Aug 13 00:54:01.054309 kernel: Linux version 5.15.189-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Tue Aug 12 23:01:50 -00 2025 Aug 13 00:54:01.054336 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=8f8aacd9fbcdd713563d390e899e90bedf5577e4b1b261b4e57687d87edd6b57 Aug 13 00:54:01.054348 kernel: BIOS-provided physical RAM map: Aug 13 00:54:01.054354 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Aug 13 00:54:01.054360 kernel: BIOS-e820: [mem 0x00000000000c0000-0x00000000000fffff] reserved Aug 13 00:54:01.054367 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003ff40fff] usable Aug 13 00:54:01.054378 kernel: BIOS-e820: [mem 0x000000003ff41000-0x000000003ffc8fff] reserved Aug 13 00:54:01.054386 kernel: BIOS-e820: [mem 0x000000003ffc9000-0x000000003fffafff] ACPI data Aug 13 00:54:01.054394 kernel: BIOS-e820: [mem 0x000000003fffb000-0x000000003fffefff] ACPI NVS Aug 13 00:54:01.054399 kernel: BIOS-e820: [mem 0x000000003ffff000-0x000000003fffffff] usable Aug 13 00:54:01.054406 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000002bfffffff] usable Aug 13 00:54:01.054414 kernel: printk: bootconsole [earlyser0] enabled Aug 13 00:54:01.054420 kernel: NX (Execute Disable) protection: active Aug 13 00:54:01.054429 kernel: efi: EFI v2.70 by Microsoft Aug 13 00:54:01.054439 kernel: efi: ACPI=0x3fffa000 ACPI 2.0=0x3fffa014 SMBIOS=0x3ff85000 SMBIOS 3.0=0x3ff83000 MEMATTR=0x3f5c8a98 RNG=0x3ffd1018 Aug 13 00:54:01.054446 kernel: random: crng init done Aug 13 00:54:01.054455 kernel: SMBIOS 3.1.0 present. Aug 13 00:54:01.054462 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 03/08/2024 Aug 13 00:54:01.054471 kernel: Hypervisor detected: Microsoft Hyper-V Aug 13 00:54:01.054478 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3b8030, hints 0x64e24, misc 0xbed7b2 Aug 13 00:54:01.054484 kernel: Hyper-V Host Build:20348-10.0-1-0.1827 Aug 13 00:54:01.054492 kernel: Hyper-V: Nested features: 0x1e0101 Aug 13 00:54:01.054502 kernel: Hyper-V: LAPIC Timer Frequency: 0x30d40 Aug 13 00:54:01.054511 kernel: Hyper-V: Using hypercall for remote TLB flush Aug 13 00:54:01.054518 kernel: clocksource: hyperv_clocksource_tsc_page: mask: 0xffffffffffffffff max_cycles: 0x24e6a1710, max_idle_ns: 440795202120 ns Aug 13 00:54:01.054524 kernel: tsc: Marking TSC unstable due to running on Hyper-V Aug 13 00:54:01.054532 kernel: tsc: Detected 2593.907 MHz processor Aug 13 00:54:01.054541 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Aug 13 00:54:01.054548 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Aug 13 00:54:01.054557 kernel: last_pfn = 0x2c0000 max_arch_pfn = 0x400000000 Aug 13 00:54:01.054563 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Aug 13 00:54:01.054569 kernel: e820: update [mem 0x40000000-0xffffffff] usable ==> reserved Aug 13 00:54:01.054581 kernel: last_pfn = 0x40000 max_arch_pfn = 0x400000000 Aug 13 00:54:01.054587 kernel: Using GB pages for direct mapping Aug 13 00:54:01.054597 kernel: Secure boot disabled Aug 13 00:54:01.054603 kernel: ACPI: Early table checksum verification disabled Aug 13 00:54:01.054610 kernel: ACPI: RSDP 0x000000003FFFA014 000024 (v02 VRTUAL) Aug 13 00:54:01.054616 kernel: ACPI: XSDT 0x000000003FFF90E8 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Aug 13 00:54:01.054625 kernel: ACPI: FACP 0x000000003FFF8000 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Aug 13 00:54:01.054632 kernel: ACPI: DSDT 0x000000003FFD6000 01E184 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Aug 13 00:54:01.054647 kernel: ACPI: FACS 0x000000003FFFE000 000040 Aug 13 00:54:01.054654 kernel: ACPI: OEM0 0x000000003FFF7000 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Aug 13 00:54:01.054662 kernel: ACPI: SPCR 0x000000003FFF6000 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Aug 13 00:54:01.054671 kernel: ACPI: WAET 0x000000003FFF5000 000028 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Aug 13 00:54:01.054679 kernel: ACPI: APIC 0x000000003FFD5000 000058 (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Aug 13 00:54:01.054688 kernel: ACPI: SRAT 0x000000003FFD4000 0002D0 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Aug 13 00:54:01.054697 kernel: ACPI: BGRT 0x000000003FFD3000 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Aug 13 00:54:01.054706 kernel: ACPI: FPDT 0x000000003FFD2000 000034 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Aug 13 00:54:01.054714 kernel: ACPI: Reserving FACP table memory at [mem 0x3fff8000-0x3fff8113] Aug 13 00:54:01.054723 kernel: ACPI: Reserving DSDT table memory at [mem 0x3ffd6000-0x3fff4183] Aug 13 00:54:01.054731 kernel: ACPI: Reserving FACS table memory at [mem 0x3fffe000-0x3fffe03f] Aug 13 00:54:01.054738 kernel: ACPI: Reserving OEM0 table memory at [mem 0x3fff7000-0x3fff7063] Aug 13 00:54:01.054746 kernel: ACPI: Reserving SPCR table memory at [mem 0x3fff6000-0x3fff604f] Aug 13 00:54:01.054755 kernel: ACPI: Reserving WAET table memory at [mem 0x3fff5000-0x3fff5027] Aug 13 00:54:01.054766 kernel: ACPI: Reserving APIC table memory at [mem 0x3ffd5000-0x3ffd5057] Aug 13 00:54:01.054774 kernel: ACPI: Reserving SRAT table memory at [mem 0x3ffd4000-0x3ffd42cf] Aug 13 00:54:01.054780 kernel: ACPI: Reserving BGRT table memory at [mem 0x3ffd3000-0x3ffd3037] Aug 13 00:54:01.054789 kernel: ACPI: Reserving FPDT table memory at [mem 0x3ffd2000-0x3ffd2033] Aug 13 00:54:01.054797 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Aug 13 00:54:01.054806 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Aug 13 00:54:01.054814 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x3fffffff] hotplug Aug 13 00:54:01.054821 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x2bfffffff] hotplug Aug 13 00:54:01.054829 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2c0000000-0xfdfffffff] hotplug Aug 13 00:54:01.054840 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000-0xffffffffff] hotplug Aug 13 00:54:01.054849 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x10000000000-0x1ffffffffff] hotplug Aug 13 00:54:01.054857 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x20000000000-0x3ffffffffff] hotplug Aug 13 00:54:01.054863 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x40000000000-0x7ffffffffff] hotplug Aug 13 00:54:01.054872 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000000-0xfffffffffff] hotplug Aug 13 00:54:01.054880 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000000-0x1fffffffffff] hotplug Aug 13 00:54:01.054889 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x200000000000-0x3fffffffffff] hotplug Aug 13 00:54:01.054897 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x400000000000-0x7fffffffffff] hotplug Aug 13 00:54:01.054904 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x800000000000-0xffffffffffff] hotplug Aug 13 00:54:01.054917 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000000-0x1ffffffffffff] hotplug Aug 13 00:54:01.054924 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2000000000000-0x3ffffffffffff] hotplug Aug 13 00:54:01.054934 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x4000000000000-0x7ffffffffffff] hotplug Aug 13 00:54:01.054941 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x8000000000000-0xfffffffffffff] hotplug Aug 13 00:54:01.054948 kernel: NUMA: Node 0 [mem 0x00000000-0x3fffffff] + [mem 0x100000000-0x2bfffffff] -> [mem 0x00000000-0x2bfffffff] Aug 13 00:54:01.054958 kernel: NODE_DATA(0) allocated [mem 0x2bfffa000-0x2bfffffff] Aug 13 00:54:01.054965 kernel: Zone ranges: Aug 13 00:54:01.054975 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Aug 13 00:54:01.054982 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Aug 13 00:54:01.054992 kernel: Normal [mem 0x0000000100000000-0x00000002bfffffff] Aug 13 00:54:01.055002 kernel: Movable zone start for each node Aug 13 00:54:01.055009 kernel: Early memory node ranges Aug 13 00:54:01.055019 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Aug 13 00:54:01.055026 kernel: node 0: [mem 0x0000000000100000-0x000000003ff40fff] Aug 13 00:54:01.055032 kernel: node 0: [mem 0x000000003ffff000-0x000000003fffffff] Aug 13 00:54:01.055043 kernel: node 0: [mem 0x0000000100000000-0x00000002bfffffff] Aug 13 00:54:01.055051 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000002bfffffff] Aug 13 00:54:01.055061 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Aug 13 00:54:01.055070 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Aug 13 00:54:01.055078 kernel: On node 0, zone DMA32: 190 pages in unavailable ranges Aug 13 00:54:01.055087 kernel: ACPI: PM-Timer IO Port: 0x408 Aug 13 00:54:01.055094 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] dfl dfl lint[0x1]) Aug 13 00:54:01.055104 kernel: IOAPIC[0]: apic_id 2, version 17, address 0xfec00000, GSI 0-23 Aug 13 00:54:01.055111 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Aug 13 00:54:01.055118 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Aug 13 00:54:01.055129 kernel: ACPI: SPCR: console: uart,io,0x3f8,115200 Aug 13 00:54:01.055136 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Aug 13 00:54:01.055148 kernel: [mem 0x40000000-0xffffffff] available for PCI devices Aug 13 00:54:01.055155 kernel: Booting paravirtualized kernel on Hyper-V Aug 13 00:54:01.055162 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Aug 13 00:54:01.055171 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Aug 13 00:54:01.055179 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Aug 13 00:54:01.062250 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Aug 13 00:54:01.062266 kernel: pcpu-alloc: [0] 0 1 Aug 13 00:54:01.062279 kernel: Hyper-V: PV spinlocks enabled Aug 13 00:54:01.062291 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Aug 13 00:54:01.062310 kernel: Built 1 zonelists, mobility grouping on. Total pages: 2062618 Aug 13 00:54:01.062321 kernel: Policy zone: Normal Aug 13 00:54:01.062338 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=8f8aacd9fbcdd713563d390e899e90bedf5577e4b1b261b4e57687d87edd6b57 Aug 13 00:54:01.062351 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Aug 13 00:54:01.062362 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Aug 13 00:54:01.062373 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Aug 13 00:54:01.062384 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Aug 13 00:54:01.062397 kernel: Memory: 8079144K/8387460K available (12295K kernel code, 2276K rwdata, 13732K rodata, 47488K init, 4092K bss, 308056K reserved, 0K cma-reserved) Aug 13 00:54:01.062413 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Aug 13 00:54:01.062426 kernel: ftrace: allocating 34608 entries in 136 pages Aug 13 00:54:01.062449 kernel: ftrace: allocated 136 pages with 2 groups Aug 13 00:54:01.062466 kernel: rcu: Hierarchical RCU implementation. Aug 13 00:54:01.062478 kernel: rcu: RCU event tracing is enabled. Aug 13 00:54:01.062490 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Aug 13 00:54:01.062501 kernel: Rude variant of Tasks RCU enabled. Aug 13 00:54:01.062513 kernel: Tracing variant of Tasks RCU enabled. Aug 13 00:54:01.062525 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Aug 13 00:54:01.062536 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Aug 13 00:54:01.062547 kernel: Using NULL legacy PIC Aug 13 00:54:01.062564 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 0 Aug 13 00:54:01.062577 kernel: Console: colour dummy device 80x25 Aug 13 00:54:01.062589 kernel: printk: console [tty1] enabled Aug 13 00:54:01.062601 kernel: printk: console [ttyS0] enabled Aug 13 00:54:01.062614 kernel: printk: bootconsole [earlyser0] disabled Aug 13 00:54:01.062632 kernel: ACPI: Core revision 20210730 Aug 13 00:54:01.062644 kernel: Failed to register legacy timer interrupt Aug 13 00:54:01.062656 kernel: APIC: Switch to symmetric I/O mode setup Aug 13 00:54:01.062668 kernel: Hyper-V: Using IPI hypercalls Aug 13 00:54:01.062680 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 5187.81 BogoMIPS (lpj=2593907) Aug 13 00:54:01.062700 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Aug 13 00:54:01.062718 kernel: Last level dTLB entries: 4KB 64, 2MB 32, 4MB 32, 1GB 4 Aug 13 00:54:01.062730 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Aug 13 00:54:01.062742 kernel: Spectre V2 : Mitigation: Retpolines Aug 13 00:54:01.062753 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Aug 13 00:54:01.062766 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Aug 13 00:54:01.062778 kernel: RETBleed: Vulnerable Aug 13 00:54:01.062789 kernel: Speculative Store Bypass: Vulnerable Aug 13 00:54:01.062800 kernel: TAA: Vulnerable: Clear CPU buffers attempted, no microcode Aug 13 00:54:01.062812 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Aug 13 00:54:01.062824 kernel: ITS: Mitigation: Aligned branch/return thunks Aug 13 00:54:01.062837 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Aug 13 00:54:01.062850 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Aug 13 00:54:01.062863 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Aug 13 00:54:01.062876 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Aug 13 00:54:01.062890 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Aug 13 00:54:01.062901 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Aug 13 00:54:01.062912 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Aug 13 00:54:01.062923 kernel: x86/fpu: xstate_offset[5]: 832, xstate_sizes[5]: 64 Aug 13 00:54:01.062934 kernel: x86/fpu: xstate_offset[6]: 896, xstate_sizes[6]: 512 Aug 13 00:54:01.062945 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024 Aug 13 00:54:01.062958 kernel: x86/fpu: Enabled xstate features 0xe7, context size is 2432 bytes, using 'compacted' format. Aug 13 00:54:01.062971 kernel: Freeing SMP alternatives memory: 32K Aug 13 00:54:01.062983 kernel: pid_max: default: 32768 minimum: 301 Aug 13 00:54:01.062995 kernel: LSM: Security Framework initializing Aug 13 00:54:01.063006 kernel: SELinux: Initializing. Aug 13 00:54:01.063019 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Aug 13 00:54:01.063035 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Aug 13 00:54:01.063049 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz (family: 0x6, model: 0x55, stepping: 0x7) Aug 13 00:54:01.063061 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Aug 13 00:54:01.063072 kernel: signal: max sigframe size: 3632 Aug 13 00:54:01.063085 kernel: rcu: Hierarchical SRCU implementation. Aug 13 00:54:01.063098 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Aug 13 00:54:01.063111 kernel: smp: Bringing up secondary CPUs ... Aug 13 00:54:01.063123 kernel: x86: Booting SMP configuration: Aug 13 00:54:01.063136 kernel: .... node #0, CPUs: #1 Aug 13 00:54:01.063149 kernel: Transient Scheduler Attacks: TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. Aug 13 00:54:01.063165 kernel: Transient Scheduler Attacks: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Aug 13 00:54:01.063178 kernel: smp: Brought up 1 node, 2 CPUs Aug 13 00:54:01.063210 kernel: smpboot: Max logical packages: 1 Aug 13 00:54:01.063225 kernel: smpboot: Total of 2 processors activated (10375.62 BogoMIPS) Aug 13 00:54:01.063239 kernel: devtmpfs: initialized Aug 13 00:54:01.063254 kernel: x86/mm: Memory block size: 128MB Aug 13 00:54:01.063268 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x3fffb000-0x3fffefff] (16384 bytes) Aug 13 00:54:01.063283 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Aug 13 00:54:01.063300 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Aug 13 00:54:01.063314 kernel: pinctrl core: initialized pinctrl subsystem Aug 13 00:54:01.063328 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Aug 13 00:54:01.063341 kernel: audit: initializing netlink subsys (disabled) Aug 13 00:54:01.063354 kernel: audit: type=2000 audit(1755046439.023:1): state=initialized audit_enabled=0 res=1 Aug 13 00:54:01.063368 kernel: thermal_sys: Registered thermal governor 'step_wise' Aug 13 00:54:01.063382 kernel: thermal_sys: Registered thermal governor 'user_space' Aug 13 00:54:01.063395 kernel: cpuidle: using governor menu Aug 13 00:54:01.063409 kernel: ACPI: bus type PCI registered Aug 13 00:54:01.063426 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Aug 13 00:54:01.063440 kernel: dca service started, version 1.12.1 Aug 13 00:54:01.063453 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Aug 13 00:54:01.063467 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Aug 13 00:54:01.063480 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Aug 13 00:54:01.063494 kernel: ACPI: Added _OSI(Module Device) Aug 13 00:54:01.063507 kernel: ACPI: Added _OSI(Processor Device) Aug 13 00:54:01.063521 kernel: ACPI: Added _OSI(Processor Aggregator Device) Aug 13 00:54:01.063535 kernel: ACPI: Added _OSI(Linux-Dell-Video) Aug 13 00:54:01.063553 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Aug 13 00:54:01.063567 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Aug 13 00:54:01.063580 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Aug 13 00:54:01.063593 kernel: ACPI: Interpreter enabled Aug 13 00:54:01.063607 kernel: ACPI: PM: (supports S0 S5) Aug 13 00:54:01.063620 kernel: ACPI: Using IOAPIC for interrupt routing Aug 13 00:54:01.063634 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Aug 13 00:54:01.063648 kernel: ACPI: Enabled 1 GPEs in block 00 to 0F Aug 13 00:54:01.063661 kernel: iommu: Default domain type: Translated Aug 13 00:54:01.063677 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Aug 13 00:54:01.063691 kernel: vgaarb: loaded Aug 13 00:54:01.063704 kernel: pps_core: LinuxPPS API ver. 1 registered Aug 13 00:54:01.063718 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Aug 13 00:54:01.063731 kernel: PTP clock support registered Aug 13 00:54:01.063744 kernel: Registered efivars operations Aug 13 00:54:01.063758 kernel: PCI: Using ACPI for IRQ routing Aug 13 00:54:01.063771 kernel: PCI: System does not support PCI Aug 13 00:54:01.063784 kernel: clocksource: Switched to clocksource hyperv_clocksource_tsc_page Aug 13 00:54:01.063801 kernel: VFS: Disk quotas dquot_6.6.0 Aug 13 00:54:01.063814 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Aug 13 00:54:01.063828 kernel: pnp: PnP ACPI init Aug 13 00:54:01.063842 kernel: pnp: PnP ACPI: found 3 devices Aug 13 00:54:01.063855 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Aug 13 00:54:01.063869 kernel: NET: Registered PF_INET protocol family Aug 13 00:54:01.063883 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Aug 13 00:54:01.063897 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Aug 13 00:54:01.063911 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Aug 13 00:54:01.063928 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Aug 13 00:54:01.063941 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Aug 13 00:54:01.063955 kernel: TCP: Hash tables configured (established 65536 bind 65536) Aug 13 00:54:01.063969 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Aug 13 00:54:01.063982 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Aug 13 00:54:01.063997 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Aug 13 00:54:01.064010 kernel: NET: Registered PF_XDP protocol family Aug 13 00:54:01.064023 kernel: PCI: CLS 0 bytes, default 64 Aug 13 00:54:01.064037 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Aug 13 00:54:01.064053 kernel: software IO TLB: mapped [mem 0x000000003a8ad000-0x000000003e8ad000] (64MB) Aug 13 00:54:01.064066 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Aug 13 00:54:01.064080 kernel: Initialise system trusted keyrings Aug 13 00:54:01.064093 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Aug 13 00:54:01.064106 kernel: Key type asymmetric registered Aug 13 00:54:01.064121 kernel: Asymmetric key parser 'x509' registered Aug 13 00:54:01.064133 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Aug 13 00:54:01.064147 kernel: io scheduler mq-deadline registered Aug 13 00:54:01.064160 kernel: io scheduler kyber registered Aug 13 00:54:01.064177 kernel: io scheduler bfq registered Aug 13 00:54:01.064215 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Aug 13 00:54:01.064229 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Aug 13 00:54:01.064243 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Aug 13 00:54:01.064256 kernel: 00:01: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Aug 13 00:54:01.064269 kernel: i8042: PNP: No PS/2 controller found. Aug 13 00:54:01.064477 kernel: rtc_cmos 00:02: registered as rtc0 Aug 13 00:54:01.064596 kernel: rtc_cmos 00:02: setting system clock to 2025-08-13T00:54:00 UTC (1755046440) Aug 13 00:54:01.064705 kernel: rtc_cmos 00:02: alarms up to one month, 114 bytes nvram Aug 13 00:54:01.064722 kernel: intel_pstate: CPU model not supported Aug 13 00:54:01.064736 kernel: efifb: probing for efifb Aug 13 00:54:01.064749 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Aug 13 00:54:01.064762 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Aug 13 00:54:01.064776 kernel: efifb: scrolling: redraw Aug 13 00:54:01.064790 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Aug 13 00:54:01.064805 kernel: Console: switching to colour frame buffer device 128x48 Aug 13 00:54:01.064823 kernel: fb0: EFI VGA frame buffer device Aug 13 00:54:01.064838 kernel: pstore: Registered efi as persistent store backend Aug 13 00:54:01.064853 kernel: NET: Registered PF_INET6 protocol family Aug 13 00:54:01.064867 kernel: Segment Routing with IPv6 Aug 13 00:54:01.064881 kernel: In-situ OAM (IOAM) with IPv6 Aug 13 00:54:01.064896 kernel: NET: Registered PF_PACKET protocol family Aug 13 00:54:01.064911 kernel: Key type dns_resolver registered Aug 13 00:54:01.064925 kernel: IPI shorthand broadcast: enabled Aug 13 00:54:01.064942 kernel: sched_clock: Marking stable (810556700, 24806700)->(1039639500, -204276100) Aug 13 00:54:01.064956 kernel: registered taskstats version 1 Aug 13 00:54:01.064974 kernel: Loading compiled-in X.509 certificates Aug 13 00:54:01.064989 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.189-flatcar: 1d5a64b5798e654719a8bd91d683e7e9894bd433' Aug 13 00:54:01.065003 kernel: Key type .fscrypt registered Aug 13 00:54:01.065017 kernel: Key type fscrypt-provisioning registered Aug 13 00:54:01.065032 kernel: pstore: Using crash dump compression: deflate Aug 13 00:54:01.065047 kernel: ima: No TPM chip found, activating TPM-bypass! Aug 13 00:54:01.065059 kernel: ima: Allocated hash algorithm: sha1 Aug 13 00:54:01.065071 kernel: ima: No architecture policies found Aug 13 00:54:01.065085 kernel: clk: Disabling unused clocks Aug 13 00:54:01.065096 kernel: Freeing unused kernel image (initmem) memory: 47488K Aug 13 00:54:01.065108 kernel: Write protecting the kernel read-only data: 28672k Aug 13 00:54:01.065119 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Aug 13 00:54:01.065131 kernel: Freeing unused kernel image (rodata/data gap) memory: 604K Aug 13 00:54:01.065143 kernel: Run /init as init process Aug 13 00:54:01.065156 kernel: with arguments: Aug 13 00:54:01.065170 kernel: /init Aug 13 00:54:01.065199 kernel: with environment: Aug 13 00:54:01.065215 kernel: HOME=/ Aug 13 00:54:01.065228 kernel: TERM=linux Aug 13 00:54:01.065240 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Aug 13 00:54:01.065256 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Aug 13 00:54:01.065271 systemd[1]: Detected virtualization microsoft. Aug 13 00:54:01.065284 systemd[1]: Detected architecture x86-64. Aug 13 00:54:01.065296 systemd[1]: Running in initrd. Aug 13 00:54:01.065308 systemd[1]: No hostname configured, using default hostname. Aug 13 00:54:01.065323 systemd[1]: Hostname set to . Aug 13 00:54:01.065337 systemd[1]: Initializing machine ID from random generator. Aug 13 00:54:01.065350 systemd[1]: Queued start job for default target initrd.target. Aug 13 00:54:01.065363 systemd[1]: Started systemd-ask-password-console.path. Aug 13 00:54:01.065375 systemd[1]: Reached target cryptsetup.target. Aug 13 00:54:01.065388 systemd[1]: Reached target paths.target. Aug 13 00:54:01.065401 systemd[1]: Reached target slices.target. Aug 13 00:54:01.065413 systemd[1]: Reached target swap.target. Aug 13 00:54:01.065429 systemd[1]: Reached target timers.target. Aug 13 00:54:01.065444 systemd[1]: Listening on iscsid.socket. Aug 13 00:54:01.065457 systemd[1]: Listening on iscsiuio.socket. Aug 13 00:54:01.065470 systemd[1]: Listening on systemd-journald-audit.socket. Aug 13 00:54:01.065484 systemd[1]: Listening on systemd-journald-dev-log.socket. Aug 13 00:54:01.065497 systemd[1]: Listening on systemd-journald.socket. Aug 13 00:54:01.065511 systemd[1]: Listening on systemd-networkd.socket. Aug 13 00:54:01.065523 systemd[1]: Listening on systemd-udevd-control.socket. Aug 13 00:54:01.065539 systemd[1]: Listening on systemd-udevd-kernel.socket. Aug 13 00:54:01.065552 systemd[1]: Reached target sockets.target. Aug 13 00:54:01.065565 systemd[1]: Starting kmod-static-nodes.service... Aug 13 00:54:01.065577 systemd[1]: Finished network-cleanup.service. Aug 13 00:54:01.065591 systemd[1]: Starting systemd-fsck-usr.service... Aug 13 00:54:01.065604 systemd[1]: Starting systemd-journald.service... Aug 13 00:54:01.065618 systemd[1]: Starting systemd-modules-load.service... Aug 13 00:54:01.065631 systemd[1]: Starting systemd-resolved.service... Aug 13 00:54:01.065645 systemd[1]: Starting systemd-vconsole-setup.service... Aug 13 00:54:01.065668 systemd-journald[183]: Journal started Aug 13 00:54:01.065744 systemd-journald[183]: Runtime Journal (/run/log/journal/5a4a32f164304e06b59e68c27c38f90d) is 8.0M, max 159.0M, 151.0M free. Aug 13 00:54:01.059227 systemd-modules-load[184]: Inserted module 'overlay' Aug 13 00:54:01.078203 systemd[1]: Started systemd-journald.service. Aug 13 00:54:01.081000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:01.093803 systemd[1]: Finished kmod-static-nodes.service. Aug 13 00:54:01.111086 kernel: audit: type=1130 audit(1755046441.081:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:01.111115 kernel: audit: type=1130 audit(1755046441.096:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:01.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:01.096592 systemd[1]: Finished systemd-fsck-usr.service. Aug 13 00:54:01.112542 systemd[1]: Finished systemd-vconsole-setup.service. Aug 13 00:54:01.119277 systemd[1]: Starting dracut-cmdline-ask.service... Aug 13 00:54:01.123072 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Aug 13 00:54:01.133973 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Aug 13 00:54:01.112000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:01.150999 systemd-resolved[185]: Positive Trust Anchors: Aug 13 00:54:01.226921 kernel: audit: type=1130 audit(1755046441.112:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:01.226953 kernel: audit: type=1130 audit(1755046441.116:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:01.226970 kernel: audit: type=1130 audit(1755046441.133:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:01.226987 kernel: audit: type=1130 audit(1755046441.188:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:01.227004 kernel: audit: type=1130 audit(1755046441.201:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:01.227020 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Aug 13 00:54:01.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:01.133000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:01.188000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:01.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:01.151199 systemd-resolved[185]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Aug 13 00:54:01.151235 systemd-resolved[185]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Aug 13 00:54:01.153935 systemd-resolved[185]: Defaulting to hostname 'linux'. Aug 13 00:54:01.154819 systemd[1]: Started systemd-resolved.service. Aug 13 00:54:01.255435 kernel: Bridge firewalling registered Aug 13 00:54:01.189121 systemd[1]: Finished dracut-cmdline-ask.service. Aug 13 00:54:01.201948 systemd[1]: Reached target nss-lookup.target. Aug 13 00:54:01.224873 systemd[1]: Starting dracut-cmdline.service... Aug 13 00:54:01.255065 systemd-modules-load[184]: Inserted module 'br_netfilter' Aug 13 00:54:01.277810 dracut-cmdline[199]: dracut-dracut-053 Aug 13 00:54:01.280655 dracut-cmdline[199]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=8f8aacd9fbcdd713563d390e899e90bedf5577e4b1b261b4e57687d87edd6b57 Aug 13 00:54:01.300203 kernel: SCSI subsystem initialized Aug 13 00:54:01.326218 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Aug 13 00:54:01.326294 kernel: device-mapper: uevent: version 1.0.3 Aug 13 00:54:01.330208 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Aug 13 00:54:01.336250 systemd-modules-load[184]: Inserted module 'dm_multipath' Aug 13 00:54:01.359254 kernel: audit: type=1130 audit(1755046441.341:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:01.341000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:01.339437 systemd[1]: Finished systemd-modules-load.service. Aug 13 00:54:01.343058 systemd[1]: Starting systemd-sysctl.service... Aug 13 00:54:01.368833 kernel: Loading iSCSI transport class v2.0-870. Aug 13 00:54:01.370398 systemd[1]: Finished systemd-sysctl.service. Aug 13 00:54:01.387315 kernel: audit: type=1130 audit(1755046441.370:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:01.370000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:01.400209 kernel: iscsi: registered transport (tcp) Aug 13 00:54:01.427909 kernel: iscsi: registered transport (qla4xxx) Aug 13 00:54:01.427986 kernel: QLogic iSCSI HBA Driver Aug 13 00:54:01.457871 systemd[1]: Finished dracut-cmdline.service. Aug 13 00:54:01.460000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:01.461813 systemd[1]: Starting dracut-pre-udev.service... Aug 13 00:54:01.514208 kernel: raid6: avx512x4 gen() 18224 MB/s Aug 13 00:54:01.534201 kernel: raid6: avx512x4 xor() 8048 MB/s Aug 13 00:54:01.554195 kernel: raid6: avx512x2 gen() 18290 MB/s Aug 13 00:54:01.575196 kernel: raid6: avx512x2 xor() 29611 MB/s Aug 13 00:54:01.595192 kernel: raid6: avx512x1 gen() 18118 MB/s Aug 13 00:54:01.615194 kernel: raid6: avx512x1 xor() 26857 MB/s Aug 13 00:54:01.635194 kernel: raid6: avx2x4 gen() 18194 MB/s Aug 13 00:54:01.655192 kernel: raid6: avx2x4 xor() 7669 MB/s Aug 13 00:54:01.675191 kernel: raid6: avx2x2 gen() 18188 MB/s Aug 13 00:54:01.696194 kernel: raid6: avx2x2 xor() 22214 MB/s Aug 13 00:54:01.716192 kernel: raid6: avx2x1 gen() 13872 MB/s Aug 13 00:54:01.736191 kernel: raid6: avx2x1 xor() 19401 MB/s Aug 13 00:54:01.757195 kernel: raid6: sse2x4 gen() 11582 MB/s Aug 13 00:54:01.777191 kernel: raid6: sse2x4 xor() 7250 MB/s Aug 13 00:54:01.797192 kernel: raid6: sse2x2 gen() 12864 MB/s Aug 13 00:54:01.818198 kernel: raid6: sse2x2 xor() 7511 MB/s Aug 13 00:54:01.838193 kernel: raid6: sse2x1 gen() 11581 MB/s Aug 13 00:54:01.861175 kernel: raid6: sse2x1 xor() 5920 MB/s Aug 13 00:54:01.861213 kernel: raid6: using algorithm avx512x2 gen() 18290 MB/s Aug 13 00:54:01.861227 kernel: raid6: .... xor() 29611 MB/s, rmw enabled Aug 13 00:54:01.864626 kernel: raid6: using avx512x2 recovery algorithm Aug 13 00:54:01.885211 kernel: xor: automatically using best checksumming function avx Aug 13 00:54:01.983209 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Aug 13 00:54:01.991326 systemd[1]: Finished dracut-pre-udev.service. Aug 13 00:54:01.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:01.995000 audit: BPF prog-id=7 op=LOAD Aug 13 00:54:01.996000 audit: BPF prog-id=8 op=LOAD Aug 13 00:54:01.996899 systemd[1]: Starting systemd-udevd.service... Aug 13 00:54:02.012787 systemd-udevd[384]: Using default interface naming scheme 'v252'. Aug 13 00:54:02.020088 systemd[1]: Started systemd-udevd.service. Aug 13 00:54:02.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:02.029606 systemd[1]: Starting dracut-pre-trigger.service... Aug 13 00:54:02.042984 dracut-pre-trigger[395]: rd.md=0: removing MD RAID activation Aug 13 00:54:02.070673 systemd[1]: Finished dracut-pre-trigger.service. Aug 13 00:54:02.074680 systemd[1]: Starting systemd-udev-trigger.service... Aug 13 00:54:02.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:02.113467 systemd[1]: Finished systemd-udev-trigger.service. Aug 13 00:54:02.115000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:02.165204 kernel: cryptd: max_cpu_qlen set to 1000 Aug 13 00:54:02.192084 kernel: AVX2 version of gcm_enc/dec engaged. Aug 13 00:54:02.192154 kernel: AES CTR mode by8 optimization enabled Aug 13 00:54:02.202238 kernel: hv_vmbus: Vmbus version:5.2 Aug 13 00:54:02.210200 kernel: hv_vmbus: registering driver hyperv_keyboard Aug 13 00:54:02.221203 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Aug 13 00:54:02.237211 kernel: hid: raw HID events driver (C) Jiri Kosina Aug 13 00:54:02.245201 kernel: hv_vmbus: registering driver hid_hyperv Aug 13 00:54:02.257455 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Aug 13 00:54:02.257515 kernel: hid 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Aug 13 00:54:02.264208 kernel: hv_vmbus: registering driver hv_storvsc Aug 13 00:54:02.277204 kernel: hv_vmbus: registering driver hv_netvsc Aug 13 00:54:02.284662 kernel: scsi host1: storvsc_host_t Aug 13 00:54:02.284752 kernel: scsi host0: storvsc_host_t Aug 13 00:54:02.284952 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Aug 13 00:54:02.295242 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Aug 13 00:54:02.320003 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Aug 13 00:54:02.328558 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Aug 13 00:54:02.328582 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Aug 13 00:54:02.349668 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Aug 13 00:54:02.349808 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Aug 13 00:54:02.349914 kernel: sd 0:0:0:0: [sda] Write Protect is off Aug 13 00:54:02.350013 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Aug 13 00:54:02.350113 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Aug 13 00:54:02.350243 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Aug 13 00:54:02.350260 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Aug 13 00:54:02.452145 kernel: hv_netvsc 7ced8d3a-65e0-7ced-8d3a-65e07ced8d3a eth0: VF slot 1 added Aug 13 00:54:02.465436 kernel: hv_vmbus: registering driver hv_pci Aug 13 00:54:02.465495 kernel: hv_pci 85f3d509-2db9-4870-83b8-8c50fc000df4: PCI VMBus probing: Using version 0x10004 Aug 13 00:54:02.523945 kernel: hv_pci 85f3d509-2db9-4870-83b8-8c50fc000df4: PCI host bridge to bus 2db9:00 Aug 13 00:54:02.524130 kernel: pci_bus 2db9:00: root bus resource [mem 0xfe0000000-0xfe00fffff window] Aug 13 00:54:02.524341 kernel: pci_bus 2db9:00: No busn resource found for root bus, will use [bus 00-ff] Aug 13 00:54:02.524486 kernel: pci 2db9:00:02.0: [15b3:1016] type 00 class 0x020000 Aug 13 00:54:02.524658 kernel: pci 2db9:00:02.0: reg 0x10: [mem 0xfe0000000-0xfe00fffff 64bit pref] Aug 13 00:54:02.524818 kernel: pci 2db9:00:02.0: enabling Extended Tags Aug 13 00:54:02.524978 kernel: pci 2db9:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 2db9:00:02.0 (capable of 63.008 Gb/s with 8.0 GT/s PCIe x8 link) Aug 13 00:54:02.525134 kernel: pci_bus 2db9:00: busn_res: [bus 00-ff] end is updated to 00 Aug 13 00:54:02.525299 kernel: pci 2db9:00:02.0: BAR 0: assigned [mem 0xfe0000000-0xfe00fffff 64bit pref] Aug 13 00:54:02.618280 kernel: mlx5_core 2db9:00:02.0: enabling device (0000 -> 0002) Aug 13 00:54:02.869086 kernel: mlx5_core 2db9:00:02.0: firmware version: 14.30.5000 Aug 13 00:54:02.869295 kernel: mlx5_core 2db9:00:02.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Aug 13 00:54:02.869453 kernel: mlx5_core 2db9:00:02.0: Supported tc offload range - chains: 1, prios: 1 Aug 13 00:54:02.869607 kernel: mlx5_core 2db9:00:02.0: mlx5e_tc_post_act_init:40:(pid 16): firmware level support is missing Aug 13 00:54:02.869770 kernel: hv_netvsc 7ced8d3a-65e0-7ced-8d3a-65e07ced8d3a eth0: VF registering: eth1 Aug 13 00:54:02.869914 kernel: mlx5_core 2db9:00:02.0 eth1: joined to eth0 Aug 13 00:54:02.877241 kernel: mlx5_core 2db9:00:02.0 enP11705s1: renamed from eth1 Aug 13 00:54:03.070589 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Aug 13 00:54:03.108205 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/sda6 scanned by (udev-worker) (442) Aug 13 00:54:03.121842 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Aug 13 00:54:03.431203 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Aug 13 00:54:03.595357 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Aug 13 00:54:03.598806 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Aug 13 00:54:03.605844 systemd[1]: Starting disk-uuid.service... Aug 13 00:54:03.625198 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Aug 13 00:54:03.635211 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Aug 13 00:54:03.644210 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Aug 13 00:54:04.648856 disk-uuid[556]: The operation has completed successfully. Aug 13 00:54:04.651773 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Aug 13 00:54:04.733909 systemd[1]: disk-uuid.service: Deactivated successfully. Aug 13 00:54:04.734034 systemd[1]: Finished disk-uuid.service. Aug 13 00:54:04.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:04.738000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:04.745823 systemd[1]: Starting verity-setup.service... Aug 13 00:54:04.778212 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Aug 13 00:54:05.186288 systemd[1]: Found device dev-mapper-usr.device. Aug 13 00:54:05.