15f7186d98cbf7cfd0104ba5f42412300f96e850c1033769500fe7a362a357fd\" returns successfully" Nov 1 00:25:15.448515 kubelet[1967]: E1101 00:25:15.448483 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:25:16.449268 kubelet[1967]: E1101 00:25:16.449234 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:25:17.450746 kubelet[1967]: E1101 00:25:17.450704 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:25:18.451327 kubelet[1967]: E1101 00:25:18.451287 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:25:19.452006 kubelet[1967]: E1101 00:25:19.451971 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:25:20.453440 kubelet[1967]: E1101 00:25:20.453403 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:25:21.453583 kubelet[1967]: E1101 00:25:21.453540 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:25:21.639077 kubelet[1967]: E1101 00:25:21.639016 1967 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-xmn5c" podUID="98274ee7-d1d6-4f2e-b0fd-446126b657a6" Nov 1 00:25:22.454114 kubelet[1967]: E1101 00:25:22.454074 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:25:23.454737 kubelet[1967]: E1101 00:25:23.454696 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:25:24.455154 kubelet[1967]: E1101 00:25:24.455119 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:25:25.456426 kubelet[1967]: E1101 00:25:25.456389 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:25:26.457290 kubelet[1967]: E1101 00:25:26.457250 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:25:27.458547 kubelet[1967]: E1101 00:25:27.458512 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:25:28.459846 kubelet[1967]: E1101 00:25:28.459800 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:25:29.461108 kubelet[1967]: E1101 00:25:29.461070 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:25:30.461422 kubelet[1967]: E1101 00:25:30.461378 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:25:31.462063 kubelet[1967]: E1101 00:25:31.462023 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:25:32.462713 kubelet[1967]: E1101 00:25:32.462671 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:25:32.662330 systemd[1]: Created slice kubepods-besteffort-pod70e293da_221e_4898_b30a_7a4d6d88d9c1.slice. Nov 1 00:25:32.755169 kubelet[1967]: I1101 00:25:32.755060 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-326a1fca-3c97-45d4-9256-d1b6a0ef906c\" (UniqueName: \"kubernetes.io/nfs/70e293da-221e-4898-b30a-7a4d6d88d9c1-pvc-326a1fca-3c97-45d4-9256-d1b6a0ef906c\") pod \"test-pod-1\" (UID: \"70e293da-221e-4898-b30a-7a4d6d88d9c1\") " pod="default/test-pod-1" Nov 1 00:25:32.755297 kubelet[1967]: I1101 00:25:32.755246 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lll9h\" (UniqueName: \"kubernetes.io/projected/70e293da-221e-4898-b30a-7a4d6d88d9c1-kube-api-access-lll9h\") pod \"test-pod-1\" (UID: \"70e293da-221e-4898-b30a-7a4d6d88d9c1\") " pod="default/test-pod-1" Nov 1 00:25:33.353552 kernel: kauditd_printk_skb: 68 callbacks suppressed Nov 1 00:25:33.353781 kernel: audit: type=1400 audit(1761956733.346:759): avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.353828 kernel: Failed to create system directory netfs Nov 1 00:25:33.346000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.346000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.404103 kernel: Failed to create system directory netfs Nov 1 00:25:33.404216 kernel: audit: type=1400 audit(1761956733.346:759): avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.404246 kernel: Failed to create system directory netfs Nov 1 00:25:33.346000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.429175 kernel: audit: type=1400 audit(1761956733.346:759): avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.429276 kernel: Failed to create system directory netfs Nov 1 00:25:33.346000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.434531 kernel: audit: type=1400 audit(1761956733.346:759): avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.346000 audit[3306]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaedfb75e0 a1=12c14 a2=aaaac1a4e028 a3=aaaaedfa8010 items=0 ppid=70 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:25:33.480699 kernel: audit: type=1300 audit(1761956733.346:759): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaedfb75e0 a1=12c14 a2=aaaac1a4e028 a3=aaaaedfa8010 items=0 ppid=70 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:25:33.480942 kubelet[1967]: E1101 00:25:33.480914 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:25:33.346000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Nov 1 00:25:33.492650 kernel: audit: type=1327 audit(1761956733.346:759): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Nov 1 00:25:33.528000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.560522 kernel: Failed to create system directory fscache Nov 1 00:25:33.560608 kernel: audit: type=1400 audit(1761956733.528:760): avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.560657 kernel: Failed to create system directory fscache Nov 1 00:25:33.560681 kernel: audit: type=1400 audit(1761956733.528:760): avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.528000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.581049 kernel: Failed to create system directory fscache Nov 1 00:25:33.528000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.606038 kernel: audit: type=1400 audit(1761956733.528:760): avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.606156 kernel: Failed to create system directory fscache Nov 1 00:25:33.528000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.630072 kernel: audit: type=1400 audit(1761956733.528:760): avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.630172 kernel: Failed to create system directory fscache Nov 1 00:25:33.528000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.528000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.640307 kernel: Failed to create system directory fscache Nov 1 00:25:33.640412 kernel: Failed to create system directory fscache Nov 1 00:25:33.528000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.528000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.649772 kernel: Failed to create system directory fscache Nov 1 00:25:33.649843 kernel: Failed to create system directory fscache Nov 1 00:25:33.528000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.528000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.659665 kernel: Failed to create system directory fscache Nov 1 00:25:33.659727 kernel: Failed to create system directory fscache Nov 1 00:25:33.528000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.528000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.669235 kernel: Failed to create system directory fscache Nov 1 00:25:33.669298 kernel: Failed to create system directory fscache Nov 1 00:25:33.528000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.528000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.678672 kernel: Failed to create system directory fscache Nov 1 00:25:33.681790 kernel: FS-Cache: Loaded Nov 1 00:25:33.528000 audit[3306]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaee1ca210 a1=4c344 a2=aaaac1a4e028 a3=aaaaedfa8010 items=0 ppid=70 