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:05.188670 systemd[1]: Finished verity-setup.service. Aug 13 00:54:05.193412 systemd[1]: Mounting sysusr-usr.mount... Aug 13 00:54:05.272230 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Aug 13 00:54:05.272153 systemd[1]: Mounted sysusr-usr.mount. Aug 13 00:54:05.276285 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Aug 13 00:54:05.280885 systemd[1]: Starting ignition-setup.service... Aug 13 00:54:05.286281 systemd[1]: Starting parse-ip-for-networkd.service... Aug 13 00:54:05.309025 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Aug 13 00:54:05.309080 kernel: BTRFS info (device sda6): using free space tree Aug 13 00:54:05.309091 kernel: BTRFS info (device sda6): has skinny extents Aug 13 00:54:05.357882 systemd[1]: Finished parse-ip-for-networkd.service. Aug 13 00:54:05.368209 kernel: kauditd_printk_skb: 10 callbacks suppressed Aug 13 00:54:05.368252 kernel: audit: type=1130 audit(1755046445.360:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:05.360000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:05.367830 systemd[1]: Starting systemd-networkd.service... Aug 13 00:54:05.388821 kernel: audit: type=1334 audit(1755046445.362:22): prog-id=9 op=LOAD Aug 13 00:54:05.362000 audit: BPF prog-id=9 op=LOAD Aug 13 00:54:05.407686 systemd-networkd[820]: lo: Link UP Aug 13 00:54:05.407695 systemd-networkd[820]: lo: Gained carrier Aug 13 00:54:05.412113 systemd-networkd[820]: Enumeration completed Aug 13 00:54:05.412229 systemd[1]: Started systemd-networkd.service. Aug 13 00:54:05.434099 kernel: audit: type=1130 audit(1755046445.416:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:05.416000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:05.417338 systemd[1]: Reached target network.target. Aug 13 00:54:05.432081 systemd-networkd[820]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Aug 13 00:54:05.434631 systemd[1]: Starting iscsiuio.service... Aug 13 00:54:05.442393 systemd[1]: Started iscsiuio.service. Aug 13 00:54:05.447156 systemd[1]: Starting iscsid.service... Aug 13 00:54:05.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:05.461296 iscsid[828]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Aug 13 00:54:05.461296 iscsid[828]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Aug 13 00:54:05.461296 iscsid[828]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Aug 13 00:54:05.461296 iscsid[828]: If using hardware iscsi like qla4xxx this message can be ignored. Aug 13 00:54:05.461296 iscsid[828]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Aug 13 00:54:05.461296 iscsid[828]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Aug 13 00:54:05.495734 kernel: audit: type=1130 audit(1755046445.446:24): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:05.485820 systemd[1]: Started iscsid.service. Aug 13 00:54:05.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:05.513807 systemd[1]: Starting dracut-initqueue.service... Aug 13 00:54:05.518073 kernel: audit: type=1130 audit(1755046445.500:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:05.518825 systemd[1]: mnt-oem.mount: Deactivated successfully. Aug 13 00:54:05.523518 kernel: mlx5_core 2db9:00:02.0 enP11705s1: Link up Aug 13 00:54:05.527066 systemd[1]: Finished dracut-initqueue.service. Aug 13 00:54:05.529000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:05.529354 systemd[1]: Reached target remote-fs-pre.target. Aug 13 00:54:05.545382 kernel: audit: type=1130 audit(1755046445.529:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:05.545379 systemd[1]: Reached target remote-cryptsetup.target. Aug 13 00:54:05.550026 systemd[1]: Reached target remote-fs.target. Aug 13 00:54:05.561960 kernel: hv_netvsc 7ced8d3a-65e0-7ced-8d3a-65e07ced8d3a eth0: Data path switched to VF: enP11705s1 Aug 13 00:54:05.558049 systemd[1]: Starting dracut-pre-mount.service... Aug 13 00:54:05.564001 systemd-networkd[820]: enP11705s1: Link UP Aug 13 00:54:05.564099 systemd-networkd[820]: eth0: Link UP Aug 13 00:54:05.575311 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Aug 13 00:54:05.571331 systemd-networkd[820]: eth0: Gained carrier Aug 13 00:54:05.581683 systemd[1]: Finished dracut-pre-mount.service. Aug 13 00:54:05.598436 kernel: audit: type=1130 audit(1755046445.584:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:05.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:05.598411 systemd-networkd[820]: enP11705s1: Gained carrier Aug 13 00:54:05.631285 systemd-networkd[820]: eth0: DHCPv4 address 10.200.4.18/24, gateway 10.200.4.1 acquired from 168.63.129.16 Aug 13 00:54:05.664094 systemd[1]: Finished ignition-setup.service. Aug 13 00:54:05.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:05.669449 systemd[1]: Starting ignition-fetch-offline.service... Aug 13 00:54:05.686221 kernel: audit: type=1130 audit(1755046445.668:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:07.382378 systemd-networkd[820]: eth0: Gained IPv6LL Aug 13 00:54:12.346543 ignition[847]: Ignition 2.14.0 Aug 13 00:54:12.346561 ignition[847]: Stage: fetch-offline Aug 13 00:54:12.346661 ignition[847]: reading system config file "/usr/lib/ignition/base.d/base.ign" Aug 13 00:54:12.346714 ignition[847]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Aug 13 00:54:12.502767 ignition[847]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Aug 13 00:54:12.506447 ignition[847]: parsed url from cmdline: "" Aug 13 00:54:12.506459 ignition[847]: no config URL provided Aug 13 00:54:12.506472 ignition[847]: reading system config file "/usr/lib/ignition/user.ign" Aug 13 00:54:12.506500 ignition[847]: no config at "/usr/lib/ignition/user.ign" Aug 13 00:54:12.506512 ignition[847]: failed to fetch config: resource requires networking Aug 13 00:54:12.507437 ignition[847]: Ignition finished successfully Aug 13 00:54:12.518902 systemd[1]: Finished ignition-fetch-offline.service. Aug 13 00:54:12.523000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:12.533016 ignition[853]: Ignition 2.14.0 Aug 13 00:54:12.542849 kernel: audit: type=1130 audit(1755046452.523:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:12.524908 systemd[1]: Starting ignition-fetch.service... Aug 13 00:54:12.533022 ignition[853]: Stage: fetch Aug 13 00:54:12.533136 ignition[853]: reading system config file "/usr/lib/ignition/base.d/base.ign" Aug 13 00:54:12.533166 ignition[853]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Aug 13 00:54:12.550760 ignition[853]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Aug 13 00:54:12.553914 ignition[853]: parsed url from cmdline: "" Aug 13 00:54:12.553923 ignition[853]: no config URL provided Aug 13 00:54:12.553938 ignition[853]: reading system config file "/usr/lib/ignition/user.ign" Aug 13 00:54:12.553953 ignition[853]: no config at "/usr/lib/ignition/user.ign" Aug 13 00:54:12.553998 ignition[853]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Aug 13 00:54:12.659831 ignition[853]: GET result: OK Aug 13 00:54:12.659923 ignition[853]: config has been read from IMDS userdata Aug 13 00:54:12.659951 ignition[853]: parsing config with SHA512: 98a4d3546f2044b20b339e3c9db6136951df23708efcb0959aeefca628a080a6f0a8c25cff1981591085ce6c39504abb3e97121250ef65d2b1b8402d0a691cca Aug 13 00:54:12.663363 unknown[853]: fetched base config from "system" Aug 13 00:54:12.663845 ignition[853]: fetch: fetch complete Aug 13 00:54:12.663373 unknown[853]: fetched base config from "system" Aug 13 00:54:12.663852 ignition[853]: fetch: fetch passed Aug 13 00:54:12.663380 unknown[853]: fetched user config from "azure" Aug 13 00:54:12.663905 ignition[853]: Ignition finished successfully Aug 13 00:54:12.665813 systemd[1]: Finished ignition-fetch.service. Aug 13 00:54:12.680000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:12.682150 systemd[1]: Starting ignition-kargs.service... Aug 13 00:54:12.698818 kernel: audit: type=1130 audit(1755046452.680:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:12.704939 ignition[859]: Ignition 2.14.0 Aug 13 00:54:12.704949 ignition[859]: Stage: kargs Aug 13 00:54:12.705089 ignition[859]: reading system config file "/usr/lib/ignition/base.d/base.ign" Aug 13 00:54:12.705123 ignition[859]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Aug 13 00:54:12.712620 systemd[1]: Finished ignition-kargs.service. Aug 13 00:54:12.714000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:12.709646 ignition[859]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Aug 13 00:54:12.732969 kernel: audit: type=1130 audit(1755046452.714:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:12.715782 systemd[1]: Starting ignition-disks.service... Aug 13 00:54:12.711320 ignition[859]: kargs: kargs passed Aug 13 00:54:12.711378 ignition[859]: Ignition finished successfully Aug 13 00:54:12.738348 ignition[865]: Ignition 2.14.0 Aug 13 00:54:12.738354 ignition[865]: Stage: disks Aug 13 00:54:12.738474 ignition[865]: reading system config file "/usr/lib/ignition/base.d/base.ign" Aug 13 00:54:12.738500 ignition[865]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Aug 13 00:54:12.745618 systemd[1]: Finished ignition-disks.service. Aug 13 00:54:12.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:12.743356 ignition[865]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Aug 13 00:54:12.768998 kernel: audit: type=1130 audit(1755046452.748:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:12.748750 systemd[1]: Reached target initrd-root-device.target. Aug 13 00:54:12.744728 ignition[865]: disks: disks passed Aug 13 00:54:12.763855 systemd[1]: Reached target local-fs-pre.target. Aug 13 00:54:12.744785 ignition[865]: Ignition finished successfully Aug 13 00:54:12.768983 systemd[1]: Reached target local-fs.target. Aug 13 00:54:12.771279 systemd[1]: Reached target sysinit.target. Aug 13 00:54:12.775747 systemd[1]: Reached target basic.target. Aug 13 00:54:12.778756 systemd[1]: Starting systemd-fsck-root.service... Aug 13 00:54:12.846651 systemd-fsck[873]: ROOT: clean, 629/7326000 files, 481083/7359488 blocks Aug 13 00:54:12.851150 systemd[1]: Finished systemd-fsck-root.service. Aug 13 00:54:12.855000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:12.869153 systemd[1]: Mounting sysroot.mount... Aug 13 00:54:12.871463 kernel: audit: type=1130 audit(1755046452.855:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:12.889206 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Aug 13 00:54:12.889218 systemd[1]: Mounted sysroot.mount. Aug 13 00:54:12.892949 systemd[1]: Reached target initrd-root-fs.target. Aug 13 00:54:12.950316 systemd[1]: Mounting sysroot-usr.mount... Aug 13 00:54:12.956591 systemd[1]: Starting flatcar-metadata-hostname.service... Aug 13 00:54:12.961668 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Aug 13 00:54:12.961710 systemd[1]: Reached target ignition-diskful.target. Aug 13 00:54:12.969772 systemd[1]: Mounted sysroot-usr.mount. Aug 13 00:54:13.089815 systemd[1]: Mounting sysroot-usr-share-oem.mount... Aug 13 00:54:13.096068 systemd[1]: Starting initrd-setup-root.service... Aug 13 00:54:13.116214 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/sda6 scanned by mount (884) Aug 13 00:54:13.116268 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Aug 13 00:54:13.124995 kernel: BTRFS info (device sda6): using free space tree Aug 13 00:54:13.125020 kernel: BTRFS info (device sda6): has skinny extents Aug 13 00:54:13.132352 initrd-setup-root[889]: cut: /sysroot/etc/passwd: No such file or directory Aug 13 00:54:13.139855 systemd[1]: Mounted sysroot-usr-share-oem.mount. Aug 13 00:54:13.172111 initrd-setup-root[915]: cut: /sysroot/etc/group: No such file or directory Aug 13 00:54:13.216547 initrd-setup-root[923]: cut: /sysroot/etc/shadow: No such file or directory Aug 13 00:54:13.255885 initrd-setup-root[931]: cut: /sysroot/etc/gshadow: No such file or directory Aug 13 00:54:14.216888 systemd[1]: Finished initrd-setup-root.service. Aug 13 00:54:14.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:14.242472 kernel: audit: type=1130 audit(1755046454.219:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:14.234711 systemd[1]: Starting ignition-mount.service... Aug 13 00:54:14.238148 systemd[1]: Starting sysroot-boot.service... Aug 13 00:54:14.246889 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Aug 13 00:54:14.247005 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Aug 13 00:54:14.270630 ignition[951]: INFO : Ignition 2.14.0 Aug 13 00:54:14.272281 systemd[1]: Finished sysroot-boot.service. Aug 13 00:54:14.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:14.281113 ignition[951]: INFO : Stage: mount Aug 13 00:54:14.281113 ignition[951]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Aug 13 00:54:14.281113 ignition[951]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Aug 13 00:54:14.281113 ignition[951]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Aug 13 00:54:14.292155 kernel: audit: type=1130 audit(1755046454.277:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:14.292193 ignition[951]: INFO : mount: mount passed Aug 13 00:54:14.292193 ignition[951]: INFO : Ignition finished successfully Aug 13 00:54:14.284788 systemd[1]: Finished ignition-mount.service. Aug 13 00:54:14.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:14.325210 kernel: audit: type=1130 audit(1755046454.312:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:16.178021 coreos-metadata[883]: Aug 13 00:54:16.177 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Aug 13 00:54:16.215700 coreos-metadata[883]: Aug 13 00:54:16.215 INFO Fetch successful Aug 13 00:54:16.251495 coreos-metadata[883]: Aug 13 00:54:16.251 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Aug 13 00:54:16.260230 coreos-metadata[883]: Aug 13 00:54:16.260 INFO Fetch successful Aug 13 00:54:16.297271 coreos-metadata[883]: Aug 13 00:54:16.297 INFO wrote hostname ci-3510.3.8-a-e88d8da36a to /sysroot/etc/hostname Aug 13 00:54:16.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:16.299539 systemd[1]: Finished flatcar-metadata-hostname.service. Aug 13 00:54:16.322541 kernel: audit: type=1130 audit(1755046456.304:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:16.305856 systemd[1]: Starting ignition-files.service... Aug 13 00:54:16.326078 systemd[1]: Mounting sysroot-usr-share-oem.mount... Aug 13 00:54:16.374209 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by mount (963) Aug 13 00:54:16.384470 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Aug 13 00:54:16.384530 kernel: BTRFS info (device sda6): using free space tree Aug 13 00:54:16.384544 kernel: BTRFS info (device sda6): has skinny extents Aug 13 00:54:16.396547 systemd[1]: Mounted sysroot-usr-share-oem.mount. Aug 13 00:54:16.410977 ignition[982]: INFO : Ignition 2.14.0 Aug 13 00:54:16.410977 ignition[982]: INFO : Stage: files Aug 13 00:54:16.415125 ignition[982]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Aug 13 00:54:16.415125 ignition[982]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Aug 13 00:54:16.425538 ignition[982]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Aug 13 00:54:16.431344 ignition[982]: DEBUG : files: compiled without relabeling support, skipping Aug 13 00:54:16.431344 ignition[982]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Aug 13 00:54:16.431344 ignition[982]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Aug 13 00:54:16.496676 ignition[982]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Aug 13 00:54:16.501242 ignition[982]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Aug 13 00:54:16.501242 ignition[982]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Aug 13 00:54:16.499923 unknown[982]: wrote ssh authorized keys file for user: core Aug 13 00:54:16.511517 ignition[982]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Aug 13 00:54:16.511517 ignition[982]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Aug 13 00:54:16.535772 ignition[982]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Aug 13 00:54:16.541256 ignition[982]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Aug 13 00:54:16.541256 ignition[982]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Aug 13 00:54:16.541256 ignition[982]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Aug 13 00:54:16.541256 ignition[982]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Aug 13 00:54:16.541256 ignition[982]: INFO : files: createFilesystemsFiles: createFiles: op(6): oem config not found in "/usr/share/oem", looking on oem partition Aug 13 00:54:16.571267 ignition[982]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1341184883" Aug 13 00:54:16.571267 ignition[982]: CRITICAL : files: createFilesystemsFiles: createFiles: op(6): op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1341184883": device or resource busy Aug 13 00:54:16.571267 ignition[982]: ERROR : files: createFilesystemsFiles: createFiles: op(6): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1341184883", trying btrfs: device or resource busy Aug 13 00:54:16.571267 ignition[982]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1341184883" Aug 13 00:54:16.571267 ignition[982]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1341184883" Aug 13 00:54:16.571267 ignition[982]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [started] unmounting "/mnt/oem1341184883" Aug 13 00:54:16.571267 ignition[982]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [finished] unmounting "/mnt/oem1341184883" Aug 13 00:54:16.571267 ignition[982]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Aug 13 00:54:16.571267 ignition[982]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Aug 13 00:54:16.571267 ignition[982]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Aug 13 00:54:16.571267 ignition[982]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2469855996" Aug 13 00:54:16.571267 ignition[982]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2469855996": device or resource busy Aug 13 00:54:16.571267 ignition[982]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2469855996", trying btrfs: device or resource busy Aug 13 00:54:16.571267 ignition[982]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2469855996" Aug 13 00:54:16.552611 systemd[1]: mnt-oem1341184883.mount: Deactivated successfully. Aug 13 00:54:16.652813 ignition[982]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2469855996" Aug 13 00:54:16.652813 ignition[982]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem2469855996" Aug 13 00:54:16.652813 ignition[982]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem2469855996" Aug 13 00:54:16.652813 ignition[982]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Aug 13 00:54:16.652813 ignition[982]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Aug 13 00:54:16.652813 ignition[982]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET https://extensions.flatcar.org/extensions/kubernetes-v1.32.4-x86-64.raw: attempt #1 Aug 13 00:54:16.924071 ignition[982]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET result: OK Aug 13 00:54:17.100065 ignition[982]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Aug 13 00:54:17.100065 ignition[982]: INFO : files: op(f): [started] processing unit "nvidia.service" Aug 13 00:54:17.100065 ignition[982]: INFO : files: op(f): [finished] processing unit "nvidia.service" Aug 13 00:54:17.112410 ignition[982]: INFO : files: op(10): [started] processing unit "waagent.service" Aug 13 00:54:17.112410 ignition[982]: INFO : files: op(10): [finished] processing unit "waagent.service" Aug 13 00:54:17.112410 ignition[982]: INFO : files: op(11): [started] setting preset to enabled for "nvidia.service" Aug 13 00:54:17.112410 ignition[982]: INFO : files: op(11): [finished] setting preset to enabled for "nvidia.service" Aug 13 00:54:17.112410 ignition[982]: INFO : files: op(12): [started] setting preset to enabled for "waagent.service" Aug 13 00:54:17.112410 ignition[982]: INFO : files: op(12): [finished] setting preset to enabled for "waagent.service" Aug 13 00:54:17.134037 ignition[982]: INFO : files: createResultFile: createFiles: op(13): [started] writing file "/sysroot/etc/.ignition-result.json" Aug 13 00:54:17.134037 ignition[982]: INFO : files: createResultFile: createFiles: op(13): [finished] writing file "/sysroot/etc/.ignition-result.json" Aug 13 00:54:17.134037 ignition[982]: INFO : files: files passed Aug 13 00:54:17.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:17.158151 ignition[982]: INFO : Ignition finished successfully Aug 13 00:54:17.164112 kernel: audit: type=1130 audit(1755046457.145:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:17.142118 systemd[1]: Finished ignition-files.service. Aug 13 00:54:17.159992 systemd[1]: Starting initrd-setup-root-after-ignition.service... Aug 13 00:54:17.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:17.173000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:17.164297 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Aug 13 00:54:17.165409 systemd[1]: Starting ignition-quench.service... Aug 13 00:54:17.168805 systemd[1]: ignition-quench.service: Deactivated successfully. Aug 13 00:54:17.168896 systemd[1]: Finished ignition-quench.service. Aug 13 00:54:17.247640 initrd-setup-root-after-ignition[1007]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Aug 13 00:54:17.252689 systemd[1]: Finished initrd-setup-root-after-ignition.service. Aug 13 00:54:17.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:17.255703 systemd[1]: Reached target ignition-complete.target. Aug 13 00:54:17.261778 systemd[1]: Starting initrd-parse-etc.service... Aug 13 00:54:17.278980 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Aug 13 00:54:17.279103 systemd[1]: Finished initrd-parse-etc.service. Aug 13 00:54:17.285000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:17.285000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:17.286279 systemd[1]: Reached target initrd-fs.target. Aug 13 00:54:17.290771 systemd[1]: Reached target initrd.target. Aug 13 00:54:17.294946 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Aug 13 00:54:17.299436 systemd[1]: Starting dracut-pre-pivot.service... Aug 13 00:54:17.310581 systemd[1]: Finished dracut-pre-pivot.service. Aug 13 00:54:17.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:17.313769 systemd[1]: Starting initrd-cleanup.service... Aug 13 00:54:17.326126 systemd[1]: Stopped target nss-lookup.target. Aug 13 00:54:17.330880 systemd[1]: Stopped target remote-cryptsetup.target. Aug 13 00:54:17.333397 systemd[1]: Stopped target timers.target. Aug 13 00:54:17.337956 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Aug 13 00:54:17.342000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:17.338120 systemd[1]: Stopped dracut-pre-pivot.service. Aug 13 00:54:17.342540 systemd[1]: Stopped target initrd.target. Aug 13 00:54:17.347374 systemd[1]: Stopped target basic.target. Aug 13 00:54:17.355247 systemd[1]: Stopped target ignition-complete.target. Aug 13 00:54:17.360396 systemd[1]: Stopped target ignition-diskful.target. Aug 13 00:54:17.365272 systemd[1]: Stopped target initrd-root-device.target. Aug 13 00:54:17.365000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:17.365000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:17.365000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:17.365000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:17.365000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:17.406621 iscsid[828]: iscsid shutting down. Aug 13 00:54:17.413000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:17.365472 systemd[1]: Stopped target remote-fs.target. Aug 13 00:54:17.419517 ignition[1020]: INFO : Ignition 2.14.0 Aug 13 00:54:17.419517 ignition[1020]: INFO : Stage: umount Aug 13 00:54:17.419517 ignition[1020]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Aug 13 00:54:17.419517 ignition[1020]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Aug 13 00:54:17.419517 ignition[1020]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Aug 13 00:54:17.424000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:17.429000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:17.435000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:17.365928 systemd[1]: Stopped target remote-fs-pre.target. Aug 13 00:54:17.443002 ignition[1020]: INFO : umount: umount passed Aug 13 00:54:17.443002 ignition[1020]: INFO : Ignition finished successfully Aug 13 00:54:17.366397 systemd[1]: Stopped target sysinit.target. Aug 13 00:54:17.366840 systemd[1]: Stopped target local-fs.target. Aug 13 00:54:17.367283 systemd[1]: Stopped target local-fs-pre.target. Aug 13 00:54:17.367730 systemd[1]: Stopped target swap.target. Aug 13 00:54:17.368278 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Aug 13 00:54:17.368423 systemd[1]: Stopped dracut-pre-mount.service. Aug 13 00:54:17.368868 systemd[1]: Stopped target cryptsetup.target. Aug 13 00:54:17.369160 systemd[1]: dracut-initqueue.service: Deactivated successfully. Aug 13 00:54:17.369290 systemd[1]: Stopped dracut-initqueue.service. Aug 13 00:54:17.369727 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Aug 13 00:54:17.369847 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Aug 13 00:54:17.370121 systemd[1]: ignition-files.service: Deactivated successfully. Aug 13 00:54:17.370244 systemd[1]: Stopped ignition-files.service. Aug 13 00:54:17.370582 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Aug 13 00:54:17.370694 systemd[1]: Stopped flatcar-metadata-hostname.service. Aug 13 00:54:17.372070 systemd[1]: Stopping ignition-mount.service... Aug 13 00:54:17.375036 systemd[1]: Stopping iscsid.service... Aug 13 00:54:17.402729 systemd[1]: Stopping sysroot-boot.service... Aug 13 00:54:17.452000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:17.452000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:17.452000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:17.452000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:17.404647 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Aug 13 00:54:17.405105 systemd[1]: Stopped systemd-udev-trigger.service. Aug 13 00:54:17.413961 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Aug 13 00:54:17.414110 systemd[1]: Stopped dracut-pre-trigger.service. Aug 13 00:54:17.427113 systemd[1]: iscsid.service: Deactivated successfully. Aug 13 00:54:17.529000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:17.427253 systemd[1]: Stopped iscsid.service. Aug 13 00:54:17.550984 kernel: kauditd_printk_skb: 20 callbacks suppressed Aug 13 00:54:17.551021 kernel: audit: type=1131 audit(1755046457.529:59): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:17.429835 systemd[1]: ignition-mount.service: Deactivated successfully. Aug 13 00:54:17.429936 systemd[1]: Stopped ignition-mount.service. Aug 13 00:54:17.555000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:17.436329 systemd[1]: ignition-disks.service: Deactivated successfully. Aug 13 00:54:17.573985 kernel: audit: type=1131 audit(1755046457.555:60): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:17.436437 systemd[1]: Stopped ignition-disks.service. Aug 13 00:54:17.573000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:17.455263 systemd[1]: ignition-kargs.service: Deactivated successfully. Aug 13 00:54:17.605587 kernel: audit: type=1130 audit(1755046457.573:61): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:17.605623 kernel: audit: type=1131 audit(1755046457.573:62): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:17.573000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:17.455322 systemd[1]: Stopped ignition-kargs.service. Aug 13 00:54:17.455628 systemd[1]: ignition-fetch.service: Deactivated successfully. Aug 13 00:54:17.455661 systemd[1]: Stopped ignition-fetch.service. Aug 13 00:54:17.456111 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Aug 13 00:54:17.638770 kernel: audit: type=1131 audit(1755046457.619:63): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:17.619000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:17.456143 systemd[1]: Stopped ignition-fetch-offline.service. Aug 13 00:54:17.638000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:17.456567 systemd[1]: Stopped target paths.target. Aug 13 00:54:17.656623 kernel: audit: type=1131 audit(1755046457.638:64): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:17.456975 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Aug 13 00:54:17.462229 systemd[1]: Stopped systemd-ask-password-console.path. Aug 13 00:54:17.513746 systemd[1]: Stopped target slices.target. Aug 13 00:54:17.518639 systemd[1]: Stopped target sockets.target. Aug 13 00:54:17.520749 systemd[1]: iscsid.socket: Deactivated successfully. Aug 13 00:54:17.520803 systemd[1]: Closed iscsid.socket. Aug 13 00:54:17.524663 systemd[1]: ignition-setup.service: Deactivated successfully. Aug 13 00:54:17.674000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:17.524726 systemd[1]: Stopped ignition-setup.service. Aug 13 00:54:17.704526 kernel: audit: type=1131 audit(1755046457.674:65): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:17.704574 kernel: audit: type=1131 audit(1755046457.690:66): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:17.690000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:17.704000 audit: BPF prog-id=6 op=UNLOAD Aug 13 00:54:17.530361 systemd[1]: Stopping iscsiuio.service... Aug 13 00:54:17.711139 kernel: audit: type=1334 audit(1755046457.704:67): prog-id=6 op=UNLOAD Aug 13 00:54:17.552204 systemd[1]: sysroot-boot.mount: Deactivated successfully. Aug 13 00:54:17.552785 systemd[1]: iscsiuio.service: Deactivated successfully. Aug 13 00:54:17.730280 kernel: audit: type=1131 audit(1755046457.716:68): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:17.716000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:17.552898 systemd[1]: Stopped iscsiuio.service. Aug 13 00:54:17.556091 systemd[1]: initrd-cleanup.service: Deactivated successfully. Aug 13 00:54:17.567756 systemd[1]: Finished initrd-cleanup.service. Aug 13 00:54:17.574871 systemd[1]: Stopped target network.target. Aug 13 00:54:17.601134 systemd[1]: iscsiuio.socket: Deactivated successfully. Aug 13 00:54:17.601195 systemd[1]: Closed iscsiuio.socket. Aug 13 00:54:17.605902 systemd[1]: Stopping systemd-networkd.service... Aug 13 00:54:17.609953 systemd[1]: Stopping systemd-resolved.service... Aug 13 00:54:17.615242 systemd-networkd[820]: eth0: DHCPv6 lease lost Aug 13 00:54:17.734000 audit: BPF prog-id=9 op=UNLOAD Aug 13 00:54:17.617171 systemd[1]: systemd-resolved.service: Deactivated successfully. Aug 13 00:54:17.617296 systemd[1]: Stopped systemd-resolved.service. Aug 13 00:54:17.620271 systemd[1]: systemd-networkd.service: Deactivated successfully. Aug 13 00:54:17.620368 systemd[1]: Stopped systemd-networkd.service. Aug 13 00:54:17.651116 systemd[1]: systemd-networkd.socket: Deactivated successfully. Aug 13 00:54:17.651192 systemd[1]: Closed systemd-networkd.socket. Aug 13 00:54:17.664490 systemd[1]: Stopping network-cleanup.service... Aug 13 00:54:17.670201 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Aug 13 00:54:17.670278 systemd[1]: Stopped parse-ip-for-networkd.service. Aug 13 00:54:17.674531 systemd[1]: systemd-sysctl.service: Deactivated successfully. Aug 13 00:54:17.674584 systemd[1]: Stopped systemd-sysctl.service. Aug 13 00:54:17.690609 systemd[1]: systemd-modules-load.service: Deactivated successfully. Aug 13 00:54:17.690656 systemd[1]: Stopped systemd-modules-load.service. Aug 13 00:54:17.728754 systemd[1]: Stopping systemd-udevd.service... Aug 13 00:54:17.780929 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Aug 13 00:54:17.784849 systemd[1]: systemd-udevd.service: Deactivated successfully. Aug 13 00:54:17.787475 systemd[1]: Stopped systemd-udevd.service. Aug 13 00:54:17.791000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:17.793196 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Aug 13 00:54:17.793282 systemd[1]: Closed systemd-udevd-control.socket. Aug 13 00:54:17.798623 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Aug 13 00:54:17.803370 systemd[1]: Closed systemd-udevd-kernel.socket. Aug 13 00:54:17.808147 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Aug 13 00:54:17.808226 systemd[1]: Stopped dracut-pre-udev.service. Aug 13 00:54:17.815000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:17.815445 systemd[1]: dracut-cmdline.service: Deactivated successfully. Aug 13 00:54:17.815504 systemd[1]: Stopped dracut-cmdline.service. Aug 13 00:54:17.820000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:17.824000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:17.820234 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Aug 13 00:54:17.820287 systemd[1]: Stopped dracut-cmdline-ask.service. Aug 13 00:54:17.825757 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Aug 13 00:54:17.848268 kernel: hv_netvsc 7ced8d3a-65e0-7ced-8d3a-65e07ced8d3a eth0: Data path switched from VF: enP11705s1 Aug 13 00:54:17.848000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:17.835429 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Aug 13 00:54:17.853000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:17.835497 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Aug 13 00:54:17.848450 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Aug 13 00:54:17.848511 systemd[1]: Stopped kmod-static-nodes.service. Aug 13 00:54:17.853951 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Aug 13 00:54:17.854013 systemd[1]: Stopped systemd-vconsole-setup.service. Aug 13 00:54:17.867000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:17.868887 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Aug 13 00:54:17.869485 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Aug 13 00:54:17.875000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:17.875000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:17.869581 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Aug 13 00:54:17.885102 systemd[1]: network-cleanup.service: Deactivated successfully. Aug 13 00:54:17.887900 systemd[1]: Stopped network-cleanup.service. Aug 13 00:54:17.892000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:18.065356 systemd[1]: sysroot-boot.service: Deactivated successfully. Aug 13 00:54:18.065498 systemd[1]: Stopped sysroot-boot.service. Aug 13 00:54:18.072000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:18.072571 systemd[1]: Reached target initrd-switch-root.target. Aug 13 00:54:18.077862 systemd[1]: initrd-setup-root.service: Deactivated successfully. Aug 13 00:54:18.077949 systemd[1]: Stopped initrd-setup-root.service. Aug 13 00:54:18.082000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:18.083613 systemd[1]: Starting initrd-switch-root.service... Aug 13 00:54:18.097381 systemd[1]: Switching root. Aug 13 00:54:18.121566 systemd-journald[183]: Journal stopped Aug 13 00:54:46.322564 systemd-journald[183]: Received SIGTERM from PID 1 (systemd). Aug 13 00:54:46.322594 kernel: SELinux: Class mctp_socket not defined in policy. Aug 13 00:54:46.322607 kernel: SELinux: Class anon_inode not defined in policy. Aug 13 00:54:46.322618 kernel: SELinux: the above unknown classes and permissions will be allowed Aug 13 00:54:46.322627 kernel: SELinux: policy capability network_peer_controls=1 Aug 13 00:54:46.322637 kernel: SELinux: policy capability open_perms=1 Aug 13 00:54:46.322649 kernel: SELinux: policy capability extended_socket_class=1 Aug 13 00:54:46.322661 kernel: SELinux: policy capability always_check_network=0 Aug 13 00:54:46.322669 kernel: SELinux: policy capability cgroup_seclabel=1 Aug 13 00:54:46.322679 kernel: SELinux: policy capability nnp_nosuid_transition=1 Aug 13 00:54:46.322689 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Aug 13 00:54:46.322697 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Aug 13 00:54:46.322706 systemd[1]: Successfully loaded SELinux policy in 527.653ms. Aug 13 00:54:46.322718 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 48.363ms. Aug 13 00:54:46.322735 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Aug 13 00:54:46.322745 systemd[1]: Detected virtualization microsoft. Aug 13 00:54:46.322754 systemd[1]: Detected architecture x86-64. Aug 13 00:54:46.322763 systemd[1]: Detected first boot. Aug 13 00:54:46.322778 systemd[1]: Hostname set to . Aug 13 00:54:46.322789 systemd[1]: Initializing machine ID from random generator. Aug 13 00:54:46.322799 kernel: kauditd_printk_skb: 14 callbacks suppressed Aug 13 00:54:46.322809 kernel: audit: type=1400 audit(1755046463.793:83): avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Aug 13 00:54:46.322820 kernel: audit: type=1400 audit(1755046463.828:84): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Aug 13 00:54:46.322832 kernel: audit: type=1400 audit(1755046463.828:85): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Aug 13 00:54:46.322845 kernel: audit: type=1334 audit(1755046463.841:86): prog-id=10 op=LOAD Aug 13 00:54:46.322854 kernel: audit: type=1334 audit(1755046463.841:87): prog-id=10 op=UNLOAD Aug 13 00:54:46.322863 kernel: audit: type=1334 audit(1755046463.854:88): prog-id=11 op=LOAD Aug 13 00:54:46.322874 kernel: audit: type=1334 audit(1755046463.854:89): prog-id=11 op=UNLOAD Aug 13 00:54:46.322884 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Aug 13 00:54:46.322894 kernel: audit: type=1400 audit(1755046466.844:90): avc: denied { associate } for pid=1056 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Aug 13 00:54:46.322906 kernel: audit: type=1300 audit(1755046466.844:90): arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a2 a1=c0000cedf8 a2=c0000d70c0 a3=32 items=0 ppid=1039 pid=1056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:54:46.322915 kernel: audit: type=1327 audit(1755046466.844:90): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Aug 13 00:54:46.322930 systemd[1]: Populated /etc with preset unit settings. Aug 13 00:54:46.322940 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Aug 13 00:54:46.322952 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Aug 13 00:54:46.322963 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Aug 13 00:54:46.322972 kernel: kauditd_printk_skb: 6 callbacks suppressed Aug 13 00:54:46.322984 kernel: audit: type=1334 audit(1755046485.674:92): prog-id=12 op=LOAD Aug 13 00:54:46.322992 kernel: audit: type=1334 audit(1755046485.674:93): prog-id=3 op=UNLOAD Aug 13 00:54:46.323006 kernel: audit: type=1334 audit(1755046485.680:94): prog-id=13 op=LOAD Aug 13 00:54:46.323018 kernel: audit: type=1334 audit(1755046485.685:95): prog-id=14 op=LOAD Aug 13 00:54:46.323034 kernel: audit: type=1334 audit(1755046485.685:96): prog-id=4 op=UNLOAD Aug 13 00:54:46.323044 kernel: audit: type=1334 audit(1755046485.685:97): prog-id=5 op=UNLOAD Aug 13 00:54:46.323056 kernel: audit: type=1334 audit(1755046485.691:98): prog-id=15 op=LOAD Aug 13 00:54:46.323065 kernel: audit: type=1334 audit(1755046485.691:99): prog-id=12 op=UNLOAD Aug 13 00:54:46.323073 kernel: audit: type=1334 audit(1755046485.710:100): prog-id=16 op=LOAD Aug 13 00:54:46.323085 kernel: audit: type=1334 