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:25:33.528000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.872685 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.872767 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.872791 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.882015 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.882088 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.890800 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.890860 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.899514 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.899571 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.908127 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.912381 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.912435 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.921253 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.921293 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.929763 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.929816 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.938117 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.938176 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.946297 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.946352 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.954391 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.954445 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.962567 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.962687 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.970926 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.975045 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.975103 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.983086 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.983146 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.991058 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.991118 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.998979 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.999034 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.007495 kernel: Failed to create system directory sunrpc Nov 1 00:25:34.007591 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.015333 kernel: Failed to create system directory sunrpc Nov 1 00:25:34.015390 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.022987 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.027177 kernel: Failed to create system directory sunrpc Nov 1 00:25:34.027232 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.035217 kernel: Failed to create system directory sunrpc Nov 1 00:25:34.035300 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.042651 kernel: Failed to create system directory sunrpc Nov 1 00:25:34.042698 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.050334 kernel: Failed to create system directory sunrpc Nov 1 00:25:34.050396 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.057904 kernel: Failed to create system directory sunrpc Nov 1 00:25:34.057982 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.066188 kernel: Failed to create system directory sunrpc Nov 1 00:25:34.066248 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.073912 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.078116 kernel: Failed to create system directory sunrpc Nov 1 00:25:34.078155 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.085896 kernel: Failed to create system directory sunrpc Nov 1 00:25:34.085964 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.093766 kernel: Failed to create system directory sunrpc Nov 1 00:25:34.093839 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.102160 kernel: Failed to create system directory sunrpc Nov 1 00:25:34.102222 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.110179 kernel: Failed to create system directory sunrpc Nov 1 00:25:34.110256 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.117566 kernel: Failed to create system directory sunrpc Nov 1 00:25:34.117632 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.125102 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.129660 kernel: Failed to create system directory sunrpc Nov 1 00:25:34.129727 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.137413 kernel: Failed to create system directory sunrpc Nov 1 00:25:34.137520 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.145186 kernel: Failed to create system directory sunrpc Nov 1 00:25:34.145244 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.152747 kernel: Failed to create system directory sunrpc Nov 1 00:25:34.152805 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.160973 kernel: Failed to create system directory sunrpc Nov 1 00:25:34.161041 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.168595 kernel: Failed to create system directory sunrpc Nov 1 00:25:34.168664 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.176202 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.180414 kernel: Failed to create system directory sunrpc Nov 1 00:25:34.180473 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.187864 kernel: Failed to create system directory sunrpc Nov 1 00:25:34.187944 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.195795 kernel: Failed to create system directory sunrpc Nov 1 00:25:34.195856 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.203279 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.210300 kernel: Failed to create system directory sunrpc Nov 1 00:25:34.210426 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.217775 kernel: Failed to create system directory sunrpc Nov 1 00:25:34.217863 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.225201 kernel: Failed to create system directory sunrpc Nov 1 00:25:34.225308 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.233028 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.236864 kernel: Failed to create system directory sunrpc Nov 1 00:25:34.236960 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.244751 kernel: Failed to create system directory sunrpc Nov 1 00:25:34.244883 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.252598 kernel: Failed to create system directory sunrpc Nov 1 00:25:34.252687 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.260514 kernel: Failed to create system directory sunrpc Nov 1 00:25:34.260578 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.268107 kernel: Failed to create system directory sunrpc Nov 1 00:25:34.268164 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.275947 kernel: Failed to create system directory sunrpc Nov 1 00:25:34.276021 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.283794 kernel: Failed to create system directory sunrpc Nov 1 00:25:34.283897 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.291483 kernel: Failed to create system directory sunrpc Nov 1 00:25:34.291548 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.299265 kernel: Failed to create system directory sunrpc Nov 1 00:25:34.299338 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.307588 kernel: Failed to create system directory sunrpc Nov 1 00:25:34.307667 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.315198 