audit(1755046485.715:101): prog-id=17 op=LOAD Aug 13 00:54:46.323095 systemd[1]: initrd-switch-root.service: Deactivated successfully. Aug 13 00:54:46.323109 systemd[1]: Stopped initrd-switch-root.service. Aug 13 00:54:46.323120 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Aug 13 00:54:46.323132 systemd[1]: Created slice system-addon\x2dconfig.slice. Aug 13 00:54:46.323143 systemd[1]: Created slice system-addon\x2drun.slice. Aug 13 00:54:46.323155 systemd[1]: Created slice system-getty.slice. Aug 13 00:54:46.323167 systemd[1]: Created slice system-modprobe.slice. Aug 13 00:54:46.323177 systemd[1]: Created slice system-serial\x2dgetty.slice. Aug 13 00:54:46.323208 systemd[1]: Created slice system-system\x2dcloudinit.slice. Aug 13 00:54:46.323220 systemd[1]: Created slice system-systemd\x2dfsck.slice. Aug 13 00:54:46.323229 systemd[1]: Created slice user.slice. Aug 13 00:54:46.323243 systemd[1]: Started systemd-ask-password-console.path. Aug 13 00:54:46.323252 systemd[1]: Started systemd-ask-password-wall.path. Aug 13 00:54:46.323265 systemd[1]: Set up automount boot.automount. Aug 13 00:54:46.323274 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Aug 13 00:54:46.323284 systemd[1]: Stopped target initrd-switch-root.target. Aug 13 00:54:46.323296 systemd[1]: Stopped target initrd-fs.target. Aug 13 00:54:46.323309 systemd[1]: Stopped target initrd-root-fs.target. Aug 13 00:54:46.323321 systemd[1]: Reached target integritysetup.target. Aug 13 00:54:46.323331 systemd[1]: Reached target remote-cryptsetup.target. Aug 13 00:54:46.323342 systemd[1]: Reached target remote-fs.target. Aug 13 00:54:46.323353 systemd[1]: Reached target slices.target. Aug 13 00:54:46.323365 systemd[1]: Reached target swap.target. Aug 13 00:54:46.323376 systemd[1]: Reached target torcx.target. Aug 13 00:54:46.323385 systemd[1]: Reached target veritysetup.target. Aug 13 00:54:46.323400 systemd[1]: Listening on systemd-coredump.socket. Aug 13 00:54:46.323410 systemd[1]: Listening on systemd-initctl.socket. Aug 13 00:54:46.323423 systemd[1]: Listening on systemd-networkd.socket. Aug 13 00:54:46.323433 systemd[1]: Listening on systemd-udevd-control.socket. Aug 13 00:54:46.323449 systemd[1]: Listening on systemd-udevd-kernel.socket. Aug 13 00:54:46.323459 systemd[1]: Listening on systemd-userdbd.socket. Aug 13 00:54:46.323472 systemd[1]: Mounting dev-hugepages.mount... Aug 13 00:54:46.323482 systemd[1]: Mounting dev-mqueue.mount... Aug 13 00:54:46.323492 systemd[1]: Mounting media.mount... Aug 13 00:54:46.323504 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Aug 13 00:54:46.323515 systemd[1]: Mounting sys-kernel-debug.mount... Aug 13 00:54:46.323527 systemd[1]: Mounting sys-kernel-tracing.mount... Aug 13 00:54:46.323537 systemd[1]: Mounting tmp.mount... Aug 13 00:54:46.323551 systemd[1]: Starting flatcar-tmpfiles.service... Aug 13 00:54:46.323562 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Aug 13 00:54:46.323573 systemd[1]: Starting kmod-static-nodes.service... Aug 13 00:54:46.323585 systemd[1]: Starting modprobe@configfs.service... Aug 13 00:54:46.323594 systemd[1]: Starting modprobe@dm_mod.service... Aug 13 00:54:46.323607 systemd[1]: Starting modprobe@drm.service... Aug 13 00:54:46.323617 systemd[1]: Starting modprobe@efi_pstore.service... Aug 13 00:54:46.323629 systemd[1]: Starting modprobe@fuse.service... Aug 13 00:54:46.323639 systemd[1]: Starting modprobe@loop.service... Aug 13 00:54:46.323652 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Aug 13 00:54:46.323666 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Aug 13 00:54:46.323679 systemd[1]: Stopped systemd-fsck-root.service. Aug 13 00:54:46.323690 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Aug 13 00:54:46.323699 systemd[1]: Stopped systemd-fsck-usr.service. Aug 13 00:54:46.323712 systemd[1]: Stopped systemd-journald.service. Aug 13 00:54:46.323722 systemd[1]: Starting systemd-journald.service... Aug 13 00:54:46.323735 systemd[1]: Starting systemd-modules-load.service... Aug 13 00:54:46.323745 systemd[1]: Starting systemd-network-generator.service... Aug 13 00:54:46.323759 systemd[1]: Starting systemd-remount-fs.service... Aug 13 00:54:46.323771 systemd[1]: Starting systemd-udev-trigger.service... Aug 13 00:54:46.323784 systemd[1]: verity-setup.service: Deactivated successfully. Aug 13 00:54:46.323794 systemd[1]: Stopped verity-setup.service. Aug 13 00:54:46.323804 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Aug 13 00:54:46.323816 kernel: loop: module loaded Aug 13 00:54:46.323826 systemd[1]: Mounted dev-hugepages.mount. Aug 13 00:54:46.323838 systemd[1]: Mounted dev-mqueue.mount. Aug 13 00:54:46.323848 systemd[1]: Mounted media.mount. Aug 13 00:54:46.323863 systemd[1]: Mounted sys-kernel-debug.mount. Aug 13 00:54:46.323874 systemd[1]: Mounted sys-kernel-tracing.mount. Aug 13 00:54:46.323886 systemd[1]: Mounted tmp.mount. Aug 13 00:54:46.323896 systemd[1]: Finished flatcar-tmpfiles.service. Aug 13 00:54:46.323907 systemd[1]: Finished kmod-static-nodes.service. Aug 13 00:54:46.323919 systemd[1]: modprobe@configfs.service: Deactivated successfully. Aug 13 00:54:46.323939 systemd[1]: Finished modprobe@configfs.service. Aug 13 00:54:46.323950 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Aug 13 00:54:46.323960 systemd[1]: Finished modprobe@dm_mod.service. Aug 13 00:54:46.323972 kernel: fuse: init (API version 7.34) Aug 13 00:54:46.323982 systemd[1]: modprobe@drm.service: Deactivated successfully. Aug 13 00:54:46.323997 systemd[1]: Finished modprobe@drm.service. Aug 13 00:54:46.324007 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Aug 13 00:54:46.324022 systemd[1]: Finished modprobe@efi_pstore.service. Aug 13 00:54:46.324033 systemd[1]: modprobe@fuse.service: Deactivated successfully. Aug 13 00:54:46.324043 systemd[1]: Finished modprobe@fuse.service. Aug 13 00:54:46.324052 systemd[1]: modprobe@loop.service: Deactivated successfully. Aug 13 00:54:46.324067 systemd-journald[1137]: Journal started Aug 13 00:54:46.324113 systemd-journald[1137]: Runtime Journal (/run/log/journal/5aef5542876f4a4c855f514d83113a55) is 8.0M, max 159.0M, 151.0M free. Aug 13 00:54:22.253000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Aug 13 00:54:23.793000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Aug 13 00:54:23.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Aug 13 00:54:23.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Aug 13 00:54:23.841000 audit: BPF prog-id=10 op=LOAD Aug 13 00:54:23.841000 audit: BPF prog-id=10 op=UNLOAD Aug 13 00:54:23.854000 audit: BPF prog-id=11 op=LOAD Aug 13 00:54:23.854000 audit: BPF prog-id=11 op=UNLOAD Aug 13 00:54:26.844000 audit[1056]: AVC avc: denied { associate } for pid=1056 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Aug 13 00:54:26.844000 audit[1056]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a2 a1=c0000cedf8 a2=c0000d70c0 a3=32 items=0 ppid=1039 pid=1056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:54:26.844000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Aug 13 00:54:26.853000 audit[1056]: AVC avc: denied { associate } for pid=1056 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Aug 13 00:54:26.853000 audit[1056]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d989 a2=1ed a3=0 items=2 ppid=1039 pid=1056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:54:26.853000 audit: CWD cwd="/" Aug 13 00:54:26.853000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:54:26.853000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:54:26.853000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Aug 13 00:54:45.674000 audit: BPF prog-id=12 op=LOAD Aug 13 00:54:45.674000 audit: BPF prog-id=3 op=UNLOAD Aug 13 00:54:45.680000 audit: BPF prog-id=13 op=LOAD Aug 13 00:54:45.685000 audit: BPF prog-id=14 op=LOAD Aug 13 00:54:45.685000 audit: BPF prog-id=4 op=UNLOAD Aug 13 00:54:45.685000 audit: BPF prog-id=5 op=UNLOAD Aug 13 00:54:45.691000 audit: BPF prog-id=15 op=LOAD Aug 13 00:54:45.691000 audit: BPF prog-id=12 op=UNLOAD Aug 13 00:54:45.710000 audit: BPF prog-id=16 op=LOAD Aug 13 00:54:45.715000 audit: BPF prog-id=17 op=LOAD Aug 13 00:54:45.715000 audit: BPF prog-id=13 op=UNLOAD Aug 13 00:54:45.715000 audit: BPF prog-id=14 op=UNLOAD Aug 13 00:54:45.719000 audit: BPF prog-id=18 op=LOAD Aug 13 00:54:45.719000 audit: BPF prog-id=15 op=UNLOAD Aug 13 00:54:45.724000 audit: BPF prog-id=19 op=LOAD Aug 13 00:54:45.730000 audit: BPF prog-id=20 op=LOAD Aug 13 00:54:45.730000 audit: BPF prog-id=16 op=UNLOAD Aug 13 00:54:45.730000 audit: BPF prog-id=17 op=UNLOAD Aug 13 00:54:45.730000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:45.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:45.742000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:45.743000 audit: BPF prog-id=18 op=UNLOAD Aug 13 00:54:46.068000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:46.078000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:46.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:46.084000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:46.086000 audit: BPF prog-id=21 op=LOAD Aug 13 00:54:46.086000 audit: BPF prog-id=22 op=LOAD Aug 13 00:54:46.086000 audit: BPF prog-id=23 op=LOAD Aug 13 00:54:46.086000 audit: BPF prog-id=19 op=UNLOAD Aug 13 00:54:46.087000 audit: BPF prog-id=20 op=UNLOAD Aug 13 00:54:46.197000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:46.250000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:46.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:46.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:46.266000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:46.285000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:46.285000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:46.298000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:46.298000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:46.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:46.308000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:46.319000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:46.319000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Aug 13 00:54:46.319000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:46.319000 audit[1137]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7ffca2677ec0 a2=4000 a3=7ffca2677f5c items=0 ppid=1 pid=1137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:54:46.319000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Aug 13 00:54:26.763067 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2025-08-13T00:54:26Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Aug 13 00:54:45.673098 systemd[1]: Queued start job for default target multi-user.target. Aug 13 00:54:26.769118 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2025-08-13T00:54:26Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Aug 13 00:54:45.673111 systemd[1]: Unnecessary job was removed for dev-sda6.device. Aug 13 00:54:26.769142 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2025-08-13T00:54:26Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Aug 13 00:54:45.730803 systemd[1]: systemd-journald.service: Deactivated successfully. Aug 13 00:54:26.769195 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2025-08-13T00:54:26Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Aug 13 00:54:46.331863 systemd[1]: Finished modprobe@loop.service. Aug 13 00:54:26.769214 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2025-08-13T00:54:26Z" level=debug msg="skipped missing lower profile" missing profile=oem Aug 13 00:54:26.769278 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2025-08-13T00:54:26Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Aug 13 00:54:26.769294 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2025-08-13T00:54:26Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Aug 13 00:54:46.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:46.332000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:26.769513 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2025-08-13T00:54:26Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Aug 13 00:54:26.769568 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2025-08-13T00:54:26Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Aug 13 00:54:26.769586 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2025-08-13T00:54:26Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Aug 13 00:54:26.808438 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2025-08-13T00:54:26Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Aug 13 00:54:26.808497 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2025-08-13T00:54:26Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Aug 13 00:54:26.808528 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2025-08-13T00:54:26Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Aug 13 00:54:26.808545 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2025-08-13T00:54:26Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Aug 13 00:54:26.808572 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2025-08-13T00:54:26Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Aug 13 00:54:26.808595 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2025-08-13T00:54:26Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Aug 13 00:54:42.421996 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2025-08-13T00:54:42Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Aug 13 00:54:42.422313 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2025-08-13T00:54:42Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Aug 13 00:54:42.422435 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2025-08-13T00:54:42Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Aug 13 00:54:42.422659 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2025-08-13T00:54:42Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Aug 13 00:54:42.422721 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2025-08-13T00:54:42Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Aug 13 00:54:42.422787 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2025-08-13T00:54:42Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Aug 13 00:54:46.340398 systemd[1]: Started systemd-journald.service. Aug 13 00:54:46.338000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:46.339860 systemd[1]: Finished systemd-network-generator.service. Aug 13 00:54:46.342000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:46.343238 systemd[1]: Finished systemd-remount-fs.service. Aug 13 00:54:46.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:46.346492 systemd[1]: Reached target network-pre.target. Aug 13 00:54:46.349966 systemd[1]: Mounting sys-fs-fuse-connections.mount... Aug 13 00:54:46.353856 systemd[1]: Mounting sys-kernel-config.mount... Aug 13 00:54:46.357484 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Aug 13 00:54:46.371431 systemd[1]: Starting systemd-hwdb-update.service... Aug 13 00:54:46.375684 systemd[1]: Starting systemd-journal-flush.service... Aug 13 00:54:46.378528 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Aug 13 00:54:46.379755 systemd[1]: Starting systemd-random-seed.service... Aug 13 00:54:46.382470 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Aug 13 00:54:46.383784 systemd[1]: Starting systemd-sysusers.service... Aug 13 00:54:46.388277 systemd[1]: Finished systemd-modules-load.service. Aug 13 00:54:46.390000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:46.391245 systemd[1]: Mounted sys-fs-fuse-connections.mount. Aug 13 00:54:46.394093 systemd[1]: Mounted sys-kernel-config.mount. Aug 13 00:54:46.397765 systemd[1]: Starting systemd-sysctl.service... Aug 13 00:54:46.444887 systemd-journald[1137]: Time spent on flushing to /var/log/journal/5aef5542876f4a4c855f514d83113a55 is 14.619ms for 1165 entries. Aug 13 00:54:46.444887 systemd-journald[1137]: System Journal (/var/log/journal/5aef5542876f4a4c855f514d83113a55) is 8.0M, max 2.6G, 2.6G free. Aug 13 00:54:46.605340 systemd-journald[1137]: Received client request to flush runtime journal. Aug 13 00:54:46.464000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:46.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:46.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:46.609000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:46.461950 systemd[1]: Finished systemd-udev-trigger.service. Aug 13 00:54:46.465888 systemd[1]: Starting systemd-udev-settle.service... Aug 13 00:54:46.610370 udevadm[1180]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Aug 13 00:54:46.488399 systemd[1]: Finished systemd-random-seed.service. Aug 13 00:54:46.491693 systemd[1]: Reached target first-boot-complete.target. Aug 13 00:54:46.541647 systemd[1]: Finished systemd-sysctl.service. Aug 13 00:54:46.606851 systemd[1]: Finished systemd-journal-flush.service. Aug 13 00:54:47.704619 systemd[1]: Finished systemd-sysusers.service. Aug 13 00:54:47.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:47.708623 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Aug 13 00:54:48.888942 systemd[1]: Finished systemd-hwdb-update.service. Aug 13 00:54:48.891000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:49.152213 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Aug 13 00:54:49.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:49.156000 audit: BPF prog-id=24 op=LOAD Aug 13 00:54:49.156000 audit: BPF prog-id=25 op=LOAD Aug 13 00:54:49.156000 audit: BPF prog-id=7 op=UNLOAD Aug 13 00:54:49.156000 audit: BPF prog-id=8 op=UNLOAD Aug 13 00:54:49.157464 systemd[1]: Starting systemd-udevd.service... Aug 13 00:54:49.176129 systemd-udevd[1184]: Using default interface naming scheme 'v252'. Aug 13 00:54:50.028904 systemd[1]: Started systemd-udevd.service. Aug 13 00:54:50.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:50.032000 audit: BPF prog-id=26 op=LOAD Aug 13 00:54:50.033864 systemd[1]: Starting systemd-networkd.service... Aug 13 00:54:50.069420 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Aug 13 00:54:50.171206 kernel: mousedev: PS/2 mouse device common for all mice Aug 13 00:54:50.205000 audit[1195]: AVC avc: denied { confidentiality } for pid=1195 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Aug 13 00:54:50.211206 kernel: hv_vmbus: registering driver hv_balloon Aug 13 00:54:50.218208 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Aug 13 00:54:50.205000 audit[1195]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=561f789d7f60 a1=f83c a2=7f7d79581bc5 a3=5 items=12 ppid=1184 pid=1195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:54:50.205000 audit: CWD cwd="/" Aug 13 00:54:50.205000 audit: PATH item=0 name=(null) inode=1237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:54:50.205000 audit: PATH item=1 name=(null) inode=15446 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:54:50.205000 audit: PATH item=2 name=(null) inode=15446 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:54:50.205000 audit: PATH item=3 name=(null) inode=15447 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:54:50.205000 audit: PATH item=4 name=(null) inode=15446 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:54:50.205000 audit: PATH item=5 name=(null) inode=15448 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:54:50.205000 audit: PATH item=6 name=(null) inode=15446 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:54:50.205000 audit: PATH item=7 name=(null) inode=15449 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:54:50.205000 audit: PATH item=8 name=(null) inode=15446 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:54:50.205000 audit: PATH item=9 name=(null) inode=15450 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:54:50.205000 audit: PATH item=10 name=(null) inode=15446 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:54:50.205000 audit: PATH item=11 name=(null) inode=15451 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:54:50.205000 audit: PROCTITLE proctitle="(udev-worker)" Aug 13 00:54:50.245142 kernel: hv_utils: Registering HyperV Utility Driver Aug 13 00:54:50.245283 kernel: hv_vmbus: registering driver hv_utils Aug 13 00:54:50.249201 kernel: hv_utils: Heartbeat IC version 3.0 Aug 13 00:54:50.249307 kernel: hv_utils: Shutdown IC version 3.2 Aug 13 00:54:50.255560 kernel: hv_utils: TimeSync IC version 4.0 Aug 13 00:54:50.902892 kernel: hv_vmbus: registering driver hyperv_fb Aug 13 00:54:50.912297 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Aug 13 00:54:50.912426 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Aug 13 00:54:50.916375 kernel: Console: switching to colour dummy device 80x25 Aug 13 00:54:50.922247 kernel: Console: switching to colour frame buffer device 128x48 Aug 13 00:54:51.029000 audit: BPF prog-id=27 op=LOAD Aug 13 00:54:51.029000 audit: BPF prog-id=28 op=LOAD Aug 13 00:54:51.029000 audit: BPF prog-id=29 op=LOAD Aug 13 00:54:51.031005 systemd[1]: Starting systemd-userdbd.service... Aug 13 00:54:51.137491 systemd[1]: Started systemd-userdbd.service. Aug 13 00:54:51.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:51.216465 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Aug 13 00:54:51.245033 kernel: KVM: vmx: using Hyper-V Enlightened VMCS Aug 13 00:54:51.443302 systemd[1]: Finished systemd-udev-settle.service. Aug 13 00:54:51.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:51.447997 systemd[1]: Starting lvm2-activation-early.service... Aug 13 00:54:51.449639 kernel: kauditd_printk_skb: 76 callbacks suppressed Aug 13 00:54:51.449702 kernel: audit: type=1130 audit(1755046491.446:161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:51.907460 systemd-networkd[1190]: lo: Link UP Aug 13 00:54:51.907472 systemd-networkd[1190]: lo: Gained carrier Aug 13 00:54:51.908121 systemd-networkd[1190]: Enumeration completed Aug 13 00:54:51.908273 systemd[1]: Started systemd-networkd.service. Aug 13 00:54:51.910000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:51.912181 systemd[1]: Starting systemd-networkd-wait-online.service... Aug 13 00:54:51.916961 systemd-networkd[1190]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Aug 13 00:54:51.924891 kernel: audit: type=1130 audit(1755046491.910:162): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:51.975902 kernel: mlx5_core 2db9:00:02.0 enP11705s1: Link up Aug 13 00:54:51.997908 kernel: hv_netvsc 7ced8d3a-65e0-7ced-8d3a-65e07ced8d3a eth0: Data path switched to VF: enP11705s1 Aug 13 00:54:51.999029 systemd-networkd[1190]: enP11705s1: Link UP Aug 13 00:54:51.999219 systemd-networkd[1190]: eth0: Link UP Aug 13 00:54:51.999226 systemd-networkd[1190]: eth0: Gained carrier Aug 13 00:54:52.003209 systemd-networkd[1190]: enP11705s1: Gained carrier Aug 13 00:54:52.032024 systemd-networkd[1190]: eth0: DHCPv4 address 10.200.4.18/24, gateway 10.200.4.1 acquired from 168.63.129.16 Aug 13 00:54:52.203523 lvm[1259]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Aug 13 00:54:52.236072 systemd[1]: Finished lvm2-activation-early.service. Aug 13 00:54:52.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:52.239122 systemd[1]: Reached target cryptsetup.target. Aug 13 00:54:52.251895 kernel: audit: type=1130 audit(1755046492.238:163): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:52.255252 systemd[1]: Starting lvm2-activation.service... Aug 13 00:54:52.260106 lvm[1262]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Aug 13 00:54:52.286039 systemd[1]: Finished lvm2-activation.service. Aug 13 00:54:52.288000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:52.288743 systemd[1]: Reached target local-fs-pre.target. Aug 13 00:54:52.303440 kernel: audit: type=1130 audit(1755046492.288:164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:52.303502 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Aug 13 00:54:52.303543 systemd[1]: Reached target local-fs.target. Aug 13 00:54:52.305730 systemd[1]: Reached target machines.target. Aug 13 00:54:52.309558 systemd[1]: Starting ldconfig.service... Aug 13 00:54:52.327545 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Aug 13 00:54:52.327629 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Aug 13 00:54:52.328976 systemd[1]: Starting systemd-boot-update.service... Aug 13 00:54:52.333008 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Aug 13 00:54:52.337280 systemd[1]: Starting systemd-machine-id-commit.service... Aug 13 00:54:52.341205 systemd[1]: Starting systemd-sysext.service... Aug 13 00:54:52.459641 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1264 (bootctl) Aug 13 00:54:52.461179 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Aug 13 00:54:52.465864 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Aug 13 00:54:52.467430 systemd[1]: Finished systemd-machine-id-commit.service. Aug 13 00:54:52.466000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:52.480889 kernel: audit: type=1130 audit(1755046492.466:165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:52.535232 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Aug 13 00:54:52.552035 kernel: audit: type=1130 audit(1755046492.534:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:52.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:52.555719 systemd[1]: Unmounting usr-share-oem.mount... Aug 13 00:54:52.569237 systemd[1]: usr-share-oem.mount: Deactivated successfully. Aug 13 00:54:52.569456 systemd[1]: Unmounted usr-share-oem.mount. Aug 13 00:54:52.616897 kernel: loop0: detected capacity change from 0 to 224512 Aug 13 00:54:52.757023 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Aug 13 00:54:52.774896 kernel: loop1: detected capacity change from 0 to 224512 Aug 13 00:54:52.790617 (sd-sysext)[1276]: Using extensions 'kubernetes'. Aug 13 00:54:52.792695 (sd-sysext)[1276]: Merged extensions into '/usr'. Aug 13 00:54:52.810534 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Aug 13 00:54:52.812472 systemd[1]: Mounting usr-share-oem.mount... Aug 13 00:54:52.812934 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Aug 13 00:54:52.816665 systemd[1]: Starting modprobe@dm_mod.service... Aug 13 00:54:52.819476 systemd[1]: Starting modprobe@efi_pstore.service... Aug 13 00:54:52.821333 systemd[1]: Starting modprobe@loop.service... Aug 13 00:54:52.823632 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Aug 13 00:54:52.824000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:52.823845 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Aug 13 00:54:52.867662 kernel: audit: type=1130 audit(1755046492.824:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:52.867723 kernel: audit: type=1131 audit(1755046492.824:168): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:52.867748 kernel: audit: type=1130 audit(1755046492.838:169): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:52.867778 kernel: audit: type=1131 audit(1755046492.838:170): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:52.824000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:52.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:52.838000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:52.824122 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Aug 13 00:54:52.825397 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Aug 13 00:54:52.825577 systemd[1]: Finished modprobe@dm_mod.service. Aug 13 00:54:52.838478 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Aug 13 00:54:52.838860 systemd[1]: Finished modprobe@efi_pstore.service. Aug 13 00:54:52.839399 systemd[1]: modprobe@loop.service: Deactivated successfully. Aug 13 00:54:52.839518 systemd[1]: Finished modprobe@loop.service. Aug 13 00:54:52.840273 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Aug 13 00:54:52.840376 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Aug 13 00:54:52.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:52.838000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:52.883540 systemd[1]: Mounted usr-share-oem.mount. Aug 13 00:54:52.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:52.887765 systemd[1]: Finished systemd-sysext.service. Aug 13 00:54:52.891423 systemd[1]: Starting ensure-sysext.service... Aug 13 00:54:52.895176 systemd[1]: Starting systemd-tmpfiles-setup.service... Aug 13 00:54:52.902897 systemd[1]: Reloading. Aug 13 00:54:52.918299 systemd-tmpfiles[1283]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Aug 13 00:54:52.952562 systemd-tmpfiles[1283]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Aug 13 00:54:52.982637 /usr/lib/systemd/system-generators/torcx-generator[1303]: time="2025-08-13T00:54:52Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Aug 13 00:54:52.982678 /usr/lib/systemd/system-generators/torcx-generator[1303]: time="2025-08-13T00:54:52Z" level=info msg="torcx already run" Aug 13 00:54:52.985337 systemd-tmpfiles[1283]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Aug 13 00:54:53.074408 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Aug 13 00:54:53.074432 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Aug 13 00:54:53.090741 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Aug 13 00:54:53.169000 audit: BPF prog-id=30 op=LOAD Aug 13 00:54:53.169000 audit: BPF prog-id=27 op=UNLOAD Aug 13 00:54:53.169000 audit: BPF prog-id=31 op=LOAD Aug 13 00:54:53.169000 audit: BPF prog-id=32 op=LOAD Aug 13 00:54:53.169000 audit: BPF prog-id=28 op=UNLOAD Aug 13 00:54:53.169000 audit: BPF prog-id=29 op=UNLOAD Aug 13 00:54:53.170000 audit: BPF prog-id=33 op=LOAD Aug 13 00:54:53.170000 audit: BPF prog-id=21 op=UNLOAD Aug 13 00:54:53.170000 audit: BPF prog-id=34 op=LOAD Aug 13 00:54:53.170000 audit: BPF prog-id=35 op=LOAD Aug 13 00:54:53.170000 audit: BPF prog-id=22 op=UNLOAD Aug 13 00:54:53.170000 audit: BPF prog-id=23 op=UNLOAD Aug 13 00:54:53.171000 audit: BPF prog-id=36 op=LOAD Aug 13 00:54:53.171000 audit: BPF prog-id=26 op=UNLOAD Aug 13 00:54:53.174000 audit: BPF prog-id=37 op=LOAD Aug 13 00:54:53.174000 audit: BPF prog-id=38 op=LOAD Aug 13 00:54:53.174000 audit: BPF prog-id=24 op=UNLOAD Aug 13 00:54:53.174000 audit: BPF prog-id=25 op=UNLOAD Aug 13 00:54:53.188510 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Aug 13 00:54:53.188789 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Aug 13 00:54:53.190306 systemd[1]: Starting modprobe@dm_mod.service... Aug 13 00:54:53.193970 systemd[1]: Starting modprobe@efi_pstore.service... Aug 13 00:54:53.197806 systemd[1]: Starting modprobe@loop.service... Aug 13 00:54:53.200055 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Aug 13 00:54:53.200269 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Aug 13 00:54:53.200450 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Aug 13 00:54:53.201556 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Aug 13 00:54:53.201733 systemd[1]: Finished modprobe@dm_mod.service. Aug 13 00:54:53.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:53.203000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:53.204764 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Aug 13 00:54:53.204933 systemd[1]: Finished modprobe@efi_pstore.service. Aug 13 00:54:53.206000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:53.206000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:53.208196 systemd[1]: modprobe@loop.service: Deactivated successfully. Aug 13 00:54:53.208343 systemd[1]: Finished modprobe@loop.service. Aug 13 00:54:53.210000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:53.210000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:53.212806 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Aug 13 00:54:53.213135 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Aug 13 00:54:53.214637 systemd[1]: Starting modprobe@dm_mod.service... Aug 13 00:54:53.218289 systemd[1]: Starting modprobe@efi_pstore.service... Aug 13 00:54:53.221852 systemd[1]: Starting modprobe@loop.service... Aug 13 00:54:53.224026 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Aug 13 00:54:53.224232 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Aug 13 00:54:53.224385 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Aug 13 00:54:53.225406 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Aug 13 00:54:53.225572 systemd[1]: Finished modprobe@dm_mod.service. Aug 13 00:54:53.227000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:53.227000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:53.228783 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Aug 13 00:54:53.228964 systemd[1]: Finished modprobe@efi_pstore.service. Aug 13 00:54:53.230000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:53.230000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:53.232063 systemd[1]: modprobe@loop.service: Deactivated successfully. Aug 13 00:54:53.232212 systemd[1]: Finished modprobe@loop.service. Aug 13 00:54:53.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:53.234000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:53.237717 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Aug 13 00:54:53.238182 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Aug 13 00:54:53.239701 systemd[1]: Starting modprobe@dm_mod.service... Aug 13 00:54:53.243748 systemd[1]: Starting modprobe@drm.service... Aug 13 00:54:53.247419 systemd[1]: Starting modprobe@efi_pstore.service... Aug 13 00:54:53.251421 systemd[1]: Starting modprobe@loop.service... Aug 13 00:54:53.253712 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Aug 13 00:54:53.253931 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Aug 13 00:54:53.254150 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Aug 13 00:54:53.255344 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Aug 13 00:54:53.255506 systemd[1]: Finished modprobe@dm_mod.service. Aug 13 00:54:53.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:53.257000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:53.258533 systemd[1]: modprobe@drm.service: Deactivated successfully. Aug 13 00:54:53.258689 systemd[1]: Finished modprobe@drm.service. Aug 13 00:54:53.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:53.260000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:53.261701 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Aug 13 00:54:53.261858 systemd[1]: Finished modprobe@efi_pstore.service. Aug 13 00:54:53.263000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:53.263000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:53.265105 systemd[1]: modprobe@loop.service: Deactivated successfully. Aug 13 00:54:53.265255 systemd[1]: Finished modprobe@loop.service. Aug 13 00:54:53.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:53.266000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:53.268331 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Aug 13 00:54:53.268452 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Aug 13 00:54:53.269824 systemd[1]: Finished ensure-sysext.service. Aug 13 00:54:53.271000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:53.392065 systemd-networkd[1190]: eth0: Gained IPv6LL Aug 13 00:54:53.397731 systemd[1]: Finished systemd-networkd-wait-online.service. Aug 13 00:54:53.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:54.285701 systemd-fsck[1272]: fsck.fat 4.2 (2021-01-31) Aug 13 00:54:54.285701 systemd-fsck[1272]: /dev/sda1: 789 files, 119324/258078 clusters Aug 13 00:54:54.288192 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Aug 13 00:54:54.291000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:54.293587 systemd[1]: Mounting boot.mount... Aug 13 00:54:54.303442 systemd[1]: Mounted boot.mount. Aug 13 00:54:54.322698 systemd[1]: Finished systemd-boot-update.service. Aug 13 00:54:54.324000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:54.606318 systemd[1]: Finished systemd-tmpfiles-setup.service. Aug 13 00:54:54.608000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:54.611331 systemd[1]: Starting audit-rules.service... Aug 13 00:54:54.615083 systemd[1]: Starting clean-ca-certificates.service... Aug 13 00:54:54.619337 systemd[1]: Starting systemd-journal-catalog-update.service... Aug 13 00:54:54.622000 audit: BPF prog-id=39 op=LOAD Aug 13 00:54:54.624846 systemd[1]: Starting systemd-resolved.service... Aug 13 00:54:54.627000 audit: BPF prog-id=40 op=LOAD Aug 13 00:54:54.629454 systemd[1]: Starting systemd-timesyncd.service... Aug 13 00:54:54.633730 systemd[1]: Starting systemd-update-utmp.service... Aug 13 00:54:54.640443 systemd[1]: Finished clean-ca-certificates.service. Aug 13 00:54:54.641000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:54.643057 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Aug 13 00:54:54.669000 audit[1387]: SYSTEM_BOOT pid=1387 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Aug 13 00:54:54.675396 systemd[1]: Finished systemd-update-utmp.service. Aug 13 00:54:54.677000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:54.756234 systemd[1]: Started systemd-timesyncd.service. Aug 13 00:54:54.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:54.759440 systemd[1]: Reached target time-set.target. Aug 13 00:54:54.912038 systemd-resolved[1385]: Positive Trust Anchors: Aug 13 00:54:54.912063 systemd-resolved[1385]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Aug 13 00:54:54.912101 systemd-resolved[1385]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Aug 13 00:54:54.939047 systemd-timesyncd[1386]: Contacted time server 141.147.97.37:123 (0.flatcar.pool.ntp.org). Aug 13 00:54:54.939194 systemd-timesyncd[1386]: Initial clock synchronization to Wed 2025-08-13 00:54:54.938678 UTC. Aug 13 00:54:55.101047 systemd[1]: Finished systemd-journal-catalog-update.service. Aug 13 00:54:55.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:55.181835 systemd-resolved[1385]: Using system hostname 'ci-3510.3.8-a-e88d8da36a'. Aug 13 00:54:55.183618 systemd[1]: Started systemd-resolved.service. Aug 13 00:54:55.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:54:55.186106 systemd[1]: Reached target network.target. Aug 13 00:54:55.188343 systemd[1]: Reached target network-online.target. Aug 13 00:54:55.190567 systemd[1]: Reached target nss-lookup.target. Aug 13 00:54:55.405000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Aug 13 00:54:55.405000 audit[1403]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd305a66f0 a2=420 a3=0 items=0 ppid=1382 pid=1403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:54:55.407105 augenrules[1403]: No rules Aug 13 00:54:55.405000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Aug 13 00:54:55.408132 systemd[1]: Finished audit-rules.service. Aug 13 00:55:07.419608 ldconfig[1263]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Aug 13 00:55:07.429163 systemd[1]: Finished ldconfig.service. Aug 13 00:55:07.433166 systemd[1]: Starting systemd-update-done.service... Aug 13 00:55:07.444092 systemd[1]: Finished systemd-update-done.service. Aug 13 00:55:07.446736 systemd[1]: Reached target sysinit.target. Aug 13 00:55:07.449009 systemd[1]: Started motdgen.path. Aug 13 00:55:07.450732 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Aug 13 00:55:07.454203 systemd[1]: Started logrotate.timer. Aug 13 00:55:07.456327 systemd[1]: Started mdadm.timer. Aug 13 00:55:07.458138 systemd[1]: Started systemd-tmpfiles-clean.timer. Aug 13 00:55:07.460594 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Aug 13 00:55:07.460636 systemd[1]: Reached target paths.target. Aug 13 00:55:07.462725 systemd[1]: Reached target timers.target. Aug 13 00:55:07.465266 systemd[1]: Listening on dbus.socket. Aug 13 00:55:07.468584 systemd[1]: Starting docker.socket... Aug 13 00:55:07.500626 systemd[1]: Listening on sshd.socket. Aug 13 00:55:07.503824 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Aug 13 00:55:07.504480 systemd[1]: Listening on docker.socket. Aug 13 00:55:07.507461 systemd[1]: Reached target sockets.target. Aug 13 00:55:07.509966 systemd[1]: Reached target basic.target. Aug 13 00:55:07.512389 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Aug 13 00:55:07.512430 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Aug 13 00:55:07.513672 systemd[1]: Starting containerd.service... Aug 13 00:55:07.517046 systemd[1]: Starting dbus.service... Aug 13 00:55:07.520060 systemd[1]: Starting enable-oem-cloudinit.service... Aug 13 00:55:07.523740 systemd[1]: Starting extend-filesystems.service... Aug 13 00:55:07.526241 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Aug 13 00:55:07.530285 systemd[1]: Starting kubelet.service... Aug 13 00:55:07.533619 systemd[1]: Starting motdgen.service... Aug 13 00:55:07.537816 systemd[1]: Started nvidia.service. Aug 13 00:55:07.542235 systemd[1]: Starting ssh-key-proc-cmdline.service... Aug 13 00:55:07.546245 systemd[1]: Starting sshd-keygen.service... Aug 13 00:55:07.554113 systemd[1]: Starting systemd-logind.service... Aug 13 00:55:07.556416 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Aug 13 00:55:07.556528 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Aug 13 00:55:07.557165 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Aug 13 00:55:07.560035 systemd[1]: Starting update-engine.service... Aug 13 00:55:07.563827 systemd[1]: Starting update-ssh-keys-after-ignition.service... Aug 13 00:55:07.570406 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Aug 13 00:55:07.570654 systemd[1]: Finished ssh-key-proc-cmdline.service. Aug 13 00:55:07.697016 systemd[1]: motdgen.service: Deactivated successfully. Aug 13 00:55:07.697236 systemd[1]: Finished motdgen.service. Aug 13 00:55:07.729910 extend-filesystems[1414]: Found loop1 Aug 13 00:55:07.732343 extend-filesystems[1414]: Found sda Aug 13 00:55:07.732343 extend-filesystems[1414]: Found sda1 Aug 13 00:55:07.732343 extend-filesystems[1414]: Found sda2 Aug 13 00:55:07.732343 extend-filesystems[1414]: Found sda3 Aug 13 00:55:07.732343 extend-filesystems[1414]: Found usr Aug 13 00:55:07.732343 extend-filesystems[1414]: Found sda4 Aug 13 00:55:07.732343 extend-filesystems[1414]: Found sda6 Aug 13 00:55:07.732343 extend-filesystems[1414]: Found sda7 Aug 13 00:55:07.732343 extend-filesystems[1414]: Found sda9 Aug 13 00:55:07.732343 extend-filesystems[1414]: Checking size of /dev/sda9 Aug 13 00:55:07.774168 jq[1428]: true Aug 13 00:55:07.774318 jq[1413]: false Aug 13 00:55:07.756422 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Aug 13 00:55:07.756627 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Aug 13 00:55:07.762053 systemd-logind[1425]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Aug 13 00:55:07.771089 systemd-logind[1425]: New seat seat0. Aug 13 00:55:07.795408 jq[1443]: true Aug 13 00:55:07.847258 env[1437]: time="2025-08-13T00:55:07.846227537Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Aug 13 00:55:07.890078 env[1437]: time="2025-08-13T00:55:07.890025104Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Aug 13 00:55:07.890400 env[1437]: time="2025-08-13T00:55:07.890379801Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Aug 13 00:55:07.892698 env[1437]: time="2025-08-13T00:55:07.892652384Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.189-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Aug 13 00:55:07.892817 env[1437]: time="2025-08-13T00:55:07.892801583Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Aug 13 00:55:07.893197 env[1437]: time="2025-08-13T00:55:07.893169680Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Aug 13 00:55:07.893301 env[1437]: time="2025-08-13T00:55:07.893287279Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Aug 13 00:55:07.893367 env[1437]: time="2025-08-13T00:55:07.893353279Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Aug 13 00:55:07.893431 env[1437]: time="2025-08-13T00:55:07.893418578Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Aug 13 00:55:07.893570 env[1437]: time="2025-08-13T00:55:07.893555077Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Aug 13 00:55:07.893951 env[1437]: time="2025-08-13T00:55:07.893923174Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Aug 13 00:55:07.894266 env[1437]: time="2025-08-13T00:55:07.894239172Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Aug 13 00:55:07.894352 env[1437]: time="2025-08-13T00:55:07.894338671Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Aug 13 00:55:07.894481 env[1437]: time="2025-08-13T00:55:07.894465070Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Aug 13 00:55:07.894549 env[1437]: time="2025-08-13T00:55:07.894538170Z" level=info msg="metadata content store policy set" policy=shared Aug 13 00:55:07.918897 env[1437]: time="2025-08-13T00:55:07.917329396Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Aug 13 00:55:07.918897 env[1437]: time="2025-08-13T00:55:07.917382996Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Aug 13 00:55:07.918897 env[1437]: time="2025-08-13T00:55:07.917401896Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Aug 13 00:55:07.918897 env[1437]: time="2025-08-13T00:55:07.917442895Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Aug 13 00:55:07.918897 env[1437]: time="2025-08-13T00:55:07.917464695Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Aug 13 00:55:07.918897 env[1437]: time="2025-08-13T00:55:07.917484195Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Aug 13 00:55:07.918897 env[1437]: time="2025-08-13T00:55:07.917501495Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Aug 13 00:55:07.918897 env[1437]: time="2025-08-13T00:55:07.917521495Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Aug 13 00:55:07.918897 env[1437]: time="2025-08-13T00:55:07.917540195Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Aug 13 00:55:07.918897 env[1437]: time="2025-08-13T00:55:07.917558895Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Aug 13 00:55:07.918897 env[1437]: time="2025-08-13T00:55:07.917576394Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Aug 13 00:55:07.918897 env[1437]: time="2025-08-13T00:55:07.917597994Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Aug 13 00:55:07.918897 env[1437]: time="2025-08-13T00:55:07.917748393Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Aug 13 00:55:07.918897 env[1437]: time="2025-08-13T00:55:07.917837192Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Aug 13 00:55:07.919493 env[1437]: time="2025-08-13T00:55:07.918153590Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Aug 13 00:55:07.919493 env[1437]: time="2025-08-13T00:55:07.918194590Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Aug 13 00:55:07.919493 env[1437]: time="2025-08-13T00:55:07.918213590Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Aug 13 00:55:07.919493 env[1437]: time="2025-08-13T00:55:07.918275589Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Aug 13 00:55:07.919493 env[1437]: time="2025-08-13T00:55:07.918294089Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Aug 13 00:55:07.919493 env[1437]: time="2025-08-13T00:55:07.918310789Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Aug 13 00:55:07.919493 env[1437]: time="2025-08-13T00:55:07.918326489Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Aug 13 00:55:07.919493 env[1437]: time="2025-08-13T00:55:07.918343489Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Aug 13 00:55:07.919493 env[1437]: time="2025-08-13T00:55:07.918360588Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Aug 13 00:55:07.919493 env[1437]: time="2025-08-13T00:55:07.918379388Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Aug 13 00:55:07.919493 env[1437]: time="2025-08-13T00:55:07.918399288Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Aug 13 00:55:07.919493 env[1437]: time="2025-08-13T00:55:07.918418988Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Aug 13 00:55:07.919493 env[1437]: time="2025-08-13T00:55:07.918566587Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Aug 13 00:55:07.919493 env[1437]: time="2025-08-13T00:55:07.918587987Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Aug 13 00:55:07.919493 env[1437]: time="2025-08-13T00:55:07.918605887Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Aug 13 00:55:07.920024 env[1437]: time="2025-08-13T00:55:07.918623286Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Aug 13 00:55:07.920024 env[1437]: time="2025-08-13T00:55:07.918645586Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Aug 13 00:55:07.920024 env[1437]: time="2025-08-13T00:55:07.918661386Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Aug 13 00:55:07.920024 env[1437]: time="2025-08-13T00:55:07.918688786Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Aug 13 00:55:07.920024 env[1437]: time="2025-08-13T00:55:07.918726386Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Aug 13 00:55:07.920198 env[1437]: time="2025-08-13T00:55:07.919951476Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Aug 13 00:55:07.920198 env[1437]: time="2025-08-13T00:55:07.920040176Z" level=info msg="Connect containerd service" Aug 13 00:55:07.920198 env[1437]: time="2025-08-13T00:55:07.920086175Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Aug 13 00:55:07.921431 systemd[1]: Started containerd.service. Aug 13 00:55:07.961905 extend-filesystems[1414]: Old size kept for /dev/sda9 Aug 13 00:55:07.961905 extend-filesystems[1414]: Found sr0 Aug 13 00:55:07.967662 env[1437]: time="2025-08-13T00:55:07.920895269Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Aug 13 00:55:07.967662 env[1437]: time="2025-08-13T00:55:07.921072968Z" level=info msg="Start subscribing containerd event" Aug 13 00:55:07.967662 env[1437]: time="2025-08-13T00:55:07.921144567Z" level=info msg="Start recovering state" Aug 13 00:55:07.967662 env[1437]: time="2025-08-13T00:55:07.921227667Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Aug 13 00:55:07.967662 env[1437]: time="2025-08-13T00:55:07.921276266Z" level=info msg=serving... address=/run/containerd/containerd.sock Aug 13 00:55:07.967662 env[1437]: time="2025-08-13T00:55:07.921618464Z" level=info msg="containerd successfully booted in 0.077237s" Aug 13 00:55:07.967662 env[1437]: time="2025-08-13T00:55:07.924595441Z" level=info msg="Start event monitor" Aug 13 00:55:07.967662 env[1437]: time="2025-08-13T00:55:07.924636941Z" level=info msg="Start snapshots syncer" Aug 13 00:55:07.967662 env[1437]: time="2025-08-13T00:55:07.924652541Z" level=info msg="Start cni network conf syncer for default" Aug 13 00:55:07.967662 env[1437]: time="2025-08-13T00:55:07.924663541Z" level=info msg="Start streaming server" Aug 13 00:55:07.957060 systemd[1]: extend-filesystems.service: Deactivated successfully. Aug 13 00:55:07.957269 systemd[1]: Finished extend-filesystems.service. Aug 13 00:55:08.141903 bash[1469]: Updated "/home/core/.ssh/authorized_keys" Aug 13 00:55:08.143009 systemd[1]: Finished update-ssh-keys-after-ignition.service. Aug 13 00:55:08.186140 systemd[1]: nvidia.service: Deactivated successfully. Aug 13 00:55:08.236974 dbus-daemon[1412]: [system] SELinux support is enabled Aug 13 00:55:08.237200 systemd[1]: Started dbus.service. Aug 13 00:55:08.242488 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Aug 13 00:55:08.242519 systemd[1]: Reached target system-config.target. Aug 13 00:55:08.245445 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Aug 13 00:55:08.245469 systemd[1]: Reached target user-config.target. Aug 13 00:55:08.248600 systemd[1]: Started systemd-logind.service. Aug 13 00:55:08.251204 dbus-daemon[1412]: [system] Successfully activated service 'org.freedesktop.systemd1' Aug 13 00:55:08.481566 sshd_keygen[1432]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Aug 13 00:55:08.509070 systemd[1]: Finished sshd-keygen.service. Aug 13 00:55:08.513398 systemd[1]: Starting issuegen.service... Aug 13 00:55:08.516796 systemd[1]: Started waagent.service. Aug 13 00:55:08.525027 systemd[1]: issuegen.service: Deactivated successfully. Aug 13 00:55:08.525235 systemd[1]: Finished issuegen.service. Aug 13 00:55:08.529329 systemd[1]: Starting systemd-user-sessions.service... Aug 13 00:55:08.540163 systemd[1]: Finished systemd-user-sessions.service. Aug 13 00:55:08.544553 systemd[1]: Started getty@tty1.service. Aug 13 00:55:08.549423 systemd[1]: Started serial-getty@ttyS0.service. Aug 13 00:55:08.552573 systemd[1]: Reached target getty.target. Aug 13 00:55:08.833845 systemd[1]: Started kubelet.service. Aug 13 00:55:09.368454 kubelet[1525]: E0813 00:55:09.368403 1525 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Aug 13 00:55:09.369158 update_engine[1426]: I0813 00:55:09.366369 1426 main.cc:92] Flatcar Update Engine starting Aug 13 00:55:09.370715 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Aug 13 00:55:09.370894 systemd[1]: kubelet.service: Failed with result 'exit-code'. Aug 13 00:55:09.371244 systemd[1]: kubelet.service: Consumed 1.021s CPU time. Aug 13 00:55:09.440641 systemd[1]: Started update-engine.service. Aug 13 00:55:09.441002 update_engine[1426]: I0813 00:55:09.440665 1426 update_check_scheduler.cc:74] Next update check in 6m20s Aug 13 00:55:09.445915 systemd[1]: Started locksmithd.service. Aug 13 00:55:09.448884 systemd[1]: Reached target multi-user.target. Aug 13 00:55:09.453544 systemd[1]: Starting systemd-update-utmp-runlevel.service... Aug 13 00:55:09.463857 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Aug 13 00:55:09.464072 systemd[1]: Finished systemd-update-utmp-runlevel.service. Aug 13 00:55:09.467029 systemd[1]: Startup finished in 612ms (firmware) + 11.387s (loader) + 980ms (kernel) + 20.461s (initrd) + 47.647s (userspace) = 1min 21.089s. Aug 13 00:55:10.604072 login[1521]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Aug 13 00:55:10.606038 login[1522]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Aug 13 00:55:10.701679 systemd[1]: Created slice user-500.slice. Aug 13 00:55:10.703560 systemd[1]: Starting user-runtime-dir@500.service... Aug 13 00:55:10.705767 systemd-logind[1425]: New session 1 of user core. Aug 13 00:55:10.709517 systemd-logind[1425]: New session 2 of user core. Aug 13 00:55:10.753849 systemd[1]: Finished user-runtime-dir@500.service. Aug 13 00:55:10.755819 systemd[1]: Starting user@500.service... Aug 13 00:55:10.765047 (systemd)[1537]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Aug 13 00:55:11.082809 systemd[1537]: Queued start job for default target default.target. Aug 13 00:55:11.083466 systemd[1537]: Reached target paths.target. Aug 13 00:55:11.083495 systemd[1537]: Reached target sockets.target. Aug 13 00:55:11.083512 systemd[1537]: Reached target timers.target. Aug 13 00:55:11.083528 systemd[1537]: Reached target basic.target. Aug 13 00:55:11.083662 systemd[1]: Started user@500.service. Aug 13 00:55:11.084969 systemd[1]: Started session-1.scope. Aug 13 00:55:11.085658 systemd[1537]: Reached target default.target. Aug 13 00:55:11.085775 systemd[1]: Started session-2.scope. Aug 13 00:55:11.085953 systemd[1537]: Startup finished in 314ms. Aug 13 00:55:12.610343 locksmithd[1531]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Aug 13 00:55:19.597567 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Aug 13 00:55:19.597914 systemd[1]: Stopped kubelet.service. Aug 13 00:55:19.597981 systemd[1]: kubelet.service: Consumed 1.021s CPU time. Aug 13 00:55:19.599888 systemd[1]: Starting kubelet.service... Aug 13 00:55:20.355027 systemd[1]: Started kubelet.service. Aug 13 00:55:20.416258 kubelet[1560]: E0813 00:55:20.416119 1560 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Aug 13 00:55:20.419113 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Aug 13 00:55:20.419280 systemd[1]: kubelet.service: Failed with result 'exit-code'. Aug 13 00:55:20.623306 waagent[1516]: 2025-08-13T00:55:20.623126Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Aug 13 00:55:20.632856 waagent[1516]: 2025-08-13T00:55:20.632767Z INFO Daemon Daemon OS: flatcar 3510.3.8 Aug 13 00:55:20.635457 waagent[1516]: 2025-08-13T00:55:20.635386Z INFO Daemon Daemon Python: 3.9.16 Aug 13 00:55:20.638063 waagent[1516]: 2025-08-13T00:55:20.637987Z INFO Daemon Daemon Run daemon Aug 13 00:55:20.640601 waagent[1516]: 2025-08-13T00:55:20.640535Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.8' Aug 13 00:55:20.656191 waagent[1516]: 2025-08-13T00:55:20.656063Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Aug 13 00:55:20.664018 waagent[1516]: 2025-08-13T00:55:20.663892Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Aug 13 00:55:20.710161 waagent[1516]: 2025-08-13T00:55:20.665898Z INFO Daemon Daemon cloud-init is enabled: False Aug 13 00:55:20.710161 waagent[1516]: 2025-08-13T00:55:20.666755Z INFO Daemon Daemon Using waagent for provisioning Aug 13 00:55:20.710161 waagent[1516]: 2025-08-13T00:55:20.668249Z INFO Daemon Daemon Activate resource disk Aug 13 00:55:20.710161 waagent[1516]: 2025-08-13T00:55:20.669110Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Aug 13 00:55:20.710161 waagent[1516]: 2025-08-13T00:55:20.676969Z INFO Daemon Daemon Found device: None Aug 13 00:55:20.710161 waagent[1516]: 2025-08-13T00:55:20.677730Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Aug 13 00:55:20.710161 waagent[1516]: 2025-08-13T00:55:20.678658Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Aug 13 00:55:20.710161 waagent[1516]: 2025-08-13T00:55:20.680513Z INFO Daemon Daemon Clean protocol and wireserver endpoint Aug 13 00:55:20.710161 waagent[1516]: 2025-08-13T00:55:20.681599Z INFO Daemon Daemon Running default provisioning handler Aug 13 00:55:20.710161 waagent[1516]: 2025-08-13T00:55:20.691707Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Aug 13 00:55:20.710161 waagent[1516]: 2025-08-13T00:55:20.694796Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Aug 13 00:55:20.710161 waagent[1516]: 2025-08-13T00:55:20.695614Z INFO Daemon Daemon cloud-init is enabled: False Aug 13 00:55:20.710161 waagent[1516]: 2025-08-13T00:55:20.696510Z INFO Daemon Daemon Copying ovf-env.xml Aug 13 00:55:20.747397 waagent[1516]: 2025-08-13T00:55:20.747233Z INFO Daemon Daemon Successfully mounted dvd Aug 13 00:55:20.837002 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Aug 13 00:55:20.945474 waagent[1516]: 2025-08-13T00:55:20.945229Z INFO Daemon Daemon Detect protocol endpoint Aug 13 00:55:20.948767 waagent[1516]: 2025-08-13T00:55:20.948667Z INFO Daemon Daemon Clean protocol and wireserver endpoint Aug 13 00:55:20.952331 waagent[1516]: 2025-08-13T00:55:20.952254Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Aug 13 00:55:20.956144 waagent[1516]: 2025-08-13T00:55:20.956067Z INFO Daemon Daemon Test for route to 168.63.129.16 Aug 13 00:55:20.959504 waagent[1516]: 2025-08-13T00:55:20.959428Z INFO Daemon Daemon Route to 168.63.129.16 exists Aug 13 00:55:20.962417 waagent[1516]: 2025-08-13T00:55:20.962346Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Aug 13 00:55:21.167381 waagent[1516]: 2025-08-13T00:55:21.167298Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Aug 13 00:55:21.176208 waagent[1516]: 2025-08-13T00:55:21.169168Z INFO Daemon Daemon Wire protocol version:2012-11-30 Aug 13 00:55:21.176208 waagent[1516]: 2025-08-13T00:55:21.170189Z INFO Daemon Daemon Server preferred version:2015-04-05 Aug 13 00:55:21.642058 waagent[1516]: 2025-08-13T00:55:21.641905Z INFO Daemon Daemon Initializing goal state during protocol detection Aug 13 00:55:21.686165 waagent[1516]: 2025-08-13T00:55:21.686055Z INFO Daemon Daemon Forcing an update of the goal state.. Aug 13 00:55:21.689554 waagent[1516]: 2025-08-13T00:55:21.689472Z INFO Daemon Daemon Fetching goal state [incarnation 1] Aug 13 00:55:21.750359 waagent[1516]: 2025-08-13T00:55:21.750225Z INFO Daemon Daemon Found private key matching thumbprint 8770AECB1F9AF9539860FDCA6C08D5B1DD49C8C0 Aug 13 00:55:21.757286 waagent[1516]: 2025-08-13T00:55:21.751865Z INFO Daemon Daemon Fetch goal state completed Aug 13 00:55:21.774694 waagent[1516]: 2025-08-13T00:55:21.774614Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 20898b44-83c4-4016-b1c1-6fe6d8c1f776 New eTag: 14867957599897959624] Aug 13 00:55:21.783046 waagent[1516]: 2025-08-13T00:55:21.776385Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Aug 13 00:55:21.813518 waagent[1516]: 2025-08-13T00:55:21.813419Z INFO Daemon Daemon Starting provisioning Aug 13 00:55:21.822118 waagent[1516]: 2025-08-13T00:55:21.815078Z INFO Daemon Daemon Handle ovf-env.xml. Aug 13 00:55:21.822118 waagent[1516]: 2025-08-13T00:55:21.816272Z INFO Daemon Daemon Set hostname [ci-3510.3.8-a-e88d8da36a] Aug 13 00:55:21.823621 waagent[1516]: 2025-08-13T00:55:21.823506Z INFO Daemon Daemon Publish hostname [ci-3510.3.8-a-e88d8da36a] Aug 13 00:55:21.832013 waagent[1516]: 2025-08-13T00:55:21.825140Z INFO Daemon Daemon Examine /proc/net/route for primary interface Aug 13 00:55:21.832013 waagent[1516]: 2025-08-13T00:55:21.826200Z INFO Daemon Daemon Primary interface is [eth0] Aug 13 00:55:21.839993 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Aug 13 00:55:21.840242 systemd[1]: Stopped systemd-networkd-wait-online.service. Aug 13 00:55:21.840319 systemd[1]: Stopping systemd-networkd-wait-online.service... Aug 13 00:55:21.840678 systemd[1]: Stopping systemd-networkd.service... Aug 13 00:55:21.846933 systemd-networkd[1190]: eth0: DHCPv6 lease lost Aug 13 00:55:21.848715 systemd[1]: systemd-networkd.service: Deactivated successfully. Aug 13 00:55:21.848895 systemd[1]: Stopped systemd-networkd.service. Aug 13 00:55:21.851570 systemd[1]: Starting systemd-networkd.service... Aug 13 00:55:21.884798 systemd-networkd[1585]: enP11705s1: Link UP Aug 13 00:55:21.884809 systemd-networkd[1585]: enP11705s1: Gained carrier Aug 13 00:55:21.886208 systemd-networkd[1585]: eth0: Link UP Aug 13 00:55:21.886218 systemd-networkd[1585]: eth0: Gained carrier Aug 13 00:55:21.886664 systemd-networkd[1585]: lo: Link UP Aug 13 00:55:21.886674 systemd-networkd[1585]: lo: Gained carrier Aug 13 00:55:21.887011 systemd-networkd[1585]: eth0: Gained IPv6LL Aug 13 00:55:21.887306 systemd-networkd[1585]: Enumeration completed Aug 13 00:55:21.887432 systemd[1]: Started systemd-networkd.service. Aug 13 00:55:21.889785 systemd[1]: Starting systemd-networkd-wait-online.service... Aug 13 00:55:21.892523 systemd-networkd[1585]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Aug 13 00:55:21.898748 waagent[1516]: 2025-08-13T00:55:21.898541Z INFO Daemon Daemon Create user account if not exists Aug 13 00:55:21.902592 waagent[1516]: 2025-08-13T00:55:21.900409Z INFO Daemon Daemon User core already exists, skip useradd Aug 13 00:55:21.902592 waagent[1516]: 2025-08-13T00:55:21.901240Z INFO Daemon Daemon Configure sudoer Aug 13 00:55:21.905257 waagent[1516]: 2025-08-13T00:55:21.905194Z INFO Daemon Daemon Configure sshd Aug 13 00:55:21.906087 waagent[1516]: 2025-08-13T00:55:21.906035Z INFO Daemon Daemon Deploy ssh public key. Aug 13 00:55:21.923965 systemd-networkd[1585]: eth0: DHCPv4 address 10.200.4.18/24, gateway 10.200.4.1 acquired from 168.63.129.16 Aug 13 00:55:21.927439 systemd[1]: Finished systemd-networkd-wait-online.service. Aug 13 00:55:23.091171 waagent[1516]: 2025-08-13T00:55:23.091052Z INFO Daemon Daemon Provisioning complete Aug 13 00:55:23.104799 waagent[1516]: 2025-08-13T00:55:23.104708Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Aug 13 00:55:23.108599 waagent[1516]: 2025-08-13T00:55:23.108514Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Aug 13 00:55:23.114538 waagent[1516]: 2025-08-13T00:55:23.114461Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Aug 13 00:55:23.389100 waagent[1593]: 2025-08-13T00:55:23.388993Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Aug 13 00:55:23.389936 waagent[1593]: 2025-08-13T00:55:23.389851Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Aug 13 00:55:23.390098 waagent[1593]: 2025-08-13T00:55:23.390044Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Aug 13 00:55:23.401365 waagent[1593]: 2025-08-13T00:55:23.401274Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Aug 13 00:55:23.401558 waagent[1593]: 2025-08-13T00:55:23.401497Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Aug 13 00:55:23.453762 waagent[1593]: 2025-08-13T00:55:23.453626Z INFO ExtHandler ExtHandler Found private key matching thumbprint 8770AECB1F9AF9539860FDCA6C08D5B1DD49C8C0 Aug 13 00:55:23.454098 waagent[1593]: 2025-08-13T00:55:23.454032Z INFO ExtHandler ExtHandler Fetch goal state completed Aug 13 00:55:23.467172 waagent[1593]: 2025-08-13T00:55:23.467104Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 6c32f077-a8f9-4622-87d4-87d922f9a117 New eTag: 14867957599897959624] Aug 13 00:55:23.467719 waagent[1593]: 2025-08-13T00:55:23.467658Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Aug 13 00:55:23.610913 waagent[1593]: 2025-08-13T00:55:23.610717Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.8; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Aug 13 00:55:23.670706 waagent[1593]: 2025-08-13T00:55:23.670534Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1593 Aug 13 00:55:23.674097 waagent[1593]: 2025-08-13T00:55:23.674022Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.8', '', 'Flatcar Container Linux by Kinvolk'] Aug 13 00:55:23.675284 waagent[1593]: 2025-08-13T00:55:23.675218Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Aug 13 00:55:24.027862 waagent[1593]: 2025-08-13T00:55:24.027709Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Aug 13 00:55:24.028407 waagent[1593]: 2025-08-13T00:55:24.028327Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Aug 13 00:55:24.036852 waagent[1593]: 2025-08-13T00:55:24.036789Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Aug 13 00:55:24.037399 waagent[1593]: 2025-08-13T00:55:24.037332Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Aug 13 00:55:24.038524 waagent[1593]: 2025-08-13T00:55:24.038453Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Aug 13 00:55:24.039849 waagent[1593]: 2025-08-13T00:55:24.039789Z INFO ExtHandler ExtHandler Starting env monitor service. Aug 13 00:55:24.040280 waagent[1593]: 2025-08-13T00:55:24.040223Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Aug 13 00:55:24.040438 waagent[1593]: 2025-08-13T00:55:24.040389Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Aug 13 00:55:24.040997 waagent[1593]: 2025-08-13T00:55:24.040940Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Aug 13 00:55:24.041429 waagent[1593]: 2025-08-13T00:55:24.041375Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Aug 13 00:55:24.042049 waagent[1593]: 2025-08-13T00:55:24.041996Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Aug 13 00:55:24.042406 waagent[1593]: 2025-08-13T00:55:24.042331Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Aug 13 00:55:24.042406 waagent[1593]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Aug 13 00:55:24.042406 waagent[1593]: eth0 00000000 0104C80A 0003 0 0 1024 00000000 0 0 0 Aug 13 00:55:24.042406 waagent[1593]: eth0 0004C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Aug 13 00:55:24.042406 waagent[1593]: eth0 0104C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Aug 13 00:55:24.042406 waagent[1593]: eth0 10813FA8 0104C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Aug 13 00:55:24.042406 waagent[1593]: eth0 FEA9FEA9 0104C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Aug 13 00:55:24.042721 waagent[1593]: 2025-08-13T00:55:24.042660Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Aug 13 00:55:24.042954 waagent[1593]: 2025-08-13T00:55:24.042896Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Aug 13 00:55:24.043638 waagent[1593]: 2025-08-13T00:55:24.043584Z INFO EnvHandler ExtHandler Configure routes Aug 13 00:55:24.043825 waagent[1593]: 2025-08-13T00:55:24.043775Z INFO EnvHandler ExtHandler Gateway:None Aug 13 00:55:24.044219 waagent[1593]: 2025-08-13T00:55:24.044167Z INFO EnvHandler ExtHandler Routes:None Aug 13 00:55:24.044360 waagent[1593]: 2025-08-13T00:55:24.044307Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Aug 13 00:55:24.049586 waagent[1593]: 2025-08-13T00:55:24.049505Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Aug 13 00:55:24.050126 waagent[1593]: 2025-08-13T00:55:24.050062Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Aug 13 00:55:24.050581 waagent[1593]: 2025-08-13T00:55:24.050526Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Aug 13 00:55:24.061657 waagent[1593]: 2025-08-13T00:55:24.061587Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Aug 13 00:55:24.063337 waagent[1593]: 2025-08-13T00:55:24.063285Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Aug 13 00:55:24.064475 waagent[1593]: 2025-08-13T00:55:24.064421Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Aug 13 00:55:24.103867 waagent[1593]: 2025-08-13T00:55:24.103787Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Aug 13 00:55:24.146725 waagent[1593]: 2025-08-13T00:55:24.146585Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1585' Aug 13 00:55:24.398760 waagent[1593]: 2025-08-13T00:55:24.398669Z INFO MonitorHandler ExtHandler Network interfaces: Aug 13 00:55:24.398760 waagent[1593]: Executing ['ip', '-a', '-o', 'link']: Aug 13 00:55:24.398760 waagent[1593]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Aug 13 00:55:24.398760 waagent[1593]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 7c:ed:8d:3a:65:e0 brd ff:ff:ff:ff:ff:ff Aug 13 00:55:24.398760 waagent[1593]: 3: enP11705s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 7c:ed:8d:3a:65:e0 brd ff:ff:ff:ff:ff:ff\ altname enP11705p0s2 Aug 13 00:55:24.398760 waagent[1593]: Executing ['ip', '-4', '-a', '-o', 'address']: Aug 13 00:55:24.398760 waagent[1593]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Aug 13 00:55:24.398760 waagent[1593]: 2: eth0 inet 10.200.4.18/24 metric 1024 brd 10.200.4.255 scope global eth0\ valid_lft forever preferred_lft forever Aug 13 00:55:24.398760 waagent[1593]: Executing ['ip', '-6', '-a', '-o', 'address']: Aug 13 00:55:24.398760 waagent[1593]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Aug 13 00:55:24.398760 waagent[1593]: 2: eth0 inet6 fe80::7eed:8dff:fe3a:65e0/64 scope link \ valid_lft forever preferred_lft forever Aug 13 00:55:24.411143 waagent[1593]: 2025-08-13T00:55:24.411076Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.14.0.1 -- exiting Aug 13 00:55:25.119396 waagent[1516]: 2025-08-13T00:55:25.119204Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Aug 13 00:55:25.125173 waagent[1516]: 2025-08-13T00:55:25.125104Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.14.0.1 to be the latest agent Aug 13 00:55:26.251334 waagent[1622]: 2025-08-13T00:55:26.251215Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.14.0.1) Aug 13 00:55:26.252107 waagent[1622]: 2025-08-13T00:55:26.252037Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.8 Aug 13 00:55:26.252277 waagent[1622]: 2025-08-13T00:55:26.252221Z INFO ExtHandler ExtHandler Python: 3.9.16 Aug 13 00:55:26.252437 waagent[1622]: 2025-08-13T00:55:26.252388Z INFO ExtHandler ExtHandler CPU Arch: x86_64 Aug 13 00:55:26.268545 waagent[1622]: 2025-08-13T00:55:26.268419Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.8; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: x86_64; systemd: True; systemd_version: systemd 252 (252); LISDrivers: Absent; logrotate: logrotate 3.20.1; Aug 13 00:55:26.269041 waagent[1622]: 2025-08-13T00:55:26.268969Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Aug 13 00:55:26.269233 waagent[1622]: 2025-08-13T00:55:26.269182Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Aug 13 00:55:26.269477 waagent[1622]: 2025-08-13T00:55:26.269424Z INFO ExtHandler ExtHandler Initializing the goal state... Aug 13 00:55:26.281503 waagent[1622]: 2025-08-13T00:55:26.281414Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Aug 13 00:55:26.304185 waagent[1622]: 2025-08-13T00:55:26.304106Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.175 Aug 13 00:55:26.305362 waagent[1622]: 2025-08-13T00:55:26.305291Z INFO ExtHandler Aug 13 00:55:26.305556 waagent[1622]: 2025-08-13T00:55:26.305501Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 81ebc8f7-c90e-4c47-a073-54b7aa4e460f eTag: 14867957599897959624 source: Fabric] Aug 13 00:55:26.306376 waagent[1622]: 2025-08-13T00:55:26.306314Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Aug 13 00:55:26.307623 waagent[1622]: 2025-08-13T00:55:26.307550Z INFO ExtHandler Aug 13 00:55:26.307833 waagent[1622]: 2025-08-13T00:55:26.307775Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Aug 13 00:55:26.314239 waagent[1622]: 2025-08-13T00:55:26.314184Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Aug 13 00:55:26.314739 waagent[1622]: 2025-08-13T00:55:26.314688Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Aug 13 00:55:26.332225 waagent[1622]: 2025-08-13T00:55:26.332158Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Aug 13 00:55:26.390013 waagent[1622]: 2025-08-13T00:55:26.389847Z INFO ExtHandler Downloaded certificate {'thumbprint': '8770AECB1F9AF9539860FDCA6C08D5B1DD49C8C0', 'hasPrivateKey': True} Aug 13 00:55:26.391358 waagent[1622]: 2025-08-13T00:55:26.391290Z INFO ExtHandler Fetch goal state from WireServer completed Aug 13 00:55:26.392229 waagent[1622]: 2025-08-13T00:55:26.392167Z INFO ExtHandler ExtHandler Goal state initialization completed. Aug 13 00:55:26.408533 waagent[1622]: 2025-08-13T00:55:26.408422Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.15 3 Sep 2024 (Library: OpenSSL 3.0.15 3 Sep 2024) Aug 13 00:55:26.417228 waagent[1622]: 2025-08-13T00:55:26.417122Z INFO ExtHandler ExtHandler Using iptables [version 1.8.8] to manage firewall rules Aug 13 00:55:26.420982 waagent[1622]: 2025-08-13T00:55:26.420866Z INFO ExtHandler ExtHandler Did not find a legacy firewall rule: ['iptables', '-w', '-t', 'security', '-C', 'OUTPUT', '-d', '168.63.129.16', '-p', 'tcp', '-m', 'conntrack', '--ctstate', 'INVALID,NEW', '-j', 'ACCEPT'] Aug 13 00:55:26.421226 waagent[1622]: 2025-08-13T00:55:26.421172Z INFO ExtHandler ExtHandler Checking state of the firewall Aug 13 00:55:26.477088 waagent[1622]: 2025-08-13T00:55:26.476962Z INFO ExtHandler ExtHandler Created firewall rules for Azure Fabric: Aug 13 00:55:26.477088 waagent[1622]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Aug 13 00:55:26.477088 waagent[1622]: pkts bytes target prot opt in out source destination Aug 13 00:55:26.477088 waagent[1622]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Aug 13 00:55:26.477088 waagent[1622]: pkts bytes target prot opt in out source destination Aug 13 00:55:26.477088 waagent[1622]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Aug 13 00:55:26.477088 waagent[1622]: pkts bytes target prot opt in out source destination Aug 13 00:55:26.477088 waagent[1622]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Aug 13 00:55:26.477088 waagent[1622]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Aug 13 00:55:26.477088 waagent[1622]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Aug 13 00:55:26.478290 waagent[1622]: 2025-08-13T00:55:26.478216Z INFO ExtHandler ExtHandler Setting up persistent firewall rules Aug 13 00:55:26.481147 waagent[1622]: 2025-08-13T00:55:26.481044Z INFO ExtHandler ExtHandler The firewalld service is not present on the system Aug 13 00:55:26.481426 waagent[1622]: 2025-08-13T00:55:26.481372Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Aug 13 00:55:26.481797 waagent[1622]: 2025-08-13T00:55:26.481740Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Aug 13 00:55:26.490240 waagent[1622]: 2025-08-13T00:55:26.490180Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Aug 13 00:55:26.490756 waagent[1622]: 2025-08-13T00:55:26.490697Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Aug 13 00:55:26.498358 waagent[1622]: 2025-08-13T00:55:26.498273Z INFO ExtHandler ExtHandler WALinuxAgent-2.14.0.1 running as process 1622 Aug 13 00:55:26.501552 waagent[1622]: 2025-08-13T00:55:26.501426Z INFO ExtHandler ExtHandler [CGI] Cgroups is not currently supported on ['flatcar', '3510.3.8', '', 'Flatcar Container Linux by Kinvolk'] Aug 13 00:55:26.502361 waagent[1622]: 2025-08-13T00:55:26.502295Z INFO ExtHandler ExtHandler [CGI] Agent will reset the quotas in case cgroup usage went from enabled to disabled Aug 13 00:55:26.503266 waagent[1622]: 2025-08-13T00:55:26.503203Z INFO ExtHandler ExtHandler [CGI] Agent cgroups enabled: False Aug 13 00:55:26.505812 waagent[1622]: 2025-08-13T00:55:26.505750Z INFO ExtHandler ExtHandler Signing certificate written to /var/lib/waagent/microsoft_root_certificate.pem Aug 13 00:55:26.506174 waagent[1622]: 2025-08-13T00:55:26.506118Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: 1. configuration enabled [True], 2. cgroups v1 enabled [False] OR cgroups v2 is in use and v2 resource limiting configuration enabled [False], 3. python supported: [True] Aug 13 00:55:26.507494 waagent[1622]: 2025-08-13T00:55:26.507435Z INFO ExtHandler ExtHandler Starting env monitor service. Aug 13 00:55:26.507750 waagent[1622]: 2025-08-13T00:55:26.507697Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Aug 13 00:55:26.508186 waagent[1622]: 2025-08-13T00:55:26.508129Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Aug 13 00:55:26.508715 waagent[1622]: 2025-08-13T00:55:26.508657Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Aug 13 00:55:26.509447 waagent[1622]: 2025-08-13T00:55:26.509392Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Aug 13 00:55:26.509447 waagent[1622]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Aug 13 00:55:26.509447 waagent[1622]: eth0 00000000 0104C80A 0003 0 0 1024 00000000 0 0 0 Aug 13 00:55:26.509447 waagent[1622]: eth0 0004C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Aug 13 00:55:26.509447 waagent[1622]: eth0 0104C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Aug 13 00:55:26.509447 waagent[1622]: eth0 10813FA8 0104C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Aug 13 00:55:26.509447 waagent[1622]: eth0 FEA9FEA9 0104C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Aug 13 00:55:26.509740 waagent[1622]: 2025-08-13T00:55:26.509577Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Aug 13 00:55:26.509809 waagent[1622]: 2025-08-13T00:55:26.509756Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Aug 13 00:55:26.510309 waagent[1622]: 2025-08-13T00:55:26.510254Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Aug 13 00:55:26.513955 waagent[1622]: 2025-08-13T00:55:26.513744Z INFO EnvHandler ExtHandler Configure routes Aug 13 00:55:26.514365 waagent[1622]: 2025-08-13T00:55:26.514312Z INFO EnvHandler ExtHandler Gateway:None Aug 13 00:55:26.514703 waagent[1622]: 2025-08-13T00:55:26.514650Z INFO EnvHandler ExtHandler Routes:None Aug 13 00:55:26.520008 waagent[1622]: 2025-08-13T00:55:26.519869Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Aug 13 00:55:26.520435 waagent[1622]: 2025-08-13T00:55:26.520375Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Aug 13 00:55:26.529503 waagent[1622]: 2025-08-13T00:55:26.529410Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Aug 13 00:55:26.533325 waagent[1622]: 2025-08-13T00:55:26.529032Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Aug 13 00:55:26.533686 waagent[1622]: 2025-08-13T00:55:26.533612Z INFO MonitorHandler ExtHandler Network interfaces: Aug 13 00:55:26.533686 waagent[1622]: Executing ['ip', '-a', '-o', 'link']: Aug 13 00:55:26.533686 waagent[1622]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Aug 13 00:55:26.533686 waagent[1622]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 7c:ed:8d:3a:65:e0 brd ff:ff:ff:ff:ff:ff Aug 13 00:55:26.533686 waagent[1622]: 3: enP11705s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 7c:ed:8d:3a:65:e0 brd ff:ff:ff:ff:ff:ff\ altname enP11705p0s2 Aug 13 00:55:26.533686 waagent[1622]: Executing ['ip', '-4', '-a', '-o', 'address']: Aug 13 00:55:26.533686 waagent[1622]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Aug 13 00:55:26.533686 waagent[1622]: 2: eth0 inet 10.200.4.18/24 metric 1024 brd 10.200.4.255 scope global eth0\ valid_lft forever preferred_lft forever Aug 13 00:55:26.533686 waagent[1622]: Executing ['ip', '-6', '-a', '-o', 'address']: Aug 13 00:55:26.533686 waagent[1622]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Aug 13 00:55:26.533686 waagent[1622]: 2: eth0 inet6 fe80::7eed:8dff:fe3a:65e0/64 scope link \ valid_lft forever preferred_lft forever Aug 13 00:55:26.534153 waagent[1622]: 2025-08-13T00:55:26.533920Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Aug 13 00:55:26.548507 waagent[1622]: 2025-08-13T00:55:26.548320Z INFO ExtHandler ExtHandler Downloading agent manifest Aug 13 00:55:26.565059 waagent[1622]: 2025-08-13T00:55:26.564987Z INFO ExtHandler ExtHandler Aug 13 00:55:26.566073 waagent[1622]: 2025-08-13T00:55:26.566013Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 566631b2-a9ab-4125-8805-1bc8fb47e496 correlation f8d87373-8d2d-4a6e-892c-bb7345ebef91 created: 2025-08-13T00:53:36.837875Z] Aug 13 00:55:26.569818 waagent[1622]: 2025-08-13T00:55:26.569761Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Aug 13 00:55:26.574181 waagent[1622]: 2025-08-13T00:55:26.574122Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 9 ms] Aug 13 00:55:26.583484 waagent[1622]: 2025-08-13T00:55:26.583407Z INFO EnvHandler ExtHandler Using iptables [version 1.8.8] to manage firewall rules Aug 13 00:55:26.599986 waagent[1622]: 2025-08-13T00:55:26.599908Z INFO ExtHandler ExtHandler Looking for existing remote access users. Aug 13 00:55:26.606730 waagent[1622]: 2025-08-13T00:55:26.606660Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.14.0.