kernel: Failed to create system directory sunrpc Nov 1 00:25:34.315261 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.322697 kernel: Failed to create system directory sunrpc Nov 1 00:25:34.322746 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.330482 kernel: Failed to create system directory sunrpc Nov 1 00:25:34.330528 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.338675 kernel: Failed to create system directory sunrpc Nov 1 00:25:34.338730 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.346044 kernel: Failed to create system directory sunrpc Nov 1 00:25:34.346105 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.353779 kernel: Failed to create system directory sunrpc Nov 1 00:25:34.353854 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.361340 kernel: Failed to create system directory sunrpc Nov 1 00:25:34.361424 kernel: Failed to create system directory sunrpc Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:33.858000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.369057 kernel: Failed to create system directory sunrpc Nov 1 00:25:34.382167 kernel: RPC: Registered named UNIX socket transport module. Nov 1 00:25:34.382263 kernel: RPC: Registered udp transport module. Nov 1 00:25:34.382287 kernel: RPC: Registered tcp transport module. Nov 1 00:25:34.391668 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Nov 1 00:25:33.858000 audit[3306]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaee216560 a1=14a804 a2=aaaac1a4e028 a3=aaaaedfa8010 items=6 ppid=70 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:25:33.858000 audit: CWD cwd="/" Nov 1 00:25:33.858000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:25:33.858000 audit: PATH item=1 name=(null) inode=21587 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:25:33.858000 audit: PATH item=2 name=(null) inode=21587 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:25:33.858000 audit: PATH item=3 name=(null) inode=21588 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:25:33.858000 audit: PATH item=4 name=(null) inode=21587 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:25:33.858000 audit: PATH item=5 name=(null) inode=21589 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:25:33.858000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Nov 1 00:25:34.396406 kubelet[1967]: E1101 00:25:34.396376 1967 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:25:34.482176 kubelet[1967]: E1101 00:25:34.482138 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.794681 kernel: Failed to create system directory nfs Nov 1 00:25:34.794771 kernel: Failed to create system directory nfs Nov 1 00:25:34.794798 kernel: Failed to create system directory nfs Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.802338 kernel: Failed to create system directory nfs Nov 1 00:25:34.802400 kernel: Failed to create system directory nfs Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.810632 kernel: Failed to create system directory nfs Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.814770 kernel: Failed to create system directory nfs Nov 1 00:25:34.814841 kernel: Failed to create system directory nfs Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.822491 kernel: Failed to create system directory nfs Nov 1 00:25:34.822552 kernel: Failed to create system directory nfs Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.829860 kernel: Failed to create system directory nfs Nov 1 00:25:34.829922 kernel: Failed to create system directory nfs Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.837449 kernel: Failed to create system directory nfs Nov 1 00:25:34.837509 kernel: Failed to create system directory nfs Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.845329 kernel: Failed to create system directory nfs Nov 1 00:25:34.845400 kernel: Failed to create system directory nfs Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.852968 kernel: Failed to create system directory nfs Nov 1 00:25:34.853006 kernel: Failed to create system directory nfs Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.860577 kernel: Failed to create system directory nfs Nov 1 00:25:34.860649 kernel: Failed to create system directory nfs Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.868448 kernel: Failed to create system directory nfs Nov 1 00:25:34.868495 kernel: Failed to create system directory nfs Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.876037 kernel: Failed to create system directory nfs Nov 1 00:25:34.876074 kernel: Failed to create system directory nfs Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.883664 kernel: Failed to create system directory nfs Nov 1 00:25:34.883697 kernel: Failed to create system directory nfs Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.892016 kernel: Failed to create system directory nfs Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.896140 kernel: Failed to create system directory nfs Nov 1 00:25:34.896190 kernel: Failed to create system directory nfs Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.899941 kernel: Failed to create system directory nfs Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.907315 kernel: Failed to create system directory nfs Nov 1 00:25:34.907372 kernel: Failed to create system directory nfs Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.914870 kernel: Failed to create system directory nfs Nov 1 00:25:34.914905 kernel: Failed to create system directory nfs Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.922869 kernel: Failed to create system directory nfs Nov 1 00:25:34.922922 kernel: Failed to create system directory nfs Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.930298 kernel: Failed to create system directory nfs Nov 1 00:25:34.930334 kernel: Failed to create system directory nfs Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.938318 kernel: Failed to create system directory nfs Nov 1 00:25:34.938370 kernel: Failed to create system directory nfs Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.945689 kernel: Failed to create system directory nfs Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.949878 kernel: Failed to create system directory nfs Nov 1 00:25:34.949927 kernel: Failed to create system directory nfs Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.953669 kernel: Failed to create system directory nfs Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.961120 kernel: Failed to create system directory nfs Nov 1 00:25:34.961173 kernel: Failed to create system directory nfs Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.964855 kernel: Failed to create system directory nfs Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.968472 kernel: Failed to create system directory nfs Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.975696 kernel: Failed to create system directory nfs Nov 1 00:25:34.975755 kernel: Failed to create system directory nfs Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.979537 kernel: Failed to create system directory nfs Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.983372 kernel: Failed to create system directory nfs Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.987046 kernel: Failed to create