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 3C7F39D3-FB2B-4091-BB1B-0D9F5CDAE076;UpdateGSErrors: 0;AutoUpdate: 1;UpdateMode: SelfUpdate;] Aug 13 00:55:26.606928 waagent[1622]: 2025-08-13T00:55:26.606783Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Aug 13 00:55:30.597577 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Aug 13 00:55:30.597960 systemd[1]: Stopped kubelet.service. Aug 13 00:55:30.600068 systemd[1]: Starting kubelet.service... Aug 13 00:55:30.938832 systemd[1]: Started kubelet.service. Aug 13 00:55:30.976775 kubelet[1667]: E0813 00:55:30.976720 1667 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Aug 13 00:55:30.978401 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Aug 13 00:55:30.978571 systemd[1]: kubelet.service: Failed with result 'exit-code'. Aug 13 00:55:38.939673 kernel: hv_balloon: Max. dynamic memory size: 8192 MB Aug 13 00:55:41.097633 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Aug 13 00:55:41.097989 systemd[1]: Stopped kubelet.service. Aug 13 00:55:41.100089 systemd[1]: Starting kubelet.service... Aug 13 00:55:41.439075 systemd[1]: Started kubelet.service. Aug 13 00:55:41.867886 kubelet[1677]: E0813 00:55:41.867832 1677 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Aug 13 00:55:41.869499 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Aug 13 00:55:41.869666 systemd[1]: kubelet.service: Failed with result 'exit-code'. Aug 13 00:55:52.097600 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Aug 13 00:55:52.097974 systemd[1]: Stopped kubelet.service. Aug 13 00:55:52.100175 systemd[1]: Starting kubelet.service... Aug 13 00:55:52.438979 systemd[1]: Started kubelet.service. Aug 13 00:55:52.478995 kubelet[1689]: E0813 00:55:52.478942 1689 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Aug 13 00:55:52.480581 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Aug 13 00:55:52.480750 systemd[1]: kubelet.service: Failed with result 'exit-code'. Aug 13 00:55:53.872187 systemd[1]: Created slice system-sshd.slice. Aug 13 00:55:53.874260 systemd[1]: Started sshd@0-10.200.4.18:22-10.200.16.10:56930.service. Aug 13 00:55:54.410820 update_engine[1426]: I0813 00:55:54.410737 1426 update_attempter.cc:509] Updating boot flags... Aug 13 00:55:54.524401 sshd[1695]: Accepted publickey for core from 10.200.16.10 port 56930 ssh2: RSA SHA256:rG+KMDo131ToO+q3jk0DRYylimwUFMitj1EQgQc6PF0 Aug 13 00:55:54.525901 sshd[1695]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 00:55:54.529391 systemd-logind[1425]: New session 3 of user core. Aug 13 00:55:54.530836 systemd[1]: Started session-3.scope. Aug 13 00:55:55.048350 systemd[1]: Started sshd@1-10.200.4.18:22-10.200.16.10:56942.service. Aug 13 00:55:55.643886 sshd[1766]: Accepted publickey for core from 10.200.16.10 port 56942 ssh2: RSA SHA256:rG+KMDo131ToO+q3jk0DRYylimwUFMitj1EQgQc6PF0 Aug 13 00:55:55.645584 sshd[1766]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 00:55:55.650742 systemd[1]: Started session-4.scope. Aug 13 00:55:55.651397 systemd-logind[1425]: New session 4 of user core. Aug 13 00:55:56.075862 sshd[1766]: pam_unix(sshd:session): session closed for user core Aug 13 00:55:56.079182 systemd[1]: sshd@1-10.200.4.18:22-10.200.16.10:56942.service: Deactivated successfully. Aug 13 00:55:56.080095 systemd[1]: session-4.scope: Deactivated successfully. Aug 13 00:55:56.080723 systemd-logind[1425]: Session 4 logged out. Waiting for processes to exit. Aug 13 00:55:56.081532 systemd-logind[1425]: Removed session 4. Aug 13 00:55:56.176203 systemd[1]: Started sshd@2-10.200.4.18:22-10.200.16.10:56946.service. Aug 13 00:55:56.772185 sshd[1772]: Accepted publickey for core from 10.200.16.10 port 56946 ssh2: RSA SHA256:rG+KMDo131ToO+q3jk0DRYylimwUFMitj1EQgQc6PF0 Aug 13 00:55:56.773913 sshd[1772]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 00:55:56.779403 systemd[1]: Started session-5.scope. Aug 13 00:55:56.779856 systemd-logind[1425]: New session 5 of user core. Aug 13 00:55:57.215742 sshd[1772]: pam_unix(sshd:session): session closed for user core Aug 13 00:55:57.218856 systemd[1]: sshd@2-10.200.4.18:22-10.200.16.10:56946.service: Deactivated successfully. Aug 13 00:55:57.219735 systemd[1]: session-5.scope: Deactivated successfully. Aug 13 00:55:57.220365 systemd-logind[1425]: Session 5 logged out. Waiting for processes to exit. Aug 13 00:55:57.221149 systemd-logind[1425]: Removed session 5. Aug 13 00:55:57.315029 systemd[1]: Started sshd@3-10.200.4.18:22-10.200.16.10:56952.service. Aug 13 00:55:57.906903 sshd[1778]: Accepted publickey for core from 10.200.16.10 port 56952 ssh2: RSA SHA256:rG+KMDo131ToO+q3jk0DRYylimwUFMitj1EQgQc6PF0 Aug 13 00:55:57.908683 sshd[1778]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 00:55:57.914537 systemd[1]: Started session-6.scope. Aug 13 00:55:57.915159 systemd-logind[1425]: New session 6 of user core. Aug 13 00:55:58.329564 sshd[1778]: pam_unix(sshd:session): session closed for user core Aug 13 00:55:58.333264 systemd[1]: sshd@3-10.200.4.18:22-10.200.16.10:56952.service: Deactivated successfully. Aug 13 00:55:58.334204 systemd[1]: session-6.scope: Deactivated successfully. Aug 13 00:55:58.334864 systemd-logind[1425]: Session 6 logged out. Waiting for processes to exit. Aug 13 00:55:58.335733 systemd-logind[1425]: Removed session 6. Aug 13 00:55:58.429163 systemd[1]: Started sshd@4-10.200.4.18:22-10.200.16.10:56966.service. Aug 13 00:55:59.025453 sshd[1784]: Accepted publickey for core from 10.200.16.10 port 56966 ssh2: RSA SHA256:rG+KMDo131ToO+q3jk0DRYylimwUFMitj1EQgQc6PF0 Aug 13 00:55:59.027235 sshd[1784]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 00:55:59.032886 systemd[1]: Started session-7.scope. Aug 13 00:55:59.033499 systemd-logind[1425]: New session 7 of user core. Aug 13 00:55:59.418421 sudo[1787]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Aug 13 00:55:59.418742 sudo[1787]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Aug 13 00:55:59.430092 dbus-daemon[1412]: \xd0\u001d\xf8\x8e\x80U: received setenforce notice (enforcing=60501744) Aug 13 00:55:59.432013 sudo[1787]: pam_unix(sudo:session): session closed for user root Aug 13 00:55:59.537947 sshd[1784]: pam_unix(sshd:session): session closed for user core Aug 13 00:55:59.541853 systemd[1]: sshd@4-10.200.4.18:22-10.200.16.10:56966.service: Deactivated successfully. Aug 13 00:55:59.543062 systemd[1]: session-7.scope: Deactivated successfully. Aug 13 00:55:59.543945 systemd-logind[1425]: Session 7 logged out. Waiting for processes to exit. Aug 13 00:55:59.545033 systemd-logind[1425]: Removed session 7. Aug 13 00:55:59.638073 systemd[1]: Started sshd@5-10.200.4.18:22-10.200.16.10:56976.service. Aug 13 00:56:00.233990 sshd[1791]: Accepted publickey for core from 10.200.16.10 port 56976 ssh2: RSA SHA256:rG+KMDo131ToO+q3jk0DRYylimwUFMitj1EQgQc6PF0 Aug 13 00:56:00.235800 sshd[1791]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 00:56:00.241703 systemd[1]: Started session-8.scope. Aug 13 00:56:00.242342 systemd-logind[1425]: New session 8 of user core. Aug 13 00:56:00.562691 sudo[1795]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Aug 13 00:56:00.563013 sudo[1795]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Aug 13 00:56:00.566107 sudo[1795]: pam_unix(sudo:session): session closed for user root Aug 13 00:56:00.571085 sudo[1794]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Aug 13 00:56:00.571382 sudo[1794]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Aug 13 00:56:00.580747 systemd[1]: Stopping audit-rules.service... Aug 13 00:56:00.581000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Aug 13 00:56:00.585047 auditctl[1798]: No rules Aug 13 00:56:00.593651 kernel: kauditd_printk_skb: 57 callbacks suppressed Aug 13 00:56:00.593751 kernel: audit: type=1305 audit(1755046560.581:226): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Aug 13 00:56:00.593784 kernel: audit: type=1300 audit(1755046560.581:226): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffc36ddec0 a2=420 a3=0 items=0 ppid=1 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:00.581000 audit[1798]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffc36ddec0 a2=420 a3=0 items=0 ppid=1 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:00.585518 systemd[1]: audit-rules.service: Deactivated successfully. Aug 13 00:56:00.585694 systemd[1]: Stopped audit-rules.service. Aug 13 00:56:00.594653 systemd[1]: Starting audit-rules.service... Aug 13 00:56:00.581000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Aug 13 00:56:00.615211 kernel: audit: type=1327 audit(1755046560.581:226): proctitle=2F7362696E2F617564697463746C002D44 Aug 13 00:56:00.584000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:00.617957 augenrules[1815]: No rules Aug 13 00:56:00.618901 systemd[1]: Finished audit-rules.service. Aug 13 00:56:00.619972 sudo[1794]: pam_unix(sudo:session): session closed for user root Aug 13 00:56:00.626846 kernel: audit: type=1131 audit(1755046560.584:227): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:00.626930 kernel: audit: type=1130 audit(1755046560.618:228): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:00.618000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:00.638902 kernel: audit: type=1106 audit(1755046560.619:229): pid=1794 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Aug 13 00:56:00.619000 audit[1794]: USER_END pid=1794 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Aug 13 00:56:00.619000 audit[1794]: CRED_DISP pid=1794 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Aug 13 00:56:00.663917 kernel: audit: type=1104 audit(1755046560.619:230): pid=1794 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Aug 13 00:56:00.723614 sshd[1791]: pam_unix(sshd:session): session closed for user core Aug 13 00:56:00.724000 audit[1791]: USER_END pid=1791 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Aug 13 00:56:00.727417 systemd[1]: sshd@5-10.200.4.18:22-10.200.16.10:56976.service: Deactivated successfully. Aug 13 00:56:00.728312 systemd[1]: session-8.scope: Deactivated successfully. Aug 13 00:56:00.729833 systemd-logind[1425]: Session 8 logged out. Waiting for processes to exit. Aug 13 00:56:00.730984 systemd-logind[1425]: Removed session 8. Aug 13 00:56:00.724000 audit[1791]: CRED_DISP pid=1791 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Aug 13 00:56:00.755958 kernel: audit: type=1106 audit(1755046560.724:231): pid=1791 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Aug 13 00:56:00.756041 kernel: audit: type=1104 audit(1755046560.724:232): pid=1791 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Aug 13 00:56:00.756070 kernel: audit: type=1131 audit(1755046560.726:233): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.4.18:22-10.200.16.10:56976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:00.726000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.4.18:22-10.200.16.10:56976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:00.824299 systemd[1]: Started sshd@6-10.200.4.18:22-10.200.16.10:45600.service. Aug 13 00:56:00.823000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.4.18:22-10.200.16.10:45600 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:01.415000 audit[1821]: USER_ACCT pid=1821 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Aug 13 00:56:01.417044 sshd[1821]: Accepted publickey for core from 10.200.16.10 port 45600 ssh2: RSA SHA256:rG+KMDo131ToO+q3jk0DRYylimwUFMitj1EQgQc6PF0 Aug 13 00:56:01.417000 audit[1821]: CRED_ACQ pid=1821 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Aug 13 00:56:01.417000 audit[1821]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc7285370 a2=3 a3=0 items=0 ppid=1 pid=1821 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:01.417000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Aug 13 00:56:01.418673 sshd[1821]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Aug 13 00:56:01.423997 systemd[1]: Started session-9.scope. Aug 13 00:56:01.424687 systemd-logind[1425]: New session 9 of user core. Aug 13 00:56:01.428000 audit[1821]: USER_START pid=1821 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Aug 13 00:56:01.430000 audit[1823]: CRED_ACQ pid=1823 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Aug 13 00:56:01.743000 audit[1824]: USER_ACCT pid=1824 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Aug 13 00:56:01.744000 audit[1824]: CRED_REFR pid=1824 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Aug 13 00:56:01.744978 sudo[1824]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Aug 13 00:56:01.745375 sudo[1824]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Aug 13 00:56:01.746000 audit[1824]: USER_START pid=1824 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Aug 13 00:56:01.762241 systemd[1]: Starting coreos-metadata.service... Aug 13 00:56:01.809660 coreos-metadata[1828]: Aug 13 00:56:01.809 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Aug 13 00:56:01.812383 coreos-metadata[1828]: Aug 13 00:56:01.812 INFO Fetch successful Aug 13 00:56:01.812680 coreos-metadata[1828]: Aug 13 00:56:01.812 INFO Fetching http://168.63.129.16/machine/?comp=goalstate: Attempt #1 Aug 13 00:56:01.814569 coreos-metadata[1828]: Aug 13 00:56:01.814 INFO Fetch successful Aug 13 00:56:01.814569 coreos-metadata[1828]: Aug 13 00:56:01.814 INFO Fetching http://168.63.129.16/machine/ebe2b1c7-a811-473f-9008-4ddb12f52579/088bed9c%2Dfd02%2D4ed7%2D8b1b%2Dfa1114e6d1e1.%5Fci%2D3510.3.8%2Da%2De88d8da36a?comp=config&type=sharedConfig&incarnation=1: Attempt #1 Aug 13 00:56:01.816518 coreos-metadata[1828]: Aug 13 00:56:01.816 INFO Fetch successful Aug 13 00:56:01.850429 coreos-metadata[1828]: Aug 13 00:56:01.850 INFO Fetching http://169.254.169.254/metadata/instance/compute/vmSize?api-version=2017-08-01&format=text: Attempt #1 Aug 13 00:56:01.859024 coreos-metadata[1828]: Aug 13 00:56:01.858 INFO Fetch successful Aug 13 00:56:01.868477 systemd[1]: Finished coreos-metadata.service. Aug 13 00:56:01.867000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:02.395640 systemd[1]: Stopped kubelet.service. Aug 13 00:56:02.394000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:02.395000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:02.398588 systemd[1]: Starting kubelet.service... Aug 13 00:56:02.438241 systemd[1]: Reloading. Aug 13 00:56:02.535523 /usr/lib/systemd/system-generators/torcx-generator[1881]: time="2025-08-13T00:56:02Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Aug 13 00:56:02.535567 /usr/lib/systemd/system-generators/torcx-generator[1881]: time="2025-08-13T00:56:02Z" level=info msg="torcx already run" Aug 13 00:56:02.662361 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Aug 13 00:56:02.662384 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Aug 13 00:56:02.679160 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Aug 13 00:56:02.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.753000 audit: BPF prog-id=47 op=LOAD Aug 13 00:56:02.753000 audit: BPF prog-id=30 op=UNLOAD Aug 13 00:56:02.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.753000 audit: BPF prog-id=48 op=LOAD Aug 13 00:56:02.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.753000 audit: BPF prog-id=49 op=LOAD Aug 13 00:56:02.753000 audit: BPF prog-id=31 op=UNLOAD Aug 13 00:56:02.754000 audit: BPF prog-id=32 op=UNLOAD Aug 13 00:56:02.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.755000 audit: BPF prog-id=50 op=LOAD Aug 13 00:56:02.755000 audit: BPF prog-id=40 op=UNLOAD Aug 13 00:56:02.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.756000 audit: BPF prog-id=51 op=LOAD Aug 13 00:56:02.756000 audit: BPF prog-id=33 op=UNLOAD Aug 13 00:56:02.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.756000 audit: BPF prog-id=52 op=LOAD Aug 13 00:56:02.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.756000 audit: BPF prog-id=53 op=LOAD Aug 13 00:56:02.756000 audit: BPF prog-id=34 op=UNLOAD Aug 13 00:56:02.756000 audit: BPF prog-id=35 op=UNLOAD Aug 13 00:56:02.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.758000 audit: BPF prog-id=54 op=LOAD Aug 13 00:56:02.758000 audit: BPF prog-id=46 op=UNLOAD Aug 13 00:56:02.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.760000 audit: BPF prog-id=55 op=LOAD Aug 13 00:56:02.760000 audit: BPF prog-id=44 op=UNLOAD Aug 13 00:56:02.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.762000 audit: BPF prog-id=56 op=LOAD Aug 13 00:56:02.762000 audit: BPF prog-id=41 op=UNLOAD Aug 13 00:56:02.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.762000 audit: BPF prog-id=57 op=LOAD Aug 13 00:56:02.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.762000 audit: BPF prog-id=58 op=LOAD Aug 13 00:56:02.762000 audit: BPF prog-id=42 op=UNLOAD Aug 13 00:56:02.762000 audit: BPF prog-id=43 op=UNLOAD Aug 13 00:56:02.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.765000 audit: BPF prog-id=59 op=LOAD Aug 13 00:56:02.765000 audit: BPF prog-id=39 op=UNLOAD Aug 13 00:56:02.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.766000 audit: BPF prog-id=60 op=LOAD Aug 13 00:56:02.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:02.766000 audit: BPF prog-id=61 op=LOAD Aug 13 00:56:02.766000 audit: BPF prog-id=37 op=UNLOAD Aug 13 00:56:02.766000 audit: BPF prog-id=38 op=UNLOAD Aug 13 00:56:02.853209 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Aug 13 00:56:02.853352 systemd[1]: kubelet.service: Failed with result 'signal'. Aug 13 00:56:02.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Aug 13 00:56:02.853772 systemd[1]: Stopped kubelet.service. Aug 13 00:56:02.856291 systemd[1]: Starting kubelet.service... Aug 13 00:56:03.284000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:03.284688 systemd[1]: Started kubelet.service. Aug 13 00:56:03.971334 kubelet[1948]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Aug 13 00:56:03.971334 kubelet[1948]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Aug 13 00:56:03.971334 kubelet[1948]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Aug 13 00:56:03.972045 kubelet[1948]: I0813 00:56:03.971418 1948 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Aug 13 00:56:04.496256 kubelet[1948]: I0813 00:56:04.496212 1948 server.go:520] "Kubelet version" kubeletVersion="v1.32.4" Aug 13 00:56:04.496256 kubelet[1948]: I0813 00:56:04.496244 1948 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Aug 13 00:56:04.496606 kubelet[1948]: I0813 00:56:04.496584 1948 server.go:954] "Client rotation is on, will bootstrap in background" Aug 13 00:56:04.555843 kubelet[1948]: I0813 00:56:04.555803 1948 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Aug 13 00:56:04.566293 kubelet[1948]: E0813 00:56:04.565790 1948 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Aug 13 00:56:04.566293 kubelet[1948]: I0813 00:56:04.565842 1948 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Aug 13 00:56:04.583529 kubelet[1948]: I0813 00:56:04.583497 1948 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Aug 13 00:56:04.585299 kubelet[1948]: I0813 00:56:04.585248 1948 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Aug 13 00:56:04.585606 kubelet[1948]: I0813 00:56:04.585418 1948 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.200.4.18","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Aug 13 00:56:04.585606 kubelet[1948]: I0813 00:56:04.585606 1948 topology_manager.go:138] "Creating topology manager with none policy" Aug 13 00:56:04.585841 kubelet[1948]: I0813 00:56:04.585621 1948 container_manager_linux.go:304] "Creating device plugin manager" Aug 13 00:56:04.585841 kubelet[1948]: I0813 00:56:04.585754 1948 state_mem.go:36] "Initialized new in-memory state store" Aug 13 00:56:04.588980 kubelet[1948]: I0813 00:56:04.588956 1948 kubelet.go:446] "Attempting to sync node with API server" Aug 13 00:56:04.589070 kubelet[1948]: I0813 00:56:04.588999 1948 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" Aug 13 00:56:04.589070 kubelet[1948]: I0813 00:56:04.589029 1948 kubelet.go:352] "Adding apiserver pod source" Aug 13 00:56:04.589070 kubelet[1948]: I0813 00:56:04.589044 1948 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Aug 13 00:56:04.589596 kubelet[1948]: E0813 00:56:04.589542 1948 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:04.594161 kubelet[1948]: E0813 00:56:04.593284 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:04.594945 kubelet[1948]: I0813 00:56:04.594925 1948 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Aug 13 00:56:04.595547 kubelet[1948]: I0813 00:56:04.595521 1948 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Aug 13 00:56:04.595633 kubelet[1948]: W0813 00:56:04.595589 1948 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Aug 13 00:56:04.606999 kubelet[1948]: I0813 00:56:04.606972 1948 watchdog_linux.go:99] "Systemd watchdog is not enabled" Aug 13 00:56:04.607130 kubelet[1948]: I0813 00:56:04.607016 1948 server.go:1287] "Started kubelet" Aug 13 00:56:04.618944 kubelet[1948]: I0813 00:56:04.618860 1948 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Aug 13 00:56:04.619507 kubelet[1948]: I0813 00:56:04.619483 1948 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Aug 13 00:56:04.619731 kubelet[1948]: I0813 00:56:04.619703 1948 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 Aug 13 00:56:04.618000 audit[1948]: AVC avc: denied { mac_admin } for pid=1948 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:04.618000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Aug 13 00:56:04.618000 audit[1948]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a74e40 a1=c0008a3068 a2=c000a74e10 a3=25 items=0 ppid=1 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:04.618000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Aug 13 00:56:04.619000 audit[1948]: AVC avc: denied { mac_admin } for pid=1948 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:04.619000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Aug 13 00:56:04.619000 audit[1948]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00043e380 a1=c0008a3080 a2=c000a74ed0 a3=25 items=0 ppid=1 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:04.619000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Aug 13 00:56:04.620440 kubelet[1948]: I0813 00:56:04.619884 1948 kubelet.go:1507] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Aug 13 00:56:04.620440 kubelet[1948]: I0813 00:56:04.619935 1948 kubelet.go:1511] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Aug 13 00:56:04.620440 kubelet[1948]: I0813 00:56:04.620025 1948 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Aug 13 00:56:04.621770 kubelet[1948]: I0813 00:56:04.621750 1948 server.go:479] "Adding debug handlers to kubelet server" Aug 13 00:56:04.622000 audit[1961]: NETFILTER_CFG table=mangle:5 family=2 entries=2 op=nft_register_chain pid=1961 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:04.622000 audit[1961]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc82d21100 a2=0 a3=7ffc82d210ec items=0 ppid=1948 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:04.622000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Aug 13 00:56:04.625552 kubelet[1948]: I0813 00:56:04.625530 1948 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Aug 13 00:56:04.624000 audit[1962]: NETFILTER_CFG table=filter:6 family=2 entries=2 op=nft_register_chain pid=1962 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:04.624000 audit[1962]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffc9dcc93f0 a2=0 a3=7ffc9dcc93dc items=0 ppid=1948 pid=1962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:04.624000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Aug 13 00:56:04.627171 kubelet[1948]: I0813 00:56:04.627150 1948 volume_manager.go:297] "Starting Kubelet Volume Manager" Aug 13 00:56:04.627420 kubelet[1948]: E0813 00:56:04.627396 1948 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.200.4.18\" not found" Aug 13 00:56:04.628800 kubelet[1948]: I0813 00:56:04.628786 1948 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Aug 13 00:56:04.628000 audit[1964]: NETFILTER_CFG table=filter:7 family=2 entries=2 op=nft_register_chain pid=1964 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:04.628000 audit[1964]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd132d6950 a2=0 a3=7ffd132d693c items=0 ppid=1948 pid=1964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:04.628000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Aug 13 00:56:04.629991 kubelet[1948]: I0813 00:56:04.629652 1948 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Aug 13 00:56:04.631465 kubelet[1948]: E0813 00:56:04.631447 1948 kubelet.go:1555] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Aug 13 00:56:04.632096 kubelet[1948]: I0813 00:56:04.632081 1948 reconciler.go:26] "Reconciler: start to sync state" Aug 13 00:56:04.632395 kubelet[1948]: I0813 00:56:04.632379 1948 factory.go:221] Registration of the containerd container factory successfully Aug 13 00:56:04.632496 kubelet[1948]: I0813 00:56:04.632486 1948 factory.go:221] Registration of the systemd container factory successfully Aug 13 00:56:04.632000 audit[1966]: NETFILTER_CFG table=filter:8 family=2 entries=2 op=nft_register_chain pid=1966 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:04.632000 audit[1966]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffff2adf2a0 a2=0 a3=7ffff2adf28c items=0 ppid=1948 pid=1966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:04.632000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Aug 13 00:56:04.652845 kubelet[1948]: E0813 00:56:04.652800 1948 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.200.4.18\" not found" node="10.200.4.18" Aug 13 00:56:04.654000 audit[1973]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1973 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:04.654000 audit[1973]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff85d0d170 a2=0 a3=7fff85d0d15c items=0 ppid=1948 pid=1973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:04.654000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Aug 13 00:56:04.656176 kubelet[1948]: I0813 00:56:04.656115 1948 cpu_manager.go:221] "Starting CPU manager" policy="none" Aug 13 00:56:04.656176 kubelet[1948]: I0813 00:56:04.656129 1948 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Aug 13 00:56:04.656176 kubelet[1948]: I0813 00:56:04.656150 1948 state_mem.go:36] "Initialized new in-memory state store" Aug 13 00:56:04.656616 kubelet[1948]: I0813 00:56:04.656567 1948 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Aug 13 00:56:04.656000 audit[1974]: NETFILTER_CFG table=mangle:10 family=10 entries=2 op=nft_register_chain pid=1974 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:04.656000 audit[1974]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff830b5ca0 a2=0 a3=7fff830b5c8c items=0 ppid=1948 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:04.656000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Aug 13 00:56:04.659494 kubelet[1948]: I0813 00:56:04.657854 1948 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Aug 13 00:56:04.659494 kubelet[1948]: I0813 00:56:04.657889 1948 status_manager.go:227] "Starting to sync pod status with apiserver" Aug 13 00:56:04.659494 kubelet[1948]: I0813 00:56:04.657913 1948 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Aug 13 00:56:04.659494 kubelet[1948]: I0813 00:56:04.657921 1948 kubelet.go:2382] "Starting kubelet main sync loop" Aug 13 00:56:04.659494 kubelet[1948]: E0813 00:56:04.658042 1948 kubelet.go:2406] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Aug 13 00:56:04.660550 kubelet[1948]: I0813 00:56:04.660526 1948 policy_none.go:49] "None policy: Start" Aug 13 00:56:04.660550 kubelet[1948]: I0813 00:56:04.660552 1948 memory_manager.go:186] "Starting memorymanager" policy="None" Aug 13 00:56:04.660685 kubelet[1948]: I0813 00:56:04.660566 1948 state_mem.go:35] "Initializing new in-memory state store" Aug 13 00:56:04.659000 audit[1976]: NETFILTER_CFG table=mangle:11 family=10 entries=1 op=nft_register_chain pid=1976 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:04.659000 audit[1976]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff897bd640 a2=0 a3=7fff897bd62c items=0 ppid=1948 pid=1976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:04.660000 audit[1975]: NETFILTER_CFG table=mangle:12 family=2 entries=1 op=nft_register_chain pid=1975 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:04.660000 audit[1975]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff0cf3bfc0 a2=0 a3=7fff0cf3bfac items=0 ppid=1948 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:04.660000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Aug 13 00:56:04.659000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Aug 13 00:56:04.661000 audit[1978]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1978 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:04.661000 audit[1978]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fffd5c6f8a0 a2=0 a3=7fffd5c6f88c items=0 ppid=1948 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:04.661000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Aug 13 00:56:04.662000 audit[1979]: NETFILTER_CFG table=nat:14 family=10 entries=2 op=nft_register_chain pid=1979 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:04.662000 audit[1979]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd0e555780 a2=0 a3=7ffd0e55576c items=0 ppid=1948 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:04.662000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Aug 13 00:56:04.663000 audit[1981]: NETFILTER_CFG table=filter:15 family=10 entries=2 op=nft_register_chain pid=1981 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:04.664000 audit[1980]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_chain pid=1980 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:04.663000 audit[1981]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc9997dab0 a2=0 a3=7ffc9997da9c items=0 ppid=1948 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:04.663000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Aug 13 00:56:04.664000 audit[1980]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff65afb140 a2=0 a3=10e3 items=0 ppid=1948 pid=1980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:04.664000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Aug 13 00:56:04.668889 systemd[1]: Created slice kubepods.slice. Aug 13 00:56:04.673468 systemd[1]: Created slice kubepods-burstable.slice. Aug 13 00:56:04.678002 systemd[1]: Created slice kubepods-besteffort.slice. Aug 13 00:56:04.686664 kubelet[1948]: I0813 00:56:04.686639 1948 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Aug 13 00:56:04.686000 audit[1948]: AVC avc: denied { mac_admin } for pid=1948 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:04.686000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Aug 13 00:56:04.686000 audit[1948]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ec2120 a1=c000bf20a8 a2=c000ec20f0 a3=25 items=0 ppid=1 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:04.686000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Aug 13 00:56:04.687722 kubelet[1948]: I0813 00:56:04.687698 1948 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" Aug 13 00:56:04.688160 kubelet[1948]: I0813 00:56:04.688144 1948 eviction_manager.go:189] "Eviction manager: starting control loop" Aug 13 00:56:04.688519 kubelet[1948]: I0813 00:56:04.688376 1948 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Aug 13 00:56:04.689156 kubelet[1948]: I0813 00:56:04.689143 1948 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Aug 13 00:56:04.690851 kubelet[1948]: E0813 00:56:04.690826 1948 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Aug 13 00:56:04.690994 kubelet[1948]: E0813 00:56:04.690983 1948 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.200.4.18\" not found" Aug 13 00:56:04.790917 kubelet[1948]: I0813 00:56:04.789737 1948 kubelet_node_status.go:75] "Attempting to register node" node="10.200.4.18" Aug 13 00:56:04.796820 kubelet[1948]: I0813 00:56:04.796786 1948 kubelet_node_status.go:78] "Successfully registered node" node="10.200.4.18" Aug 13 00:56:04.857330 sudo[1824]: pam_unix(sudo:session): session closed for user root Aug 13 00:56:04.856000 audit[1824]: USER_END pid=1824 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Aug 13 00:56:04.856000 audit[1824]: CRED_DISP pid=1824 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Aug 13 00:56:04.908519 kubelet[1948]: I0813 00:56:04.908482 1948 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Aug 13 00:56:04.909036 env[1437]: time="2025-08-13T00:56:04.908972732Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Aug 13 00:56:04.909544 kubelet[1948]: I0813 00:56:04.909243 1948 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Aug 13 00:56:04.959533 sshd[1821]: pam_unix(sshd:session): session closed for user core Aug 13 00:56:04.960000 audit[1821]: USER_END pid=1821 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Aug 13 00:56:04.960000 audit[1821]: CRED_DISP pid=1821 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Aug 13 00:56:04.963318 systemd[1]: sshd@6-10.200.4.18:22-10.200.16.10:45600.service: Deactivated successfully. Aug 13 00:56:04.962000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.4.18:22-10.200.16.10:45600 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 13 00:56:04.964429 systemd[1]: session-9.scope: Deactivated successfully. Aug 13 00:56:04.965152 systemd-logind[1425]: Session 9 logged out. Waiting for processes to exit. Aug 13 00:56:04.966021 systemd-logind[1425]: Removed session 9. Aug 13 00:56:05.498042 kubelet[1948]: I0813 00:56:05.497983 1948 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Aug 13 00:56:05.498729 kubelet[1948]: W0813 00:56:05.498571 1948 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Aug 13 00:56:05.498729 kubelet[1948]: W0813 00:56:05.498622 1948 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Aug 13 00:56:05.498729 kubelet[1948]: W0813 