system directory nfs Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.994766 kernel: Failed to create system directory nfs Nov 1 00:25:34.994811 kernel: Failed to create system directory nfs Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.002877 kernel: Failed to create system directory nfs Nov 1 00:25:35.002915 kernel: Failed to create system directory nfs Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.010535 kernel: Failed to create system directory nfs Nov 1 00:25:35.010586 kernel: Failed to create system directory nfs Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:34.782000 audit[3306]: AVC avc: denied { confidentiality } for pid=3306 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.017922 kernel: Failed to create system directory nfs Nov 1 00:25:34.782000 audit[3306]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaee3bfb50 a1=116324 a2=aaaac1a4e028 a3=aaaaedfa8010 items=0 ppid=70 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:25:34.782000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Nov 1 00:25:35.036703 kernel: FS-Cache: Netfs 'nfs' registered for caching Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.222593 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.222660 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.226328 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.230134 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.234104 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.234192 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.241582 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.241639 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.249464 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.249515 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.257166 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.257228 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.265109 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.265171 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.272934 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.273015 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.280671 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.280747 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.288358 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.288479 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.297150 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.297334 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.305101 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.305165 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.312943 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.313007 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.320548 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.324575 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.324647 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.331865 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.331927 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.339178 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.339224 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.346853 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.346906 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.350648 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.359168 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.359220 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.367042 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.367097 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.374827 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.379026 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.379102 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.386724 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.386788 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.394689 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.394773 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.402532 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.402573 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.410261 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.410316 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.418200 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.418272 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.422533 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.430736 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.430810 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.443728 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.443819 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.447708 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.455183 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.455219 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.462522 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.462582 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.470242 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.470326 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.477413 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.477470 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.482633 kubelet[1967]: E1101 00:25:35.482553 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:25:35.485719 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.485796 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.492967 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.493044 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.500694 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.500821 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.508352 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.508404 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.515740 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.515797 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.523367 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.523451 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.527008 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.530671 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.538529 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.538587 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.546718 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.546809 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.554228 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.554285 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.561977 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.562067 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.569439 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.569500 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.576822 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.576878 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.208000 audit[3311]: AVC avc: denied { confidentiality } for pid=3311 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.584298 kernel: Failed to create system directory nfs4 Nov 1 00:25:35.640122 env[1473]: time="2025-11-01T00:25:35.639843200Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Nov 1 00:25:35.689658 kernel: NFS: Registering the id_resolver key type Nov 1 00:25:35.689774 kernel: Key type id_resolver registered Nov 1 00:25:35.695826 kernel: Key type id_legacy registered Nov 1 00:25:35.208000 audit[3311]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffffb319a010 a1=19c744 a2=aaaac3b4e028 a3=aaaad7469010 items=0 ppid=70 pid=3311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:25:35.208000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Nov 1 00:25:35.869000 audit[3312]: AVC avc: denied { confidentiality } for pid=3312 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.869000 audit[3312]: AVC avc: denied { confidentiality } for pid=3312 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.880173 kernel: Failed to create system directory rpcgss Nov 1 00:25:35.880281 kernel: Failed to create system directory rpcgss Nov 1 00:25:35.880314 kernel: Failed to create system directory rpcgss Nov 1 00:25:35.869000 audit[3312]: AVC avc: denied { confidentiality } for pid=3312 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.869000 audit[3312]: AVC avc: denied { confidentiality } for pid=3312 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.888157 kernel: Failed to create system directory rpcgss Nov 1 00:25:35.888221 kernel: Failed to create system directory rpcgss Nov 1 00:25:35.869000 audit[3312]: AVC avc: denied { confidentiality } for pid=3312 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.869000 audit[3312]: AVC avc: denied { confidentiality } for pid=3312 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.896757 kernel: Failed to create system directory rpcgss Nov 1 00:25:35.896823 kernel: Failed to create system directory rpcgss Nov 1 00:25:35.869000 audit[3312]: AVC avc: denied { confidentiality } for pid=3312 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.900618 kernel: Failed to create system directory rpcgss Nov 1 00:25:35.869000 audit[3312]: AVC avc: denied { confidentiality } for pid=3312 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.904460 kernel: Failed to create system directory rpcgss Nov 1 00:25:35.869000 audit[3312]: AVC avc: denied { confidentiality } for pid=3312 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.908331 kernel: Failed to create system directory rpcgss Nov 1 00:25:35.869000 audit[3312]: AVC avc: denied { confidentiality } for pid=3312 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.869000 audit[3312]: AVC avc: denied { confidentiality } for pid=3312 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.916079 kernel: Failed to create system directory rpcgss Nov 1 00:25:35.916230 env[1473]: time="2025-11-01T00:25:35.916161421Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:25:35.869000 audit[3312]: AVC avc: denied { confidentiality } for pid=3312 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.920368 kernel: Failed to create system directory rpcgss Nov 1 00:25:35.920454 kernel: Failed to create system directory rpcgss Nov 1 00:25:35.869000 audit[3312]: AVC avc: denied { confidentiality } for pid=3312 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.924475 env[1473]: time="2025-11-01T00:25:35.924390704Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Nov 1 00:25:35.869000 audit[3312]: AVC avc: denied { confidentiality } for pid=3312 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.925407 kubelet[1967]: E1101 00:25:35.924791 1967 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Nov 1 00:25:35.925407 kubelet[1967]: E1101 00:25:35.924857 1967 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Nov 1 00:25:35.925407 kubelet[1967]: E1101 00:25:35.925346 1967 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-65pwb,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-xmn5c_calico-system(98274ee7-d1d6-4f2e-b0fd-446126b657a6): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Nov 1 00:25:35.927576 env[1473]: time="2025-11-01T00:25:35.927331265Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Nov 1 00:25:35.928469 kernel: Failed to create system directory rpcgss Nov 1 00:25:35.928549 kernel: Failed to create system directory rpcgss Nov 1 00:25:35.869000 audit[3312]: AVC avc: denied { confidentiality } for pid=3312 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.932447 kernel: Failed to create system directory rpcgss Nov 1 00:25:35.869000 audit[3312]: AVC avc: denied { confidentiality } for pid=3312 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.936648 kernel: Failed to create system directory rpcgss Nov 1 00:25:35.869000 audit[3312]: AVC avc: denied { confidentiality } for pid=3312 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.869000 audit[3312]: AVC avc: denied { confidentiality } for pid=3312 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.944354 kernel: Failed to create system directory rpcgss Nov 1 00:25:35.944469 kernel: Failed to create system directory rpcgss Nov 1 00:25:35.869000 audit[3312]: AVC avc: denied { confidentiality } for pid=3312 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.869000 audit[3312]: AVC avc: denied { confidentiality } for pid=3312 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.952651 kernel: Failed to create system directory rpcgss Nov 1 00:25:35.952734 kernel: Failed to create system directory rpcgss Nov 1 00:25:35.869000 audit[3312]: AVC avc: denied { confidentiality } for pid=3312 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.869000 audit[3312]: AVC avc: denied { confidentiality } for pid=3312 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.960526 kernel: Failed to create system directory rpcgss Nov 1 00:25:35.960575 kernel: Failed to create system directory rpcgss Nov 1 00:25:35.869000 audit[3312]: AVC avc: denied { confidentiality } for pid=3312 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.869000 audit[3312]: AVC avc: denied { confidentiality } for pid=3312 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.968207 kernel: Failed to create system directory rpcgss Nov 1 00:25:35.968280 kernel: Failed to create system directory rpcgss Nov 1 00:25:35.869000 audit[3312]: AVC avc: denied { confidentiality } for pid=3312 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.869000 audit[3312]: AVC avc: denied { confidentiality } for pid=3312 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:25:35.976149 kernel: Failed to create system directory rpcgss Nov 1 00:25:35.869000 audit[3312]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff917e2010 a1=5eedc a2=aaaae351e028 a3=aaab11a04010 items=0 ppid=70 pid=3312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:25:35.869000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Nov 1 00:25:36.234215 env[1473]: time="2025-11-01T00:25:36.234161938Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:25:36.240672 env[1473]: time="2025-11-01T00:25:36.238434619Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Nov 1 00:25:36.242300 kubelet[1967]: E1101 00:25:36.242264 1967 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Nov 1 00:25:36.242411 kubelet[1967]: E1101 00:25:36.242394 1967 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Nov 1 00:25:36.242640 kubelet[1967]: E1101 00:25:36.242586 1967 