00:56:05.498653 1948 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.Service ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Aug 13 00:56:05.594449 kubelet[1948]: I0813 00:56:05.594378 1948 apiserver.go:52] "Watching apiserver" Aug 13 00:56:05.594695 kubelet[1948]: E0813 00:56:05.594374 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:05.599464 kubelet[1948]: E0813 00:56:05.599429 1948 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xvhbw" podUID="fc4549c2-8a59-4fe9-a647-702140e0849a" Aug 13 00:56:05.604532 systemd[1]: Created slice kubepods-besteffort-pod92a0eb4b_3aaf_4d48_a456_f23f5713185b.slice. Aug 13 00:56:05.615513 systemd[1]: Created slice kubepods-besteffort-pod073c0e1c_f61c_4a26_b1bd_df380de9b42f.slice. Aug 13 00:56:05.629425 kubelet[1948]: I0813 00:56:05.629394 1948 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Aug 13 00:56:05.635764 kubelet[1948]: I0813 00:56:05.635733 1948 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/073c0e1c-f61c-4a26-b1bd-df380de9b42f-xtables-lock\") pod \"kube-proxy-dm8d6\" (UID: \"073c0e1c-f61c-4a26-b1bd-df380de9b42f\") " pod="kube-system/kube-proxy-dm8d6" Aug 13 00:56:05.635937 kubelet[1948]: I0813 00:56:05.635787 1948 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/073c0e1c-f61c-4a26-b1bd-df380de9b42f-lib-modules\") pod \"kube-proxy-dm8d6\" (UID: \"073c0e1c-f61c-4a26-b1bd-df380de9b42f\") " pod="kube-system/kube-proxy-dm8d6" Aug 13 00:56:05.635937 kubelet[1948]: I0813 00:56:05.635814 1948 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vlrm2\" (UniqueName: \"kubernetes.io/projected/073c0e1c-f61c-4a26-b1bd-df380de9b42f-kube-api-access-vlrm2\") pod \"kube-proxy-dm8d6\" (UID: \"073c0e1c-f61c-4a26-b1bd-df380de9b42f\") " pod="kube-system/kube-proxy-dm8d6" Aug 13 00:56:05.635937 kubelet[1948]: I0813 00:56:05.635836 1948 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/92a0eb4b-3aaf-4d48-a456-f23f5713185b-flexvol-driver-host\") pod \"calico-node-c62lp\" (UID: \"92a0eb4b-3aaf-4d48-a456-f23f5713185b\") " pod="calico-system/calico-node-c62lp" Aug 13 00:56:05.635937 kubelet[1948]: I0813 00:56:05.635856 1948 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/92a0eb4b-3aaf-4d48-a456-f23f5713185b-node-certs\") pod \"calico-node-c62lp\" (UID: \"92a0eb4b-3aaf-4d48-a456-f23f5713185b\") " pod="calico-system/calico-node-c62lp" Aug 13 00:56:05.635937 kubelet[1948]: I0813 00:56:05.635892 1948 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/fc4549c2-8a59-4fe9-a647-702140e0849a-varrun\") pod \"csi-node-driver-xvhbw\" (UID: \"fc4549c2-8a59-4fe9-a647-702140e0849a\") " pod="calico-system/csi-node-driver-xvhbw" Aug 13 00:56:05.636156 kubelet[1948]: I0813 00:56:05.635915 1948 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fwzq2\" (UniqueName: \"kubernetes.io/projected/fc4549c2-8a59-4fe9-a647-702140e0849a-kube-api-access-fwzq2\") pod \"csi-node-driver-xvhbw\" (UID: \"fc4549c2-8a59-4fe9-a647-702140e0849a\") " pod="calico-system/csi-node-driver-xvhbw" Aug 13 00:56:05.636156 kubelet[1948]: I0813 00:56:05.635934 1948 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/073c0e1c-f61c-4a26-b1bd-df380de9b42f-kube-proxy\") pod \"kube-proxy-dm8d6\" (UID: \"073c0e1c-f61c-4a26-b1bd-df380de9b42f\") " pod="kube-system/kube-proxy-dm8d6" Aug 13 00:56:05.636156 kubelet[1948]: I0813 00:56:05.635956 1948 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/fc4549c2-8a59-4fe9-a647-702140e0849a-socket-dir\") pod \"csi-node-driver-xvhbw\" (UID: \"fc4549c2-8a59-4fe9-a647-702140e0849a\") " pod="calico-system/csi-node-driver-xvhbw" Aug 13 00:56:05.636156 kubelet[1948]: I0813 00:56:05.635987 1948 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/92a0eb4b-3aaf-4d48-a456-f23f5713185b-cni-log-dir\") pod \"calico-node-c62lp\" (UID: \"92a0eb4b-3aaf-4d48-a456-f23f5713185b\") " pod="calico-system/calico-node-c62lp" Aug 13 00:56:05.636156 kubelet[1948]: I0813 00:56:05.636017 1948 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/92a0eb4b-3aaf-4d48-a456-f23f5713185b-var-lib-calico\") pod \"calico-node-c62lp\" (UID: \"92a0eb4b-3aaf-4d48-a456-f23f5713185b\") " pod="calico-system/calico-node-c62lp" Aug 13 00:56:05.636344 kubelet[1948]: I0813 00:56:05.636040 1948 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/92a0eb4b-3aaf-4d48-a456-f23f5713185b-var-run-calico\") pod \"calico-node-c62lp\" (UID: \"92a0eb4b-3aaf-4d48-a456-f23f5713185b\") " pod="calico-system/calico-node-c62lp" Aug 13 00:56:05.636344 kubelet[1948]: I0813 00:56:05.636076 1948 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/92a0eb4b-3aaf-4d48-a456-f23f5713185b-xtables-lock\") pod \"calico-node-c62lp\" (UID: \"92a0eb4b-3aaf-4d48-a456-f23f5713185b\") " pod="calico-system/calico-node-c62lp" Aug 13 00:56:05.636344 kubelet[1948]: I0813 00:56:05.636099 1948 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bphmv\" (UniqueName: \"kubernetes.io/projected/92a0eb4b-3aaf-4d48-a456-f23f5713185b-kube-api-access-bphmv\") pod \"calico-node-c62lp\" (UID: \"92a0eb4b-3aaf-4d48-a456-f23f5713185b\") " pod="calico-system/calico-node-c62lp" Aug 13 00:56:05.636344 kubelet[1948]: I0813 00:56:05.636122 1948 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/92a0eb4b-3aaf-4d48-a456-f23f5713185b-lib-modules\") pod \"calico-node-c62lp\" (UID: \"92a0eb4b-3aaf-4d48-a456-f23f5713185b\") " pod="calico-system/calico-node-c62lp" Aug 13 00:56:05.636344 kubelet[1948]: I0813 00:56:05.636145 1948 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/92a0eb4b-3aaf-4d48-a456-f23f5713185b-tigera-ca-bundle\") pod \"calico-node-c62lp\" (UID: \"92a0eb4b-3aaf-4d48-a456-f23f5713185b\") " pod="calico-system/calico-node-c62lp" Aug 13 00:56:05.636536 kubelet[1948]: I0813 00:56:05.636168 1948 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/fc4549c2-8a59-4fe9-a647-702140e0849a-kubelet-dir\") pod \"csi-node-driver-xvhbw\" (UID: \"fc4549c2-8a59-4fe9-a647-702140e0849a\") " pod="calico-system/csi-node-driver-xvhbw" Aug 13 00:56:05.636536 kubelet[1948]: I0813 00:56:05.636194 1948 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/fc4549c2-8a59-4fe9-a647-702140e0849a-registration-dir\") pod \"csi-node-driver-xvhbw\" (UID: \"fc4549c2-8a59-4fe9-a647-702140e0849a\") " pod="calico-system/csi-node-driver-xvhbw" Aug 13 00:56:05.636536 kubelet[1948]: I0813 00:56:05.636218 1948 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/92a0eb4b-3aaf-4d48-a456-f23f5713185b-cni-bin-dir\") pod \"calico-node-c62lp\" (UID: \"92a0eb4b-3aaf-4d48-a456-f23f5713185b\") " pod="calico-system/calico-node-c62lp" Aug 13 00:56:05.636536 kubelet[1948]: I0813 00:56:05.636251 1948 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/92a0eb4b-3aaf-4d48-a456-f23f5713185b-cni-net-dir\") pod \"calico-node-c62lp\" (UID: \"92a0eb4b-3aaf-4d48-a456-f23f5713185b\") " pod="calico-system/calico-node-c62lp" Aug 13 00:56:05.636536 kubelet[1948]: I0813 00:56:05.636274 1948 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/92a0eb4b-3aaf-4d48-a456-f23f5713185b-policysync\") pod \"calico-node-c62lp\" (UID: \"92a0eb4b-3aaf-4d48-a456-f23f5713185b\") " pod="calico-system/calico-node-c62lp" Aug 13 00:56:05.737619 kubelet[1948]: I0813 00:56:05.737581 1948 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Aug 13 00:56:05.740927 kubelet[1948]: E0813 00:56:05.740897 1948 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 00:56:05.740927 kubelet[1948]: W0813 00:56:05.740922 1948 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 00:56:05.741139 kubelet[1948]: E0813 00:56:05.740959 1948 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 00:56:05.741217 kubelet[1948]: E0813 00:56:05.741199 1948 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 00:56:05.741277 kubelet[1948]: W0813 00:56:05.741218 1948 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 00:56:05.741277 kubelet[1948]: E0813 00:56:05.741237 1948 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 00:56:05.741469 kubelet[1948]: E0813 00:56:05.741456 1948 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 00:56:05.741469 kubelet[1948]: W0813 00:56:05.741469 1948 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 00:56:05.741603 kubelet[1948]: E0813 00:56:05.741486 1948 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 00:56:05.741708 kubelet[1948]: E0813 00:56:05.741692 1948 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 00:56:05.741708 kubelet[1948]: W0813 00:56:05.741709 1948 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 00:56:05.741834 kubelet[1948]: E0813 00:56:05.741725 1948 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 00:56:05.742006 kubelet[1948]: E0813 00:56:05.741989 1948 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 00:56:05.742099 kubelet[1948]: W0813 00:56:05.742006 1948 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 00:56:05.742164 kubelet[1948]: E0813 00:56:05.742094 1948 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 00:56:05.742241 kubelet[1948]: E0813 00:56:05.742225 1948 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 00:56:05.742365 kubelet[1948]: W0813 00:56:05.742242 1948 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 00:56:05.742365 kubelet[1948]: E0813 00:56:05.742254 1948 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 00:56:05.749372 kubelet[1948]: E0813 00:56:05.749285 1948 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 00:56:05.749372 kubelet[1948]: W0813 00:56:05.749306 1948 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 00:56:05.749372 kubelet[1948]: E0813 00:56:05.749323 1948 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 00:56:05.766531 kubelet[1948]: E0813 00:56:05.765507 1948 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 00:56:05.766531 kubelet[1948]: W0813 00:56:05.765529 1948 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 00:56:05.766531 kubelet[1948]: E0813 00:56:05.765556 1948 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 00:56:05.766531 kubelet[1948]: E0813 00:56:05.765804 1948 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 00:56:05.766531 kubelet[1948]: W0813 00:56:05.765814 1948 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 00:56:05.766531 kubelet[1948]: E0813 00:56:05.765826 1948 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 00:56:05.766531 kubelet[1948]: E0813 00:56:05.766434 1948 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Aug 13 00:56:05.766531 kubelet[1948]: W0813 00:56:05.766447 1948 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Aug 13 00:56:05.766531 kubelet[1948]: E0813 00:56:05.766470 1948 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Aug 13 00:56:05.914656 env[1437]: time="2025-08-13T00:56:05.914604349Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-c62lp,Uid:92a0eb4b-3aaf-4d48-a456-f23f5713185b,Namespace:calico-system,Attempt:0,}" Aug 13 00:56:05.918194 env[1437]: time="2025-08-13T00:56:05.918148549Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-dm8d6,Uid:073c0e1c-f61c-4a26-b1bd-df380de9b42f,Namespace:kube-system,Attempt:0,}" Aug 13 00:56:06.595557 kubelet[1948]: E0813 00:56:06.595505 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:07.014624 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2126571799.mount: Deactivated successfully. Aug 13 00:56:07.048050 env[1437]: time="2025-08-13T00:56:07.048000257Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:07.050608 env[1437]: time="2025-08-13T00:56:07.050565157Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:07.062018 env[1437]: time="2025-08-13T00:56:07.061966455Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:07.065409 env[1437]: time="2025-08-13T00:56:07.065354955Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:07.069520 env[1437]: time="2025-08-13T00:56:07.069477154Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:07.074992 env[1437]: time="2025-08-13T00:56:07.074949253Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:07.078049 env[1437]: time="2025-08-13T00:56:07.078013853Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:07.082245 env[1437]: time="2025-08-13T00:56:07.082211052Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:07.133885 env[1437]: time="2025-08-13T00:56:07.130371444Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Aug 13 00:56:07.133885 env[1437]: time="2025-08-13T00:56:07.130416044Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Aug 13 00:56:07.133885 env[1437]: time="2025-08-13T00:56:07.130432344Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Aug 13 00:56:07.133885 env[1437]: time="2025-08-13T00:56:07.130580344Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/41146a1771ff728ed931f6d65375f790e6a534080da8212a7e9c3d2a7f7baf58 pid=2006 runtime=io.containerd.runc.v2 Aug 13 00:56:07.144615 env[1437]: time="2025-08-13T00:56:07.144546442Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Aug 13 00:56:07.144862 env[1437]: time="2025-08-13T00:56:07.144831842Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Aug 13 00:56:07.145010 env[1437]: time="2025-08-13T00:56:07.144974642Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Aug 13 00:56:07.145264 env[1437]: time="2025-08-13T00:56:07.145221542Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/84d6f7585e12d7fbbdf4521906faf62cab04b53c8bfb4c5fe8b217bbda73f377 pid=2024 runtime=io.containerd.runc.v2 Aug 13 00:56:07.156934 systemd[1]: Started cri-containerd-41146a1771ff728ed931f6d65375f790e6a534080da8212a7e9c3d2a7f7baf58.scope. Aug 13 00:56:07.171772 systemd[1]: Started cri-containerd-84d6f7585e12d7fbbdf4521906faf62cab04b53c8bfb4c5fe8b217bbda73f377.scope. Aug 13 00:56:07.193908 kernel: kauditd_printk_skb: 241 callbacks suppressed Aug 13 00:56:07.194062 kernel: audit: type=1400 audit(1755046567.179:440): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.211378 kernel: audit: type=1400 audit(1755046567.179:441): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.261396 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Aug 13 00:56:07.261510 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Aug 13 00:56:07.261550 kernel: audit: type=1400 audit(1755046567.179:442): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.261577 kernel: audit: type=1400 audit(1755046567.179:443): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.261595 kernel: audit: type=1400 audit(1755046567.179:444): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.261616 kernel: audit: backlog limit exceeded Aug 13 00:56:07.261639 kernel: audit: type=1400 audit(1755046567.179:445): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.261824 env[1437]: time="2025-08-13T00:56:07.217411131Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-c62lp,Uid:92a0eb4b-3aaf-4d48-a456-f23f5713185b,Namespace:calico-system,Attempt:0,} returns sandbox id \"41146a1771ff728ed931f6d65375f790e6a534080da8212a7e9c3d2a7f7baf58\"" Aug 13 00:56:07.261824 env[1437]: time="2025-08-13T00:56:07.219649630Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2\"" Aug 13 00:56:07.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.193000 audit: BPF prog-id=62 op=LOAD Aug 13 00:56:07.194000 audit[2022]: AVC avc: denied { bpf } for pid=2022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.194000 audit[2022]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2006 pid=2022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:07.194000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431313436613137373166663732386564393331663664363533373566 Aug 13 00:56:07.194000 audit[2022]: AVC avc: denied { perfmon } for pid=2022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.194000 audit[2022]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2006 pid=2022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:07.194000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431313436613137373166663732386564393331663664363533373566 Aug 13 00:56:07.194000 audit[2022]: AVC avc: denied { bpf } for pid=2022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.194000 audit[2022]: AVC avc: denied { bpf } for pid=2022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.194000 audit[2022]: AVC avc: denied { bpf } for pid=2022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.194000 audit[2022]: AVC avc: denied { perfmon } for pid=2022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.194000 audit[2022]: AVC avc: denied { perfmon } for pid=2022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.194000 audit[2022]: AVC avc: denied { perfmon } for pid=2022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.194000 audit[2022]: AVC avc: denied { perfmon } for pid=2022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.194000 audit[2022]: AVC avc: denied { perfmon } for pid=2022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.194000 audit[2022]: AVC avc: denied { bpf } for pid=2022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.194000 audit[2022]: AVC avc: denied { bpf } for pid=2022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.194000 audit: BPF prog-id=63 op=LOAD Aug 13 00:56:07.194000 audit[2022]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000212c40 items=0 ppid=2006 pid=2022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:07.194000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431313436613137373166663732386564393331663664363533373566 Aug 13 00:56:07.194000 audit[2022]: AVC avc: denied { bpf } for pid=2022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.194000 audit[2022]: AVC avc: denied { bpf } for pid=2022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.194000 audit[2022]: AVC avc: denied { perfmon } for pid=2022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.194000 audit[2022]: AVC avc: denied { perfmon } for pid=2022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.194000 audit[2022]: AVC avc: denied { perfmon } for pid=2022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.194000 audit[2022]: AVC avc: denied { perfmon } for pid=2022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.194000 audit[2022]: AVC avc: denied { perfmon } for pid=2022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.194000 audit[2022]: AVC avc: denied { bpf } for pid=2022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.194000 audit[2022]: AVC avc: denied { bpf } for pid=2022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.194000 audit: BPF prog-id=64 op=LOAD Aug 13 00:56:07.194000 audit[2022]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000212c88 items=0 ppid=2006 pid=2022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:07.194000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431313436613137373166663732386564393331663664363533373566 Aug 13 00:56:07.194000 audit: BPF prog-id=64 op=UNLOAD Aug 13 00:56:07.194000 audit: BPF prog-id=63 op=UNLOAD Aug 13 00:56:07.194000 audit[2022]: AVC avc: denied { bpf } for pid=2022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.194000 audit[2022]: AVC avc: denied { bpf } for pid=2022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.194000 audit[2022]: AVC avc: denied { bpf } for pid=2022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.194000 audit[2022]: AVC avc: denied { perfmon } for pid=2022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.194000 audit[2022]: AVC avc: denied { perfmon } for pid=2022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.194000 audit[2022]: AVC avc: denied { perfmon } for pid=2022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.194000 audit[2022]: AVC avc: denied { perfmon } for pid=2022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.194000 audit[2022]: AVC avc: denied { perfmon } for pid=2022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.194000 audit[2022]: AVC avc: denied { bpf } for pid=2022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.194000 audit[2022]: AVC avc: denied { bpf } for pid=2022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.194000 audit: BPF prog-id=65 op=LOAD Aug 13 00:56:07.194000 audit[2022]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000213098 items=0 ppid=2006 pid=2022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:07.194000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431313436613137373166663732386564393331663664363533373566 Aug 13 00:56:07.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.277000 audit: BPF prog-id=66 op=LOAD Aug 13 00:56:07.286314 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Aug 13 00:56:07.283000 audit[2036]: AVC avc: denied { perfmon } for pid=2036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.283000 audit[2036]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2024 pid=2036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:07.283000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834643666373538356531326437666262646634353231393036666166 Aug 13 00:56:07.283000 audit[2036]: AVC avc: denied { bpf } for pid=2036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.283000 audit[2036]: AVC avc: denied { bpf } for pid=2036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.283000 audit[2036]: AVC avc: denied { bpf } for pid=2036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.283000 audit[2036]: AVC avc: denied { perfmon } for pid=2036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.283000 audit[2036]: AVC avc: denied { perfmon } for pid=2036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.283000 audit[2036]: AVC avc: denied { perfmon } for pid=2036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.283000 audit[2036]: AVC avc: denied { perfmon } for pid=2036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.283000 audit[2036]: AVC avc: denied { perfmon } for pid=2036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.283000 audit[2036]: AVC avc: denied { bpf } for pid=2036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.283000 audit[2036]: AVC avc: denied { bpf } for pid=2036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.283000 audit: BPF prog-id=67 op=LOAD Aug 13 00:56:07.283000 audit[2036]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001ce840 items=0 ppid=2024 pid=2036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:07.283000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834643666373538356531326437666262646634353231393036666166 Aug 13 00:56:07.284000 audit[2036]: AVC avc: denied { bpf } for pid=2036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.284000 audit[2036]: AVC avc: denied { bpf } for pid=2036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.284000 audit[2036]: AVC avc: denied { perfmon } for pid=2036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.284000 audit[2036]: AVC avc: denied { perfmon } for pid=2036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.284000 audit[2036]: AVC avc: denied { perfmon } for pid=2036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.284000 audit[2036]: AVC avc: denied { perfmon } for pid=2036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.284000 audit[2036]: AVC avc: denied { perfmon } for pid=2036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.284000 audit[2036]: AVC avc: denied { bpf } for pid=2036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.284000 audit[2036]: AVC avc: denied { bpf } for pid=2036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.284000 audit: BPF prog-id=68 op=LOAD Aug 13 00:56:07.284000 audit[2036]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001ce888 items=0 ppid=2024 pid=2036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:07.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834643666373538356531326437666262646634353231393036666166 Aug 13 00:56:07.284000 audit: BPF prog-id=68 op=UNLOAD Aug 13 00:56:07.284000 audit: BPF prog-id=67 op=UNLOAD Aug 13 00:56:07.284000 audit[2036]: AVC avc: denied { bpf } for pid=2036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.284000 audit[2036]: AVC avc: denied { bpf } for pid=2036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.284000 audit[2036]: AVC avc: denied { bpf } for pid=2036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.284000 audit[2036]: AVC avc: denied { perfmon } for pid=2036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.284000 audit[2036]: AVC avc: denied { perfmon } for pid=2036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.284000 audit[2036]: AVC avc: denied { perfmon } for pid=2036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.284000 audit[2036]: AVC avc: denied { perfmon } for pid=2036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.284000 audit[2036]: AVC avc: denied { perfmon } for pid=2036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.284000 audit[2036]: AVC avc: denied { bpf } for pid=2036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.284000 audit[2036]: AVC avc: denied { bpf } for pid=2036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:07.284000 audit: BPF prog-id=69 op=LOAD Aug 13 00:56:07.284000 audit[2036]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001cec98 items=0 ppid=2024 pid=2036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:07.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834643666373538356531326437666262646634353231393036666166 Aug 13 00:56:07.299238 env[1437]: time="2025-08-13T00:56:07.299178218Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-dm8d6,Uid:073c0e1c-f61c-4a26-b1bd-df380de9b42f,Namespace:kube-system,Attempt:0,} returns sandbox id \"84d6f7585e12d7fbbdf4521906faf62cab04b53c8bfb4c5fe8b217bbda73f377\"" Aug 13 00:56:07.596477 kubelet[1948]: E0813 00:56:07.596358 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:07.659119 kubelet[1948]: E0813 00:56:07.659021 1948 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xvhbw" podUID="fc4549c2-8a59-4fe9-a647-702140e0849a" Aug 13 00:56:08.535363 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2033506060.mount: Deactivated successfully. Aug 13 00:56:08.596827 kubelet[1948]: E0813 00:56:08.596738 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:08.684800 env[1437]: time="2025-08-13T00:56:08.684747705Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:08.692385 env[1437]: time="2025-08-13T00:56:08.692261804Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:639615519fa6f7bc4b4756066ba9780068fd291eacc36c120f6c555e62f2b00e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:08.695967 env[1437]: time="2025-08-13T00:56:08.695927904Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:08.699629 env[1437]: time="2025-08-13T00:56:08.699587103Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:972be127eaecd7d1a2d5393b8d14f1ae8f88550bee83e0519e9590c7e15eb41b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:08.700123 env[1437]: time="2025-08-13T00:56:08.700089403Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2\" returns image reference \"sha256:639615519fa6f7bc4b4756066ba9780068fd291eacc36c120f6c555e62f2b00e\"" Aug 13 00:56:08.702481 env[1437]: time="2025-08-13T00:56:08.701969003Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.7\"" Aug 13 00:56:08.702817 env[1437]: time="2025-08-13T00:56:08.702784703Z" level=info msg="CreateContainer within sandbox \"41146a1771ff728ed931f6d65375f790e6a534080da8212a7e9c3d2a7f7baf58\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Aug 13 00:56:08.734825 env[1437]: time="2025-08-13T00:56:08.734764798Z" level=info msg="CreateContainer within sandbox \"41146a1771ff728ed931f6d65375f790e6a534080da8212a7e9c3d2a7f7baf58\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"9beb9b4ff7ee6c1aead89ca65ae06a9de6446262dc73e4d96c24cd87b5c65dee\"" Aug 13 00:56:08.735695 env[1437]: time="2025-08-13T00:56:08.735655398Z" level=info msg="StartContainer for \"9beb9b4ff7ee6c1aead89ca65ae06a9de6446262dc73e4d96c24cd87b5c65dee\"" Aug 13 00:56:08.756335 systemd[1]: Started cri-containerd-9beb9b4ff7ee6c1aead89ca65ae06a9de6446262dc73e4d96c24cd87b5c65dee.scope. Aug 13 00:56:08.773000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:08.773000 audit[2090]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fabb59a7cb8 items=0 ppid=2006 pid=2090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:08.773000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962656239623466663765653663316165616438396361363561653036 Aug 13 00:56:08.773000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:08.773000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:08.773000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:08.773000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:08.773000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:08.773000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:08.773000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:08.773000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:08.773000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:08.773000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:08.773000 audit: BPF prog-id=70 op=LOAD Aug 13 00:56:08.773000 audit[2090]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001b5958 items=0 ppid=2006 pid=2090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:08.773000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962656239623466663765653663316165616438396361363561653036 Aug 13 00:56:08.773000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:08.773000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:08.773000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:08.773000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:08.773000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:08.773000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:08.773000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:08.773000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:08.773000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:08.773000 audit: BPF prog-id=71 op=LOAD Aug 13 00:56:08.773000 audit[2090]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001b59a8 items=0 ppid=2006 pid=2090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:08.773000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962656239623466663765653663316165616438396361363561653036 Aug 13 00:56:08.773000 audit: BPF prog-id=71 op=UNLOAD Aug 13 00:56:08.774000 audit: BPF prog-id=70 op=UNLOAD Aug 13 00:56:08.774000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:08.774000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:08.774000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:08.774000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:08.774000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:08.774000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:08.774000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:08.774000 audit[2090]: AVC avc: denied { perfmon } for pid=2090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:08.774000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:08.774000 audit[2090]: AVC avc: denied { bpf } for pid=2090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:08.774000 audit: BPF prog-id=72 op=LOAD Aug 13 00:56:08.774000 audit[2090]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001b5a38 items=0 ppid=2006 pid=2090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:08.774000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962656239623466663765653663316165616438396361363561653036 Aug 13 00:56:08.796036 env[1437]: time="2025-08-13T00:56:08.795920189Z" level=info msg="StartContainer for \"9beb9b4ff7ee6c1aead89ca65ae06a9de6446262dc73e4d96c24cd87b5c65dee\" returns successfully" Aug 13 00:56:08.802692 systemd[1]: cri-containerd-9beb9b4ff7ee6c1aead89ca65ae06a9de6446262dc73e4d96c24cd87b5c65dee.scope: Deactivated successfully. Aug 13 00:56:08.806000 audit: BPF prog-id=72 op=UNLOAD Aug 13 00:56:08.964461 env[1437]: time="2025-08-13T00:56:08.964408264Z" level=info msg="shim disconnected" id=9beb9b4ff7ee6c1aead89ca65ae06a9de6446262dc73e4d96c24cd87b5c65dee Aug 13 00:56:08.964461 env[1437]: time="2025-08-13T00:56:08.964455864Z" level=warning msg="cleaning up after shim disconnected" id=9beb9b4ff7ee6c1aead89ca65ae06a9de6446262dc73e4d96c24cd87b5c65dee namespace=k8s.io Aug 13 00:56:08.964461 env[1437]: time="2025-08-13T00:56:08.964467864Z" level=info msg="cleaning up dead shim" Aug 13 00:56:08.973165 env[1437]: time="2025-08-13T00:56:08.973122262Z" level=warning msg="cleanup warnings time=\"2025-08-13T00:56:08Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2130 runtime=io.containerd.runc.v2\n" Aug 13 00:56:09.002907 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-9beb9b4ff7ee6c1aead89ca65ae06a9de6446262dc73e4d96c24cd87b5c65dee-rootfs.mount: Deactivated successfully. Aug 13 00:56:09.597076 kubelet[1948]: E0813 00:56:09.597015 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:09.658466 kubelet[1948]: E0813 00:56:09.658406 1948 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xvhbw" podUID="fc4549c2-8a59-4fe9-a647-702140e0849a" Aug 13 00:56:10.110095 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3492415625.mount: Deactivated successfully. Aug 13 00:56:10.597774 kubelet[1948]: E0813 00:56:10.597701 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:10.762600 env[1437]: time="2025-08-13T00:56:10.762552120Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:10.768431 env[1437]: time="2025-08-13T00:56:10.768385819Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d5bc66d8682fdab0735e869a3f77730df378af7fd2505c1f4d6374ad3dbd181c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:10.771396 env[1437]: time="2025-08-13T00:56:10.771355419Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:10.774915 env[1437]: time="2025-08-13T00:56:10.774864618Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:8d589a18b5424f77a784ef2f00feffac0ef210414100822f1c120f0d7221def3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:10.775244 env[1437]: time="2025-08-13T00:56:10.775212018Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.7\" returns image reference \"sha256:d5bc66d8682fdab0735e869a3f77730df378af7fd2505c1f4d6374ad3dbd181c\"" Aug 13 00:56:10.776844 env[1437]: time="2025-08-13T00:56:10.776797818Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.2\"" Aug 13 00:56:10.777681 env[1437]: time="2025-08-13T00:56:10.777647618Z" level=info msg="CreateContainer within sandbox \"84d6f7585e12d7fbbdf4521906faf62cab04b53c8bfb4c5fe8b217bbda73f377\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Aug 13 00:56:10.821628 env[1437]: time="2025-08-13T00:56:10.821569512Z" level=info msg="CreateContainer within sandbox \"84d6f7585e12d7fbbdf4521906faf62cab04b53c8bfb4c5fe8b217bbda73f377\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"95ff805624330c142f124ce6d461ecd612703c52cfa1e5391dd53f9f962c1a8a\"" Aug 13 00:56:10.822258 env[1437]: time="2025-08-13T00:56:10.822217212Z" level=info msg="StartContainer for \"95ff805624330c142f124ce6d461ecd612703c52cfa1e5391dd53f9f962c1a8a\"" Aug 13 00:56:10.846617 systemd[1]: Started cri-containerd-95ff805624330c142f124ce6d461ecd612703c52cfa1e5391dd53f9f962c1a8a.scope. Aug 13 00:56:10.864000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:10.864000 audit[2154]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f8ec7f0b2f8 items=0 ppid=2024 pid=2154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:10.864000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935666638303536323433333063313432663132346365366434363165 Aug 13 00:56:10.864000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:10.864000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:10.864000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:10.864000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:10.864000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:10.864000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:10.864000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:10.864000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:10.864000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:10.864000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:10.864000 audit: BPF prog-id=73 op=LOAD Aug 13 00:56:10.864000 audit[2154]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0000243f8 items=0 ppid=2024 pid=2154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:10.864000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935666638303536323433333063313432663132346365366434363165 Aug 13 00:56:10.864000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:10.864000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:10.864000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:10.864000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:10.864000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:10.864000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:10.864000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:10.864000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:10.864000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:10.864000 audit: BPF prog-id=74 op=LOAD Aug 13 00:56:10.864000 audit[2154]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000024448 items=0 ppid=2024 pid=2154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:10.864000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935666638303536323433333063313432663132346365366434363165 Aug 13 00:56:10.864000 audit: BPF prog-id=74 op=UNLOAD Aug 13 00:56:10.864000 audit: BPF prog-id=73 op=UNLOAD Aug 13 00:56:10.864000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:10.864000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:10.864000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:10.864000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:10.864000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:10.864000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:10.864000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:10.864000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:10.864000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:10.864000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:10.864000 audit: BPF prog-id=75 op=LOAD Aug 13 00:56:10.864000 audit[2154]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0000244d8 items=0 ppid=2024 pid=2154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:10.864000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935666638303536323433333063313432663132346365366434363165 Aug 13 00:56:10.884996 env[1437]: time="2025-08-13T00:56:10.884942604Z" level=info msg="StartContainer for \"95ff805624330c142f124ce6d461ecd612703c52cfa1e5391dd53f9f962c1a8a\" returns successfully" Aug 13 00:56:10.990000 audit[2215]: NETFILTER_CFG table=mangle:17 family=10 entries=1 op=nft_register_chain pid=2215 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:10.990000 audit[2215]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffa7faffa0 a2=0 a3=7fffa7faff8c items=0 ppid=2166 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:10.990000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Aug 13 00:56:10.992000 audit[2214]: NETFILTER_CFG table=mangle:18 family=2 entries=1 op=nft_register_chain pid=2214 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:10.992000 audit[2214]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe48843ce0 a2=0 a3=7ffe48843ccc items=0 ppid=2166 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:10.992000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Aug 13 00:56:10.993000 audit[2217]: NETFILTER_CFG table=nat:19 family=10 entries=1 op=nft_register_chain pid=2217 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:10.993000 audit[2217]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcd6469760 a2=0 a3=7ffcd646974c items=0 ppid=2166 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:10.993000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Aug 13 00:56:10.994000 audit[2218]: NETFILTER_CFG table=nat:20 family=2 entries=1 op=nft_register_chain pid=2218 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:10.994000 audit[2218]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe18864560 a2=0 a3=7ffe1886454c items=0 ppid=2166 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:10.994000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Aug 13 00:56:10.995000 audit[2219]: NETFILTER_CFG table=filter:21 family=10 entries=1 op=nft_register_chain pid=2219 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:10.995000 audit[2219]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc3e4fa570 a2=0 a3=7ffc3e4fa55c items=0 ppid=2166 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:10.995000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Aug 13 00:56:10.998000 audit[2220]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_chain pid=2220 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:10.998000 audit[2220]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd891cb450 a2=0 a3=7ffd891cb43c items=0 ppid=2166 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:10.998000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Aug 13 00:56:11.095000 audit[2221]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2221 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:11.095000 audit[2221]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffde5790170 a2=0 a3=7ffde579015c items=0 ppid=2166 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:11.095000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Aug 13 00:56:11.098000 audit[2223]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2223 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:11.098000 audit[2223]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe3bab7090 a2=0 a3=7ffe3bab707c items=0 ppid=2166 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:11.098000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Aug 13 00:56:11.103000 audit[2226]: NETFILTER_CFG table=filter:25 family=2 entries=2 op=nft_register_chain pid=2226 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:11.103000 audit[2226]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffeb5842230 a2=0 a3=7ffeb584221c items=0 ppid=2166 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:11.103000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Aug 13 00:56:11.105000 audit[2227]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_chain pid=2227 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:11.105000 audit[2227]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe39d8cd40 a2=0 a3=7ffe39d8cd2c items=0 ppid=2166 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:11.105000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Aug 13 00:56:11.109816 systemd[1]: run-containerd-runc-k8s.io-95ff805624330c142f124ce6d461ecd612703c52cfa1e5391dd53f9f962c1a8a-runc.mHdSN2.mount: Deactivated successfully. Aug 13 00:56:11.107000 audit[2229]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2229 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:11.107000 audit[2229]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcbf387b40 a2=0 a3=7ffcbf387b2c items=0 ppid=2166 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:11.107000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Aug 13 00:56:11.111000 audit[2230]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2230 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:11.111000 audit[2230]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe5651b240 a2=0 a3=7ffe5651b22c items=0 ppid=2166 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:11.111000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Aug 13 00:56:11.115000 audit[2232]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2232 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:11.115000 audit[2232]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdc2584470 a2=0 a3=7ffdc258445c items=0 ppid=2166 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:11.115000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Aug 13 00:56:11.121000 audit[2235]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2235 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:11.121000 audit[2235]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffa09452f0 a2=0 a3=7fffa09452dc items=0 ppid=2166 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:11.121000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Aug 13 00:56:11.122000 audit[2236]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_chain pid=2236 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:11.122000 audit[2236]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe8e727820 a2=0 a3=7ffe8e72780c items=0 ppid=2166 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:11.122000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Aug 13 00:56:11.124000 audit[2238]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2238 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:11.124000 audit[2238]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd5e3f4db0 a2=0 a3=7ffd5e3f4d9c items=0 ppid=2166 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:11.124000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Aug 13 00:56:11.126000 audit[2239]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_chain pid=2239 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:11.126000 audit[2239]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcaade91c0 a2=0 a3=7ffcaade91ac items=0 ppid=2166 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:11.126000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Aug 13 00:56:11.128000 audit[2241]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_rule pid=2241 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:11.128000 audit[2241]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd4ac0eb30 a2=0 a3=7ffd4ac0eb1c items=0 ppid=2166 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:11.128000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Aug 13 00:56:11.132000 audit[2244]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_rule pid=2244 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:11.132000 audit[2244]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe3f84f650 a2=0 a3=7ffe3f84f63c items=0 ppid=2166 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:11.132000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Aug 13 00:56:11.135000 audit[2247]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_rule pid=2247 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:11.135000 audit[2247]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffe5fdbcb0 a2=0 a3=7fffe5fdbc9c items=0 ppid=2166 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:11.135000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Aug 13 00:56:11.136000 audit[2248]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2248 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:11.136000 audit[2248]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff12b7a180 a2=0 a3=7fff12b7a16c items=0 ppid=2166 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:11.136000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Aug 13 00:56:11.139000 audit[2250]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2250 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:11.139000 audit[2250]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe65390440 a2=0 a3=7ffe6539042c items=0 ppid=2166 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:11.139000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Aug 13 00:56:11.172000 audit[2254]: NETFILTER_CFG table=nat:39 family=2 entries=2 op=nft_register_chain pid=2254 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:11.172000 audit[2254]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffcfcfd9850 a2=0 a3=7ffcfcfd983c items=0 ppid=2166 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:11.172000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Aug 13 00:56:11.173000 audit[2255]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2255 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:11.173000 audit[2255]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffca8143620 a2=0 a3=7ffca814360c items=0 ppid=2166 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:11.173000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Aug 13 00:56:11.176000 audit[2257]: NETFILTER_CFG table=nat:41 family=2 entries=2 op=nft_register_chain pid=2257 subj=system_u:system_r:kernel_t:s0 comm="iptables" Aug 13 00:56:11.176000 audit[2257]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe5607c3f0 a2=0 a3=7ffe5607c3dc items=0 ppid=2166 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:11.176000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Aug 13 00:56:11.198000 audit[2263]: NETFILTER_CFG table=filter:42 family=2 entries=5 op=nft_register_rule pid=2263 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:56:11.198000 audit[2263]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffe5f1ffd30 a2=0 a3=7ffe5f1ffd1c items=0 ppid=2166 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:11.198000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:56:11.236000 audit[2263]: NETFILTER_CFG table=nat:43 family=2 entries=79 op=nft_register_chain pid=2263 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:56:11.236000 audit[2263]: SYSCALL arch=c000003e syscall=46 success=yes exit=38092 a0=3 a1=7ffe5f1ffd30 a2=0 a3=7ffe5f1ffd1c items=0 ppid=2166 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:11.236000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:56:11.254000 audit[2271]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2271 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:11.254000 audit[2271]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc835fb9c0 a2=0 a3=7ffc835fb9ac items=0 ppid=2166 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:11.254000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Aug 13 00:56:11.257000 audit[2273]: NETFILTER_CFG table=filter:45 family=10 entries=2 op=nft_register_chain pid=2273 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:11.257000 audit[2273]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcc96c3fe0 a2=0 a3=7ffcc96c3fcc items=0 ppid=2166 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:11.257000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Aug 13 00:56:11.261000 audit[2276]: NETFILTER_CFG table=filter:46 family=10 entries=2 op=nft_register_chain pid=2276 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:11.261000 audit[2276]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe2ca66080 a2=0 a3=7ffe2ca6606c items=0 ppid=2166 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:11.261000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Aug 13 00:56:11.263000 audit[2277]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_chain pid=2277 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:11.263000 audit[2277]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffea8c3eca0 a2=0 a3=7ffea8c3ec8c items=0 ppid=2166 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:11.263000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Aug 13 00:56:11.265000 audit[2279]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_rule pid=2279 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:11.265000 audit[2279]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff3794fdb0 a2=0 a3=7fff3794fd9c items=0 ppid=2166 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:11.265000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Aug 13 00:56:11.266000 audit[2280]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2280 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:11.266000 audit[2280]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe1f6146e0 a2=0 a3=7ffe1f6146cc items=0 ppid=2166 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:11.266000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Aug 13 00:56:11.270000 audit[2282]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2282 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:11.270000 audit[2282]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffceb090b50 a2=0 a3=7ffceb090b3c items=0 ppid=2166 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:11.270000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Aug 13 00:56:11.273000 audit[2285]: NETFILTER_CFG table=filter:51 family=10 entries=2 op=nft_register_chain pid=2285 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:11.273000 audit[2285]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc38c9a970 a2=0 a3=7ffc38c9a95c items=0 ppid=2166 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:11.273000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Aug 13 00:56:11.275000 audit[2286]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_chain pid=2286 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:11.275000 audit[2286]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffef82adf90 a2=0 a3=7ffef82adf7c items=0 ppid=2166 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:11.275000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Aug 13 00:56:11.277000 audit[2288]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2288 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:11.277000 audit[2288]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffffcc2d600 a2=0 a3=7ffffcc2d5ec items=0 ppid=2166 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:11.277000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Aug 13 00:56:11.278000 audit[2289]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_chain pid=2289 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:11.278000 audit[2289]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffee6439a30 a2=0 a3=7ffee6439a1c items=0 ppid=2166 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:11.278000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Aug 13 00:56:11.281000 audit[2291]: NETFILTER_CFG table=filter:55 family=10 entries=1 op=nft_register_rule pid=2291 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:11.281000 audit[2291]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffda3988c0 a2=0 a3=7fffda3988ac items=0 ppid=2166 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:11.281000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Aug 13 00:56:11.285000 audit[2294]: NETFILTER_CFG table=filter:56 family=10 entries=1 op=nft_register_rule pid=2294 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:11.285000 audit[2294]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffcb5608e0 a2=0 a3=7fffcb5608cc items=0 ppid=2166 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:11.285000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Aug 13 00:56:11.288000 audit[2297]: NETFILTER_CFG table=filter:57 family=10 entries=1 op=nft_register_rule pid=2297 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:11.288000 audit[2297]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe99f9e730 a2=0 a3=7ffe99f9e71c items=0 ppid=2166 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:11.288000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Aug 13 00:56:11.289000 audit[2298]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2298 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:11.289000 audit[2298]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc62d59b30 a2=0 a3=7ffc62d59b1c items=0 ppid=2166 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:11.289000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Aug 13 00:56:11.292000 audit[2300]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2300 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:11.292000 audit[2300]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe41215be0 a2=0 a3=7ffe41215bcc items=0 ppid=2166 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:11.292000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Aug 13 00:56:11.295000 audit[2303]: NETFILTER_CFG table=nat:60 family=10 entries=2 op=nft_register_chain pid=2303 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:11.295000 audit[2303]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffef1927c20 a2=0 a3=7ffef1927c0c items=0 ppid=2166 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:11.295000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Aug 13 00:56:11.296000 audit[2304]: NETFILTER_CFG table=nat:61 family=10 entries=1 op=nft_register_chain pid=2304 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:11.296000 audit[2304]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe149bdc30 a2=0 a3=7ffe149bdc1c items=0 ppid=2166 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:11.296000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Aug 13 00:56:11.299000 audit[2306]: NETFILTER_CFG table=nat:62 family=10 entries=2 op=nft_register_chain pid=2306 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:11.299000 audit[2306]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffcb54e9c30 a2=0 a3=7ffcb54e9c1c items=0 ppid=2166 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:11.299000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Aug 13 00:56:11.300000 audit[2307]: NETFILTER_CFG table=filter:63 family=10 entries=1 op=nft_register_chain pid=2307 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:11.300000 audit[2307]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdb9bded20 a2=0 a3=7ffdb9bded0c items=0 ppid=2166 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:11.300000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Aug 13 00:56:11.303000 audit[2309]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_rule pid=2309 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:11.303000 audit[2309]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe20fb03c0 a2=0 a3=7ffe20fb03ac items=0 ppid=2166 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:11.303000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Aug 13 00:56:11.306000 audit[2312]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_rule pid=2312 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Aug 13 00:56:11.306000 audit[2312]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc38733dc0 a2=0 a3=7ffc38733dac items=0 ppid=2166 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:11.306000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Aug 13 00:56:11.309000 audit[2314]: NETFILTER_CFG table=filter:66 family=10 entries=3 op=nft_register_rule pid=2314 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Aug 13 00:56:11.309000 audit[2314]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7fff015b2a40 a2=0 a3=7fff015b2a2c items=0 ppid=2166 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:11.309000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:56:11.310000 audit[2314]: NETFILTER_CFG table=nat:67 family=10 entries=7 op=nft_register_chain pid=2314 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Aug 13 00:56:11.310000 audit[2314]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fff015b2a40 a2=0 a3=7fff015b2a2c items=0 ppid=2166 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:11.310000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:56:11.598494 kubelet[1948]: E0813 00:56:11.598389 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:11.659133 kubelet[1948]: E0813 00:56:11.659070 1948 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xvhbw" podUID="fc4549c2-8a59-4fe9-a647-702140e0849a" Aug 13 00:56:11.691176 kubelet[1948]: I0813 00:56:11.691100 1948 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-dm8d6" podStartSLOduration=4.215309605 podStartE2EDuration="7.691083005s" podCreationTimestamp="2025-08-13 00:56:04 +0000 UTC" firstStartedPulling="2025-08-13 00:56:07.300539718 +0000 UTC m=+4.010569767" lastFinishedPulling="2025-08-13 00:56:10.776313218 +0000 UTC m=+7.486343167" observedRunningTime="2025-08-13 00:56:11.691019605 +0000 UTC m=+8.401049554" watchObservedRunningTime="2025-08-13 00:56:11.691083005 +0000 UTC m=+8.401113054" Aug 13 00:56:12.599252 kubelet[1948]: E0813 00:56:12.599211 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:13.599490 kubelet[1948]: E0813 00:56:13.599403 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:13.658542 kubelet[1948]: E0813 00:56:13.658469 1948 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xvhbw" podUID="fc4549c2-8a59-4fe9-a647-702140e0849a" Aug 13 00:56:14.600226 kubelet[1948]: E0813 00:56:14.600145 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:15.452272 env[1437]: time="2025-08-13T00:56:15.452210501Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:15.458382 env[1437]: time="2025-08-13T00:56:15.458336201Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:77a357d0d33e3016e61153f7d2b7de72371579c4aaeb767fb7ef0af606fe1630,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:15.462107 env[1437]: time="2025-08-13T00:56:15.462061800Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:15.470449 env[1437]: time="2025-08-13T00:56:15.470399900Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:50686775cc60acb78bd92a66fa2d84e1700b2d8e43a718fbadbf35e59baefb4d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:15.471131 env[1437]: time="2025-08-13T00:56:15.471092900Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.2\" returns image reference \"sha256:77a357d0d33e3016e61153f7d2b7de72371579c4aaeb767fb7ef0af606fe1630\"" Aug 13 00:56:15.473821 env[1437]: time="2025-08-13T00:56:15.473791699Z" level=info msg="CreateContainer within sandbox \"41146a1771ff728ed931f6d65375f790e6a534080da8212a7e9c3d2a7f7baf58\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Aug 13 00:56:15.508106 env[1437]: time="2025-08-13T00:56:15.508054996Z" level=info msg="CreateContainer within sandbox \"41146a1771ff728ed931f6d65375f790e6a534080da8212a7e9c3d2a7f7baf58\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"eaed750b28745cd67711c5330ede295cd1b3e9f7ee52cb9491a5cea442f7ef69\"" Aug 13 00:56:15.508988 env[1437]: time="2025-08-13T00:56:15.508953596Z" level=info msg="StartContainer for \"eaed750b28745cd67711c5330ede295cd1b3e9f7ee52cb9491a5cea442f7ef69\"" Aug 13 00:56:15.535102 systemd[1]: Started cri-containerd-eaed750b28745cd67711c5330ede295cd1b3e9f7ee52cb9491a5cea442f7ef69.scope. Aug 13 00:56:15.548000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:15.554002 kernel: kauditd_printk_skb: 346 callbacks suppressed Aug 13 00:56:15.554092 kernel: audit: type=1400 audit(1755046575.548:538): avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:15.548000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fabd9e68ff8 items=0 ppid=2006 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:15.608411 kernel: audit: type=1300 audit(1755046575.548:538): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fabd9e68ff8 items=0 ppid=2006 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:15.608573 kernel: audit: type=1327 audit(1755046575.548:538): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561656437353062323837343563643637373131633533333065646532 Aug 13 00:56:15.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561656437353062323837343563643637373131633533333065646532 Aug 13 00:56:15.608697 kubelet[1948]: E0813 00:56:15.608543 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:15.548000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:15.622949 kernel: audit: type=1400 audit(1755046575.548:539): avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:15.548000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:15.639143 kernel: audit: type=1400 audit(1755046575.548:539): avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:15.548000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:15.653934 kernel: audit: type=1400 audit(1755046575.548:539): avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:15.666996 kernel: audit: type=1400 audit(1755046575.548:539): avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:15.667054 kernel: audit: type=1400 audit(1755046575.548:539): avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:15.548000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:15.548000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:15.667158 kubelet[1948]: E0813 00:56:15.658328 1948 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xvhbw" podUID="fc4549c2-8a59-4fe9-a647-702140e0849a" Aug 13 00:56:15.681680 kernel: audit: type=1400 audit(1755046575.548:539): avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:15.548000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:15.682083 env[1437]: time="2025-08-13T00:56:15.682046480Z" level=info msg="StartContainer for \"eaed750b28745cd67711c5330ede295cd1b3e9f7ee52cb9491a5cea442f7ef69\" returns successfully" Aug 13 00:56:15.548000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:15.711266 kernel: audit: type=1400 audit(1755046575.548:539): avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:15.548000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:15.548000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:15.548000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:15.548000 audit: BPF prog-id=76 op=LOAD Aug 13 00:56:15.548000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00038ff68 items=0 ppid=2006 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:15.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561656437353062323837343563643637373131633533333065646532 Aug 13 00:56:15.566000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:15.566000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:15.566000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:15.566000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:15.566000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:15.566000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:15.566000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:15.566000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:15.566000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:15.566000 audit: BPF prog-id=77 op=LOAD Aug 13 00:56:15.566000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00038ffb8 items=0 ppid=2006 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:15.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561656437353062323837343563643637373131633533333065646532 Aug 13 00:56:15.588000 audit: BPF prog-id=77 op=UNLOAD Aug 13 00:56:15.588000 audit: BPF prog-id=76 op=UNLOAD Aug 13 00:56:15.588000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:15.588000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:15.588000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:15.588000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:15.588000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:15.588000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:15.588000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:15.588000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:15.588000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:15.588000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:15.588000 audit: BPF prog-id=78 op=LOAD Aug 13 00:56:15.588000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003dc048 items=0 ppid=2006 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:15.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561656437353062323837343563643637373131633533333065646532 Aug 13 00:56:16.608835 kubelet[1948]: E0813 00:56:16.608785 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:17.285827 env[1437]: time="2025-08-13T00:56:17.285745337Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Aug 13 00:56:17.287846 systemd[1]: cri-containerd-eaed750b28745cd67711c5330ede295cd1b3e9f7ee52cb9491a5cea442f7ef69.scope: Deactivated successfully. Aug 13 00:56:17.290000 audit: BPF prog-id=78 op=UNLOAD Aug 13 00:56:17.303115 kubelet[1948]: I0813 00:56:17.303083 1948 kubelet_node_status.go:501] "Fast updating node status as it just became ready" Aug 13 00:56:17.309969 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-eaed750b28745cd67711c5330ede295cd1b3e9f7ee52cb9491a5cea442f7ef69-rootfs.mount: Deactivated successfully. Aug 13 00:56:17.609431 kubelet[1948]: E0813 00:56:17.609382 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:17.663860 systemd[1]: Created slice kubepods-besteffort-podfc4549c2_8a59_4fe9_a647_702140e0849a.slice. Aug 13 00:56:17.666239 env[1437]: time="2025-08-13T00:56:17.666201806Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xvhbw,Uid:fc4549c2-8a59-4fe9-a647-702140e0849a,Namespace:calico-system,Attempt:0,}" Aug 13 00:56:18.610022 kubelet[1948]: E0813 00:56:18.609955 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:19.360479 env[1437]: time="2025-08-13T00:56:19.360420874Z" level=info msg="shim disconnected" id=eaed750b28745cd67711c5330ede295cd1b3e9f7ee52cb9491a5cea442f7ef69 Aug 13 00:56:19.360479 env[1437]: time="2025-08-13T00:56:19.360470974Z" level=warning msg="cleaning up after shim disconnected" id=eaed750b28745cd67711c5330ede295cd1b3e9f7ee52cb9491a5cea442f7ef69 namespace=k8s.io Aug 13 00:56:19.360479 env[1437]: time="2025-08-13T00:56:19.360482274Z" level=info msg="cleaning up dead shim" Aug 13 00:56:19.368805 env[1437]: time="2025-08-13T00:56:19.368757873Z" level=warning msg="cleanup warnings time=\"2025-08-13T00:56:19Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2364 runtime=io.containerd.runc.v2\n" Aug 13 00:56:19.441511 env[1437]: time="2025-08-13T00:56:19.441436468Z" level=error msg="Failed to destroy network for sandbox \"b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 00:56:19.443756 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0-shm.mount: Deactivated successfully. Aug 13 00:56:19.445252 env[1437]: time="2025-08-13T00:56:19.445199767Z" level=error msg="encountered an error cleaning up failed sandbox \"b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 00:56:19.445378 env[1437]: time="2025-08-13T00:56:19.445276167Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xvhbw,Uid:fc4549c2-8a59-4fe9-a647-702140e0849a,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 00:56:19.445635 kubelet[1948]: E0813 00:56:19.445586 1948 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 00:56:19.445746 kubelet[1948]: E0813 00:56:19.445669 1948 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-xvhbw" Aug 13 00:56:19.445746 kubelet[1948]: E0813 00:56:19.445701 1948 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-xvhbw" Aug 13 00:56:19.445834 kubelet[1948]: E0813 00:56:19.445760 1948 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-xvhbw_calico-system(fc4549c2-8a59-4fe9-a647-702140e0849a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-xvhbw_calico-system(fc4549c2-8a59-4fe9-a647-702140e0849a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-xvhbw" podUID="fc4549c2-8a59-4fe9-a647-702140e0849a" Aug 13 00:56:19.611234 kubelet[1948]: E0813 00:56:19.611082 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:19.699175 env[1437]: time="2025-08-13T00:56:19.699126049Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.2\"" Aug 13 00:56:19.699485 kubelet[1948]: I0813 00:56:19.699438 1948 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0" Aug 13 00:56:19.700177 env[1437]: time="2025-08-13T00:56:19.700109849Z" level=info msg="StopPodSandbox for \"b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0\"" Aug 13 00:56:19.708303 systemd[1]: Created slice kubepods-besteffort-podc6d770dc_1557_4d20_95ad_ae5ed2398dea.slice. Aug 13 00:56:19.741666 env[1437]: time="2025-08-13T00:56:19.741596046Z" level=error msg="StopPodSandbox for \"b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0\" failed" error="failed to destroy network for sandbox \"b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 00:56:19.741883 kubelet[1948]: E0813 00:56:19.741831 1948 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0" Aug 13 00:56:19.742003 kubelet[1948]: E0813 00:56:19.741951 1948 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0"} Aug 13 00:56:19.742061 kubelet[1948]: E0813 00:56:19.742026 1948 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"fc4549c2-8a59-4fe9-a647-702140e0849a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Aug 13 00:56:19.742162 kubelet[1948]: E0813 00:56:19.742079 1948 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"fc4549c2-8a59-4fe9-a647-702140e0849a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-xvhbw" podUID="fc4549c2-8a59-4fe9-a647-702140e0849a" Aug 13 00:56:19.849738 kubelet[1948]: I0813 00:56:19.848913 1948 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-n6xrs\" (UniqueName: \"kubernetes.io/projected/c6d770dc-1557-4d20-95ad-ae5ed2398dea-kube-api-access-n6xrs\") pod \"nginx-deployment-7fcdb87857-7vhg4\" (UID: \"c6d770dc-1557-4d20-95ad-ae5ed2398dea\") " pod="default/nginx-deployment-7fcdb87857-7vhg4" Aug 13 00:56:20.018329 env[1437]: time="2025-08-13T00:56:20.017902026Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-7vhg4,Uid:c6d770dc-1557-4d20-95ad-ae5ed2398dea,Namespace:default,Attempt:0,}" Aug 13 00:56:20.105306 env[1437]: time="2025-08-13T00:56:20.105244820Z" level=error msg="Failed to destroy network for sandbox \"b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 00:56:20.105693 env[1437]: time="2025-08-13T00:56:20.105615220Z" level=error msg="encountered an error cleaning up failed sandbox \"b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 00:56:20.105795 env[1437]: time="2025-08-13T00:56:20.105715320Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-7vhg4,Uid:c6d770dc-1557-4d20-95ad-ae5ed2398dea,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 00:56:20.106028 kubelet[1948]: E0813 00:56:20.105980 1948 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 00:56:20.106126 kubelet[1948]: E0813 00:56:20.106054 1948 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-7vhg4" Aug 13 00:56:20.106126 kubelet[1948]: E0813 00:56:20.106082 1948 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-7vhg4" Aug 13 00:56:20.106215 kubelet[1948]: E0813 00:56:20.106138 1948 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-7fcdb87857-7vhg4_default(c6d770dc-1557-4d20-95ad-ae5ed2398dea)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-7fcdb87857-7vhg4_default(c6d770dc-1557-4d20-95ad-ae5ed2398dea)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-7vhg4" podUID="c6d770dc-1557-4d20-95ad-ae5ed2398dea" Aug 13 00:56:20.382442 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b-shm.mount: Deactivated successfully. Aug 13 00:56:20.612158 kubelet[1948]: E0813 00:56:20.612087 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:20.707328 kubelet[1948]: I0813 00:56:20.706379 1948 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b" Aug 13 00:56:20.707662 env[1437]: time="2025-08-13T00:56:20.707619179Z" level=info msg="StopPodSandbox for \"b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b\"" Aug 13 00:56:20.758186 env[1437]: time="2025-08-13T00:56:20.758123175Z" level=error msg="StopPodSandbox for \"b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b\" failed" error="failed to destroy network for sandbox \"b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Aug 13 00:56:20.758405 kubelet[1948]: E0813 00:56:20.758367 1948 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b" Aug 13 00:56:20.758503 kubelet[1948]: E0813 00:56:20.758424 1948 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b"} Aug 13 00:56:20.758503 kubelet[1948]: E0813 00:56:20.758470 1948 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c6d770dc-1557-4d20-95ad-ae5ed2398dea\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Aug 13 00:56:20.758641 kubelet[1948]: E0813 00:56:20.758508 1948 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c6d770dc-1557-4d20-95ad-ae5ed2398dea\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-7vhg4" podUID="c6d770dc-1557-4d20-95ad-ae5ed2398dea" Aug 13 00:56:21.612496 kubelet[1948]: E0813 00:56:21.612437 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:22.613064 kubelet[1948]: E0813 00:56:22.613014 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:23.614001 kubelet[1948]: E0813 00:56:23.613931 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:24.589472 kubelet[1948]: E0813 00:56:24.589405 1948 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:24.615134 kubelet[1948]: E0813 00:56:24.615057 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:25.615523 kubelet[1948]: E0813 00:56:25.615473 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:26.243725 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount765996922.mount: Deactivated successfully. Aug 13 00:56:26.293102 env[1437]: time="2025-08-13T00:56:26.293044362Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:26.298153 env[1437]: time="2025-08-13T00:56:26.298107762Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cc52550d767f73458fee2ee68db9db5de30d175e8fa4569ebdb43610127b6d20,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:26.301677 env[1437]: time="2025-08-13T00:56:26.301638762Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:26.306930 env[1437]: time="2025-08-13T00:56:26.306895761Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e94d49349cc361ef2216d27dda4a097278984d778279f66e79b0616c827c6760,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:26.307317 env[1437]: time="2025-08-13T00:56:26.307283561Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.2\" returns image reference \"sha256:cc52550d767f73458fee2ee68db9db5de30d175e8fa4569ebdb43610127b6d20\"" Aug 13 00:56:26.324033 env[1437]: time="2025-08-13T00:56:26.323997261Z" level=info msg="CreateContainer within sandbox \"41146a1771ff728ed931f6d65375f790e6a534080da8212a7e9c3d2a7f7baf58\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Aug 13 00:56:26.361881 env[1437]: time="2025-08-13T00:56:26.361802659Z" level=info msg="CreateContainer within sandbox \"41146a1771ff728ed931f6d65375f790e6a534080da8212a7e9c3d2a7f7baf58\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"6ff1643bc958f8d64a94710d2d88079b409b6e61a7a9a72ab842c9e4cff96cde\"" Aug 13 00:56:26.362492 env[1437]: time="2025-08-13T00:56:26.362387659Z" level=info msg="StartContainer for \"6ff1643bc958f8d64a94710d2d88079b409b6e61a7a9a72ab842c9e4cff96cde\"" Aug 13 00:56:26.383142 systemd[1]: Started cri-containerd-6ff1643bc958f8d64a94710d2d88079b409b6e61a7a9a72ab842c9e4cff96cde.scope. Aug 13 00:56:26.422640 kernel: kauditd_printk_skb: 34 callbacks suppressed Aug 13 00:56:26.422808 kernel: audit: type=1400 audit(1755046586.403:545): avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:26.403000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:26.403000 audit[2473]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f42b07527b8 items=0 ppid=2006 pid=2473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:26.