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-65pwb,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-xmn5c_calico-system(98274ee7-d1d6-4f2e-b0fd-446126b657a6): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Nov 1 00:25:36.244012 kubelet[1967]: E1101 00:25:36.243979 1967 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-xmn5c" podUID="98274ee7-d1d6-4f2e-b0fd-446126b657a6" Nov 1 00:25:36.483380 kubelet[1967]: E1101 00:25:36.483343 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:25:36.678160 nfsidmap[3322]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.8-n-bde7a9edbb' Nov 1 00:25:36.746986 nfsidmap[3323]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.8-n-bde7a9edbb' Nov 1 00:25:36.759000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2782 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Nov 1 00:25:36.759000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2782 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Nov 1 00:25:36.759000 audit[1582]: AVC avc: denied { watch_reads } for pid=1582 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2782 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Nov 1 00:25:36.759000 audit[1582]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaaeda60400 a2=10 a3=0 items=0 ppid=1 pid=1582 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:25:36.759000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Nov 1 00:25:36.759000 audit[1582]: AVC avc: denied { watch_reads } for pid=1582 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2782 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Nov 1 00:25:36.759000 audit[1582]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaaeda60400 a2=10 a3=0 items=0 ppid=1 pid=1582 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:25:36.759000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Nov 1 00:25:36.759000 audit[1582]: AVC avc: denied { watch_reads } for pid=1582 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2782 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Nov 1 00:25:36.759000 audit[1582]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaaeda60400 a2=10 a3=0 items=0 ppid=1 pid=1582 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:25:36.759000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Nov 1 00:25:36.865167 env[1473]: time="2025-11-01T00:25:36.865129008Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:70e293da-221e-4898-b30a-7a4d6d88d9c1,Namespace:default,Attempt:0,}" Nov 1 00:25:37.033360 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Nov 1 00:25:37.033457 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Nov 1 00:25:37.033576 systemd-networkd[1645]: cali5ec59c6bf6e: Link UP Nov 1 00:25:37.035097 systemd-networkd[1645]: cali5ec59c6bf6e: Gained carrier Nov 1 00:25:37.051973 env[1473]: 2025-11-01 00:25:36.932 [INFO][3324] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.12-k8s-test--pod--1-eth0 default 70e293da-221e-4898-b30a-7a4d6d88d9c1 2211 0 2025-11-01 00:25:03 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.12 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="53b29bc2bdfbc9f909d5bb397ada68f00ad257fa32e629165961356d853c6346" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.12-k8s-test--pod--1-" Nov 1 00:25:37.051973 env[1473]: 2025-11-01 00:25:36.932 [INFO][3324] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="53b29bc2bdfbc9f909d5bb397ada68f00ad257fa32e629165961356d853c6346" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.12-k8s-test--pod--1-eth0" Nov 1 00:25:37.051973 env[1473]: 2025-11-01 00:25:36.958 [INFO][3337] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="53b29bc2bdfbc9f909d5bb397ada68f00ad257fa32e629165961356d853c6346" HandleID="k8s-pod-network.53b29bc2bdfbc9f909d5bb397ada68f00ad257fa32e629165961356d853c6346" Workload="10.200.20.12-k8s-test--pod--1-eth0" Nov 1 00:25:37.051973 env[1473]: 2025-11-01 00:25:36.958 [INFO][3337] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="53b29bc2bdfbc9f909d5bb397ada68f00ad257fa32e629165961356d853c6346" HandleID="k8s-pod-network.53b29bc2bdfbc9f909d5bb397ada68f00ad257fa32e629165961356d853c6346" Workload="10.200.20.12-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d3010), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.12", "pod":"test-pod-1", "timestamp":"2025-11-01 00:25:36.958780482 +0000 UTC"}, Hostname:"10.200.20.12", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Nov 1 00:25:37.051973 env[1473]: 2025-11-01 00:25:36.959 [INFO][3337] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:25:37.051973 env[1473]: 2025-11-01 00:25:36.959 [INFO][3337] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:25:37.051973 env[1473]: 2025-11-01 00:25:36.959 [INFO][3337] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.12' Nov 1 00:25:37.051973 env[1473]: 2025-11-01 00:25:36.969 [INFO][3337] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.53b29bc2bdfbc9f909d5bb397ada68f00ad257fa32e629165961356d853c6346" host="10.200.20.12" Nov 1 00:25:37.051973 env[1473]: 2025-11-01 00:25:36.973 [INFO][3337] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.20.12" Nov 1 00:25:37.051973 env[1473]: 2025-11-01 00:25:36.980 [INFO][3337] ipam/ipam.go 511: Trying affinity for 192.168.119.0/26 host="10.200.20.12" Nov 1 00:25:37.051973 env[1473]: 2025-11-01 00:25:36.984 [INFO][3337] ipam/ipam.go 158: Attempting to load block cidr=192.168.119.0/26 host="10.200.20.12" Nov 1 00:25:37.051973 env[1473]: 2025-11-01 00:25:36.987 [INFO][3337] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.119.0/26 host="10.200.20.12" Nov 1 00:25:37.051973 env[1473]: 2025-11-01 00:25:36.987 [INFO][3337] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.119.0/26 handle="k8s-pod-network.53b29bc2bdfbc9f909d5bb397ada68f00ad257fa32e629165961356d853c6346" host="10.200.20.12" Nov 1 00:25:37.051973 env[1473]: 2025-11-01 00:25:36.989 [INFO][3337] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.53b29bc2bdfbc9f909d5bb397ada68f00ad257fa32e629165961356d853c6346 Nov 1 00:25:37.051973 env[1473]: 2025-11-01 00:25:37.003 [INFO][3337] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.119.0/26 handle="k8s-pod-network.53b29bc2bdfbc9f909d5bb397ada68f00ad257fa32e629165961356d853c6346" host="10.200.20.12" Nov 1 00:25:37.051973 env[1473]: 2025-11-01 00:25:37.014 [INFO][3337] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.119.4/26] block=192.168.119.0/26 handle="k8s-pod-network.53b29bc2bdfbc9f909d5bb397ada68f00ad257fa32e629165961356d853c6346" host="10.200.20.12" Nov 1 00:25:37.051973 env[1473]: 2025-11-01 00:25:37.015 [INFO][3337] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.119.4/26] handle="k8s-pod-network.53b29bc2bdfbc9f909d5bb397ada68f00ad257fa32e629165961356d853c6346" host="10.200.20.12" Nov 1 00:25:37.051973 env[1473]: 2025-11-01 00:25:37.015 [INFO][3337] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:25:37.051973 env[1473]: 2025-11-01 00:25:37.015 [INFO][3337] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.119.4/26] IPv6=[] ContainerID="53b29bc2bdfbc9f909d5bb397ada68f00ad257fa32e629165961356d853c6346" HandleID="k8s-pod-network.53b29bc2bdfbc9f909d5bb397ada68f00ad257fa32e629165961356d853c6346" Workload="10.200.20.12-k8s-test--pod--1-eth0" Nov 1 00:25:37.051973 env[1473]: 2025-11-01 00:25:37.016 [INFO][3324] cni-plugin/k8s.go 418: Populated endpoint ContainerID="53b29bc2bdfbc9f909d5bb397ada68f00ad257fa32e629165961356d853c6346" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.12-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"70e293da-221e-4898-b30a-7a4d6d88d9c1", ResourceVersion:"2211", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 25, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.12", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.119.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:25:37.052702 env[1473]: 2025-11-01 00:25:37.017 [INFO][3324] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.119.4/32] ContainerID="53b29bc2bdfbc9f909d5bb397ada68f00ad257fa32e629165961356d853c6346" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.12-k8s-test--pod--1-eth0" Nov 1 00:25:37.052702 env[1473]: 2025-11-01 00:25:37.017 [INFO][3324] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="53b29bc2bdfbc9f909d5bb397ada68f00ad257fa32e629165961356d853c6346" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.12-k8s-test--pod--1-eth0" Nov 1 00:25:37.052702 env[1473]: 2025-11-01 00:25:37.034 [INFO][3324] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="53b29bc2bdfbc9f909d5bb397ada68f00ad257fa32e629165961356d853c6346" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.12-k8s-test--pod--1-eth0" Nov 1 00:25:37.052702 env[1473]: 2025-11-01 00:25:37.035 [INFO][3324] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="53b29bc2bdfbc9f909d5bb397ada68f00ad257fa32e629165961356d853c6346" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.12-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"70e293da-221e-4898-b30a-7a4d6d88d9c1", ResourceVersion:"2211", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 25, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.12", ContainerID:"53b29bc2bdfbc9f909d5bb397ada68f00ad257fa32e629165961356d853c6346", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.119.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"ba:22:b9:c4:87:21", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:25:37.052702 env[1473]: 2025-11-01 00:25:37.049 [INFO][3324] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="53b29bc2bdfbc9f909d5bb397ada68f00ad257fa32e629165961356d853c6346" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.12-k8s-test--pod--1-eth0" Nov 1 00:25:37.063000 audit[3359]: NETFILTER_CFG table=filter:81 family=2 entries=36 op=nft_register_chain pid=3359 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 00:25:37.063000 audit[3359]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19132 a0=3 a1=fffff0e254e0 a2=0 a3=ffffbf1b6fa8 items=0 ppid=2597 pid=3359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:25:37.063000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 00:25:37.067987 env[1473]: time="2025-11-01T00:25:37.067909881Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 00:25:37.067987 env[1473]: time="2025-11-01T00:25:37.067950721Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 00:25:37.068475 env[1473]: time="2025-11-01T00:25:37.067960601Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 00:25:37.068475 env[1473]: time="2025-11-01T00:25:37.068099041Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/53b29bc2bdfbc9f909d5bb397ada68f00ad257fa32e629165961356d853c6346 pid=3363 runtime=io.containerd.runc.v2 Nov 1 00:25:37.083455 systemd[1]: Started cri-containerd-53b29bc2bdfbc9f909d5bb397ada68f00ad257fa32e629165961356d853c6346.scope. Nov 1 00:25:37.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.096000 audit: BPF prog-id=121 op=LOAD Nov 1 00:25:37.097000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.097000 audit[3374]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3363 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:25:37.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533623239626332626466626339663930396435626233393761646136 Nov 1 00:25:37.097000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.097000 audit[3374]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3363 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:25:37.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533623239626332626466626339663930396435626233393761646136 Nov 1 00:25:37.097000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.097000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.097000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.097000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.097000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.097000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.097000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.097000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.097000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.097000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.097000 audit: BPF prog-id=122 op=LOAD Nov 1 00:25:37.097000 audit[3374]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3363 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:25:37.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533623239626332626466626339663930396435626233393761646136 Nov 1 00:25:37.098000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.098000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.098000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.098000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.098000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.098000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.098000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.098000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.098000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.098000 audit: BPF prog-id=123 op=LOAD Nov 1 00:25:37.098000 audit[3374]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3363 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:25:37.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533623239626332626466626339663930396435626233393761646136 Nov 1 00:25:37.099000 audit: BPF prog-id=123 op=UNLOAD Nov 1 00:25:37.099000 audit: BPF prog-id=122 op=UNLOAD Nov 1 00:25:37.099000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.099000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.099000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.099000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.099000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.099000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.099000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.099000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.099000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.099000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.099000 audit: BPF prog-id=124 op=LOAD Nov 1 00:25:37.099000 audit[3374]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3363 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:25:37.099000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533623239626332626466626339663930396435626233393761646136 Nov 1 00:25:37.117266 env[1473]: time="2025-11-01T00:25:37.117226819Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:70e293da-221e-4898-b30a-7a4d6d88d9c1,Namespace:default,Attempt:0,} returns sandbox id \"53b29bc2bdfbc9f909d5bb397ada68f00ad257fa32e629165961356d853c6346\"" Nov 1 00:25:37.118804 env[1473]: time="2025-11-01T00:25:37.118773580Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Nov 1 00:25:37.413855 env[1473]: time="2025-11-01T00:25:37.412977886Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:25:37.420083 env[1473]: time="2025-11-01T00:25:37.420035528Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:93a0bb2334812af7cad47dff33d3bbc1ced8774dea82e727e7d8cb917ca9a024,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:25:37.424715 env[1473]: time="2025-11-01T00:25:37.424684650Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:25:37.428956 env[1473]: time="2025-11-01T00:25:37.428918571Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:0537df20ac7c5485a0f6b7bfb8e3fbbc8714fce070bab2a6344e5cadfba58d90,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:25:37.429766 env[1473]: time="2025-11-01T00:25:37.429739092Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:93a0bb2334812af7cad47dff33d3bbc1ced8774dea82e727e7d8cb917ca9a024\"" Nov 1 00:25:37.432883 env[1473]: time="2025-11-01T00:25:37.432841733Z" level=info msg="CreateContainer within sandbox \"53b29bc2bdfbc9f909d5bb397ada68f00ad257fa32e629165961356d853c6346\" for container &ContainerMetadata{Name:test,Attempt:0,}" Nov 1 00:25:37.464794 env[1473]: time="2025-11-01T00:25:37.464731704Z" level=info msg="CreateContainer within sandbox \"53b29bc2bdfbc9f909d5bb397ada68f00ad257fa32e629165961356d853c6346\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"2f996fcfb7b315057693e73f0c1c69a70b23dc925b4d060546ec5728d7e2e9b9\"" Nov 1 00:25:37.465725 env[1473]: time="2025-11-01T00:25:37.465683625Z" level=info msg="StartContainer for \"2f996fcfb7b315057693e73f0c1c69a70b23dc925b4d060546ec5728d7e2e9b9\"" Nov 1 00:25:37.479783 systemd[1]: Started cri-containerd-2f996fcfb7b315057693e73f0c1c69a70b23dc925b4d060546ec5728d7e2e9b9.scope. Nov 1 00:25:37.484459 kubelet[1967]: E1101 00:25:37.484404 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:25:37.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.494000 audit: BPF prog-id=125 op=LOAD Nov 1 00:25:37.495000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.495000 audit[3403]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=3363 pid=3403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:25:37.495000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266393936666366623762333135303537363933653733663063316336 Nov 1 00:25:37.495000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.495000 audit[3403]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=3363 pid=3403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:25:37.495000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266393936666366623762333135303537363933653733663063316336 Nov 1 00:25:37.495000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.495000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.495000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.495000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.495000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.495000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.495000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.495000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.495000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.495000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.495000 audit: BPF prog-id=126 op=LOAD Nov 1 00:25:37.495000 audit[3403]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=3363 pid=3403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:25:37.495000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266393936666366623762333135303537363933653733663063316336 Nov 1 00:25:37.496000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.496000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.496000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.496000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.496000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.496000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.496000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.496000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.496000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.496000 audit: BPF prog-id=127 op=LOAD Nov 1 00:25:37.496000 audit[3403]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=3363 pid=3403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:25:37.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266393936666366623762333135303537363933653733663063316336 Nov 1 00:25:37.497000 audit: BPF prog-id=127 op=UNLOAD Nov 1 00:25:37.497000 audit: BPF prog-id=126 op=UNLOAD Nov 1 00:25:37.497000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.497000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.497000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.497000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.497000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.497000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.497000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.497000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.497000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.497000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:25:37.497000 audit: BPF prog-id=128 op=LOAD Nov 1 00:25:37.497000 audit[3403]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=3363 pid=3403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:25:37.497000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266393936666366623762333135303537363933653733663063316336 Nov 1 00:25:37.551212 env[1473]: time="2025-11-01T00:25:37.549580455Z" level=info msg="StartContainer for \"2f996fcfb7b315057693e73f0c1c69a70b23dc925b4d060546ec5728d7e2e9b9\" returns successfully" Nov 1 00:25:37.825583 kubelet[1967]: I1101 00:25:37.825529 1967 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=34.512254081 podStartE2EDuration="34.825511954s" podCreationTimestamp="2025-11-01 00:25:03 +0000 UTC" firstStartedPulling="2025-11-01 00:25:37.118130739 +0000 UTC m=+84.083638043" lastFinishedPulling="2025-11-01 00:25:37.431388612 +0000 UTC m=+84.396895916" observedRunningTime="2025-11-01 00:25:37.825358714 +0000 UTC m=+84.790866018" watchObservedRunningTime="2025-11-01 00:25:37.825511954 +0000 UTC m=+84.791019218" Nov 1 00:25:38.485331 kubelet[1967]: E1101 00:25:38.485294 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:25:38.897795 systemd-networkd[1645]: cali5ec59c6bf6e: Gained IPv6LL Nov 1 00:25:39.486110 kubelet[1967]: E1101 00:25:39.486070 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:25:39.725824 systemd[1]: run-containerd-runc-k8s.io-d510be3f3380a4b9f6eb328472b717a676effc37ae9b82968691560a514a4f5b-runc.GuK1qg.mount: Deactivated successfully. Nov 1 00:25:40.487050 kubelet[1967]: E1101 00:25:40.487006 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:25:41.487589 kubelet[1967]: E1101 00:25:41.487554 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Nov 1 00:25:42.488280 kubelet[1967]: E1101 00:25:42.488238 1967 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"