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666663136343362633935386638643634613934373130643264383830 Aug 13 00:56:26.463714 kernel: audit: type=1300 audit(1755046586.403:545): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f42b07527b8 items=0 ppid=2006 pid=2473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:26.463860 kernel: audit: type=1327 audit(1755046586.403:545): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666663136343362633935386638643634613934373130643264383830 Aug 13 00:56:26.403000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:26.492399 kernel: audit: type=1400 audit(1755046586.403:546): avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:26.492541 kernel: audit: type=1400 audit(1755046586.403:546): avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:26.403000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:26.492984 env[1437]: time="2025-08-13T00:56:26.492934653Z" level=info msg="StartContainer for \"6ff1643bc958f8d64a94710d2d88079b409b6e61a7a9a72ab842c9e4cff96cde\" returns successfully" Aug 13 00:56:26.403000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:26.403000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:26.524966 kernel: audit: type=1400 audit(1755046586.403:546): avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:26.525104 kernel: audit: type=1400 audit(1755046586.403:546): avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:26.525130 kernel: audit: type=1400 audit(1755046586.403:546): avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:26.403000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:26.403000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:26.553124 kernel: audit: type=1400 audit(1755046586.403:546): avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:26.553264 kernel: audit: type=1400 audit(1755046586.403:546): avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:26.403000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:26.403000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:26.403000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:26.403000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:26.403000 audit: BPF prog-id=79 op=LOAD Aug 13 00:56:26.403000 audit[2473]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00027a798 items=0 ppid=2006 pid=2473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:26.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666663136343362633935386638643634613934373130643264383830 Aug 13 00:56:26.422000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:26.422000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:26.422000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:26.422000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:26.422000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:26.422000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:26.422000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:26.422000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:26.422000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:26.422000 audit: BPF prog-id=80 op=LOAD Aug 13 00:56:26.422000 audit[2473]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00027a7e8 items=0 ppid=2006 pid=2473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:26.422000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666663136343362633935386638643634613934373130643264383830 Aug 13 00:56:26.422000 audit: BPF prog-id=80 op=UNLOAD Aug 13 00:56:26.422000 audit: BPF prog-id=79 op=UNLOAD Aug 13 00:56:26.422000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:26.422000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:26.422000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:26.422000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:26.422000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:26.422000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:26.422000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:26.422000 audit[2473]: AVC avc: denied { perfmon } for pid=2473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:26.422000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:26.422000 audit[2473]: AVC avc: denied { bpf } for pid=2473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:26.422000 audit: BPF prog-id=81 op=LOAD Aug 13 00:56:26.422000 audit[2473]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00027a878 items=0 ppid=2006 pid=2473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:26.422000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666663136343362633935386638643634613934373130643264383830 Aug 13 00:56:26.615984 kubelet[1948]: E0813 00:56:26.615937 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:26.644300 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Aug 13 00:56:26.644455 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Aug 13 00:56:26.750747 kubelet[1948]: I0813 00:56:26.750681 1948 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-c62lp" podStartSLOduration=3.66120531 podStartE2EDuration="22.750661441s" podCreationTimestamp="2025-08-13 00:56:04 +0000 UTC" firstStartedPulling="2025-08-13 00:56:07.21901653 +0000 UTC m=+3.929046579" lastFinishedPulling="2025-08-13 00:56:26.308472761 +0000 UTC m=+23.018502710" observedRunningTime="2025-08-13 00:56:26.750189941 +0000 UTC m=+23.460219890" watchObservedRunningTime="2025-08-13 00:56:26.750661441 +0000 UTC m=+23.460691490" Aug 13 00:56:27.616758 kubelet[1948]: E0813 00:56:27.616697 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:28.000000 audit[2564]: AVC avc: denied { write } for pid=2564 comm="tee" name="fd" dev="proc" ino=23850 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Aug 13 00:56:28.000000 audit[2564]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcff8807de a2=241 a3=1b6 items=1 ppid=2537 pid=2564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.000000 audit: CWD cwd="/etc/service/enabled/cni/log" Aug 13 00:56:28.000000 audit: PATH item=0 name="/dev/fd/63" inode=23844 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:28.000000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Aug 13 00:56:28.008000 audit[2566]: AVC avc: denied { write } for pid=2566 comm="tee" name="fd" dev="proc" ino=22817 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Aug 13 00:56:28.008000 audit[2566]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff98a377dc a2=241 a3=1b6 items=1 ppid=2545 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.008000 audit: CWD cwd="/etc/service/enabled/bird6/log" Aug 13 00:56:28.008000 audit: PATH item=0 name="/dev/fd/63" inode=23847 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:28.008000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Aug 13 00:56:28.023000 audit[2580]: AVC avc: denied { write } for pid=2580 comm="tee" name="fd" dev="proc" ino=22825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Aug 13 00:56:28.023000 audit[2580]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffecff3e7dc a2=241 a3=1b6 items=1 ppid=2539 pid=2580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.023000 audit: CWD cwd="/etc/service/enabled/felix/log" Aug 13 00:56:28.023000 audit: PATH item=0 name="/dev/fd/63" inode=23853 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:28.023000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Aug 13 00:56:28.024000 audit[2590]: AVC avc: denied { write } for pid=2590 comm="tee" name="fd" dev="proc" ino=22832 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Aug 13 00:56:28.024000 audit[2590]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdb96e07dc a2=241 a3=1b6 items=1 ppid=2541 pid=2590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.024000 audit: CWD cwd="/etc/service/enabled/confd/log" Aug 13 00:56:28.024000 audit: PATH item=0 name="/dev/fd/63" inode=23858 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:28.024000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Aug 13 00:56:28.028000 audit[2595]: AVC avc: denied { write } for pid=2595 comm="tee" name="fd" dev="proc" ino=23866 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Aug 13 00:56:28.030000 audit[2597]: AVC avc: denied { write } for pid=2597 comm="tee" name="fd" dev="proc" ino=23869 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Aug 13 00:56:28.037000 audit[2604]: AVC avc: denied { write } for pid=2604 comm="tee" name="fd" dev="proc" ino=22838 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Aug 13 00:56:28.037000 audit[2604]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff23e1c7dd a2=241 a3=1b6 items=1 ppid=2548 pid=2604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.037000 audit: CWD cwd="/etc/service/enabled/bird/log" Aug 13 00:56:28.037000 audit: PATH item=0 name="/dev/fd/63" inode=22829 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:28.037000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Aug 13 00:56:28.028000 audit[2595]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcf219c7cd a2=241 a3=1b6 items=1 ppid=2547 pid=2595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.028000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Aug 13 00:56:28.028000 audit: PATH item=0 name="/dev/fd/63" inode=22821 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:28.028000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Aug 13 00:56:28.030000 audit[2597]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff8e6237cc a2=241 a3=1b6 items=1 ppid=2543 pid=2597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.030000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Aug 13 00:56:28.030000 audit: PATH item=0 name="/dev/fd/63" inode=23861 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:56:28.030000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Aug 13 00:56:28.302000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.302000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.302000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.302000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.302000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.302000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.302000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.302000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.302000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.302000 audit: BPF prog-id=82 op=LOAD Aug 13 00:56:28.302000 audit[2643]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffe0d871f0 a2=98 a3=1fffffffffffffff items=0 ppid=2540 pid=2643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.302000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Aug 13 00:56:28.302000 audit: BPF prog-id=82 op=UNLOAD Aug 13 00:56:28.303000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.303000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.303000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.303000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.303000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.303000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.303000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.303000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.303000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.303000 audit: BPF prog-id=83 op=LOAD Aug 13 00:56:28.303000 audit[2643]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffe0d870d0 a2=94 a3=3 items=0 ppid=2540 pid=2643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.303000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Aug 13 00:56:28.303000 audit: BPF prog-id=83 op=UNLOAD Aug 13 00:56:28.303000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.303000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.303000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.303000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.303000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.303000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.303000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.303000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.303000 audit[2643]: AVC avc: denied { bpf } for pid=2643 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.303000 audit: BPF prog-id=84 op=LOAD Aug 13 00:56:28.303000 audit[2643]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffe0d87110 a2=94 a3=7fffe0d872f0 items=0 ppid=2540 pid=2643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.303000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Aug 13 00:56:28.303000 audit: BPF prog-id=84 op=UNLOAD Aug 13 00:56:28.303000 audit[2643]: AVC avc: denied { perfmon } for pid=2643 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.303000 audit[2643]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7fffe0d871e0 a2=50 a3=a000000085 items=0 ppid=2540 pid=2643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.303000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Aug 13 00:56:28.306000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.306000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.306000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.306000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.306000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.306000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.306000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.306000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.306000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.306000 audit: BPF prog-id=85 op=LOAD Aug 13 00:56:28.306000 audit[2645]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffef774d1d0 a2=98 a3=3 items=0 ppid=2540 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.306000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:56:28.307000 audit: BPF prog-id=85 op=UNLOAD Aug 13 00:56:28.307000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.307000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.307000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.307000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.307000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.307000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.307000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.307000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.307000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.307000 audit: BPF prog-id=86 op=LOAD Aug 13 00:56:28.307000 audit[2645]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffef774cfc0 a2=94 a3=54428f items=0 ppid=2540 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.307000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:56:28.307000 audit: BPF prog-id=86 op=UNLOAD Aug 13 00:56:28.307000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.307000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.307000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.307000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.307000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.307000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.307000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.307000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.307000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.307000 audit: BPF prog-id=87 op=LOAD Aug 13 00:56:28.307000 audit[2645]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffef774cff0 a2=94 a3=2 items=0 ppid=2540 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.307000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:56:28.307000 audit: BPF prog-id=87 op=UNLOAD Aug 13 00:56:28.425000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.425000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.425000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.425000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.425000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.425000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.425000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.425000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.425000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.425000 audit: BPF prog-id=88 op=LOAD Aug 13 00:56:28.425000 audit[2645]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffef774ceb0 a2=94 a3=1 items=0 ppid=2540 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.425000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:56:28.425000 audit: BPF prog-id=88 op=UNLOAD Aug 13 00:56:28.425000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.425000 audit[2645]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffef774cf80 a2=50 a3=7ffef774d060 items=0 ppid=2540 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.425000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:56:28.435000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.435000 audit[2645]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffef774cec0 a2=28 a3=0 items=0 ppid=2540 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.435000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:56:28.435000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.435000 audit[2645]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffef774cef0 a2=28 a3=0 items=0 ppid=2540 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.435000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:56:28.435000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.435000 audit[2645]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffef774ce00 a2=28 a3=0 items=0 ppid=2540 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.435000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:56:28.435000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.435000 audit[2645]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffef774cf10 a2=28 a3=0 items=0 ppid=2540 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.435000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:56:28.435000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.435000 audit[2645]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffef774cef0 a2=28 a3=0 items=0 ppid=2540 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.435000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:56:28.435000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.435000 audit[2645]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffef774cee0 a2=28 a3=0 items=0 ppid=2540 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.435000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:56:28.435000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.435000 audit[2645]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffef774cf10 a2=28 a3=0 items=0 ppid=2540 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.435000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:56:28.435000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.435000 audit[2645]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffef774cef0 a2=28 a3=0 items=0 ppid=2540 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.435000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:56:28.435000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.435000 audit[2645]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffef774cf10 a2=28 a3=0 items=0 ppid=2540 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.435000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:56:28.435000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.435000 audit[2645]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffef774cee0 a2=28 a3=0 items=0 ppid=2540 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.435000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:56:28.435000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.435000 audit[2645]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffef774cf50 a2=28 a3=0 items=0 ppid=2540 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.435000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:56:28.436000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.436000 audit[2645]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffef774cd00 a2=50 a3=1 items=0 ppid=2540 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.436000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:56:28.436000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.436000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.436000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.436000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.436000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.436000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.436000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.436000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.436000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.436000 audit: BPF prog-id=89 op=LOAD Aug 13 00:56:28.436000 audit[2645]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffef774cd00 a2=94 a3=5 items=0 ppid=2540 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.436000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:56:28.436000 audit: BPF prog-id=89 op=UNLOAD Aug 13 00:56:28.436000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.436000 audit[2645]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffef774cdb0 a2=50 a3=1 items=0 ppid=2540 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.436000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:56:28.436000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.436000 audit[2645]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffef774ced0 a2=4 a3=38 items=0 ppid=2540 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.436000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:56:28.436000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.436000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.436000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.436000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.436000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.436000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.436000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.436000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.436000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.436000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.436000 audit[2645]: AVC avc: denied { confidentiality } for pid=2645 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:56:28.436000 audit[2645]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffef774cf20 a2=94 a3=6 items=0 ppid=2540 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.436000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:56:28.436000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.436000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.436000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.436000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.436000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.436000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.436000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.436000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.436000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.436000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.436000 audit[2645]: AVC avc: denied { confidentiality } for pid=2645 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:56:28.436000 audit[2645]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffef774c6d0 a2=94 a3=88 items=0 ppid=2540 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.436000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:56:28.437000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.437000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.437000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.437000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.437000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.437000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.437000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.437000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.437000 audit[2645]: AVC avc: denied { perfmon } for pid=2645 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.437000 audit[2645]: AVC avc: denied { bpf } for pid=2645 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.437000 audit[2645]: AVC avc: denied { confidentiality } for pid=2645 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:56:28.437000 audit[2645]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffef774c6d0 a2=94 a3=88 items=0 ppid=2540 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.437000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Aug 13 00:56:28.446000 audit[2648]: AVC avc: denied { bpf } for pid=2648 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.446000 audit[2648]: AVC avc: denied { bpf } for pid=2648 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.446000 audit[2648]: AVC avc: denied { perfmon } for pid=2648 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.446000 audit[2648]: AVC avc: denied { perfmon } for pid=2648 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.446000 audit[2648]: AVC avc: denied { perfmon } for pid=2648 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.446000 audit[2648]: AVC avc: denied { perfmon } for pid=2648 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.446000 audit[2648]: AVC avc: denied { perfmon } for pid=2648 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.446000 audit[2648]: AVC avc: denied { bpf } for pid=2648 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.446000 audit[2648]: AVC avc: denied { bpf } for pid=2648 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.446000 audit: BPF prog-id=90 op=LOAD Aug 13 00:56:28.446000 audit[2648]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc19682840 a2=98 a3=1999999999999999 items=0 ppid=2540 pid=2648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.446000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Aug 13 00:56:28.446000 audit: BPF prog-id=90 op=UNLOAD Aug 13 00:56:28.446000 audit[2648]: AVC avc: denied { bpf } for pid=2648 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.446000 audit[2648]: AVC avc: denied { bpf } for pid=2648 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.446000 audit[2648]: AVC avc: denied { perfmon } for pid=2648 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.446000 audit[2648]: AVC avc: denied { perfmon } for pid=2648 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.446000 audit[2648]: AVC avc: denied { perfmon } for pid=2648 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.446000 audit[2648]: AVC avc: denied { perfmon } for pid=2648 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.446000 audit[2648]: AVC avc: denied { perfmon } for pid=2648 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.446000 audit[2648]: AVC avc: denied { bpf } for pid=2648 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.446000 audit[2648]: AVC avc: denied { bpf } for pid=2648 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.446000 audit: BPF prog-id=91 op=LOAD Aug 13 00:56:28.446000 audit[2648]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc19682720 a2=94 a3=ffff items=0 ppid=2540 pid=2648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.446000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Aug 13 00:56:28.446000 audit: BPF prog-id=91 op=UNLOAD Aug 13 00:56:28.446000 audit[2648]: AVC avc: denied { bpf } for pid=2648 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.446000 audit[2648]: AVC avc: denied { bpf } for pid=2648 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.446000 audit[2648]: AVC avc: denied { perfmon } for pid=2648 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.446000 audit[2648]: AVC avc: denied { perfmon } for pid=2648 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.446000 audit[2648]: AVC avc: denied { perfmon } for pid=2648 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.446000 audit[2648]: AVC avc: denied { perfmon } for pid=2648 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.446000 audit[2648]: AVC avc: denied { perfmon } for pid=2648 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.446000 audit[2648]: AVC avc: denied { bpf } for pid=2648 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.446000 audit[2648]: AVC avc: denied { bpf } for pid=2648 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.446000 audit: BPF prog-id=92 op=LOAD Aug 13 00:56:28.446000 audit[2648]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc19682760 a2=94 a3=7ffc19682940 items=0 ppid=2540 pid=2648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.446000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Aug 13 00:56:28.446000 audit: BPF prog-id=92 op=UNLOAD Aug 13 00:56:28.517280 systemd-networkd[1585]: vxlan.calico: Link UP Aug 13 00:56:28.517290 systemd-networkd[1585]: vxlan.calico: Gained carrier Aug 13 00:56:28.553000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.553000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.553000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.553000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.553000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.553000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.553000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.553000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.553000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.553000 audit: BPF prog-id=93 op=LOAD Aug 13 00:56:28.553000 audit[2675]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffedd8ab3d0 a2=98 a3=0 items=0 ppid=2540 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.553000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:56:28.553000 audit: BPF prog-id=93 op=UNLOAD Aug 13 00:56:28.553000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.553000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.553000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.553000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.553000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.553000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.553000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.553000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.553000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.553000 audit: BPF prog-id=94 op=LOAD Aug 13 00:56:28.553000 audit[2675]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffedd8ab1e0 a2=94 a3=54428f items=0 ppid=2540 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.553000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:56:28.554000 audit: BPF prog-id=94 op=UNLOAD Aug 13 00:56:28.554000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.554000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.554000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.554000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.554000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.554000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.554000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.554000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.554000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.554000 audit: BPF prog-id=95 op=LOAD Aug 13 00:56:28.554000 audit[2675]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffedd8ab210 a2=94 a3=2 items=0 ppid=2540 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.554000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:56:28.554000 audit: BPF prog-id=95 op=UNLOAD Aug 13 00:56:28.554000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.554000 audit[2675]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffedd8ab0e0 a2=28 a3=0 items=0 ppid=2540 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.554000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:56:28.554000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.554000 audit[2675]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffedd8ab110 a2=28 a3=0 items=0 ppid=2540 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.554000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:56:28.554000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.554000 audit[2675]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffedd8ab020 a2=28 a3=0 items=0 ppid=2540 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.554000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:56:28.554000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.554000 audit[2675]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffedd8ab130 a2=28 a3=0 items=0 ppid=2540 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.554000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:56:28.554000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.554000 audit[2675]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffedd8ab110 a2=28 a3=0 items=0 ppid=2540 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.554000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:56:28.554000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.554000 audit[2675]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffedd8ab100 a2=28 a3=0 items=0 ppid=2540 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.554000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:56:28.554000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.554000 audit[2675]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffedd8ab130 a2=28 a3=0 items=0 ppid=2540 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.554000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:56:28.554000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.554000 audit[2675]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffedd8ab110 a2=28 a3=0 items=0 ppid=2540 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.554000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:56:28.554000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.554000 audit[2675]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffedd8ab130 a2=28 a3=0 items=0 ppid=2540 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.554000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:56:28.554000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.554000 audit[2675]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffedd8ab100 a2=28 a3=0 items=0 ppid=2540 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.554000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:56:28.554000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.554000 audit[2675]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffedd8ab170 a2=28 a3=0 items=0 ppid=2540 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.554000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:56:28.554000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.554000 audit[2675]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffedd8aafe0 a2=94 a3=0 items=0 ppid=2540 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.554000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:56:28.559000 audit: BPF prog-id=96 op=UNLOAD Aug 13 00:56:28.559000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.559000 audit[2675]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffedd8aafd0 a2=50 a3=2800 items=0 ppid=2540 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.559000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:56:28.559000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.559000 audit[2675]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffedd8aafd0 a2=50 a3=2800 items=0 ppid=2540 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.559000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:56:28.559000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.559000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.559000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.559000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.559000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.559000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.559000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.559000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.559000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.559000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.559000 audit: BPF prog-id=97 op=LOAD Aug 13 00:56:28.559000 audit[2675]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffedd8aa7f0 a2=94 a3=2 items=0 ppid=2540 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.559000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:56:28.560000 audit: BPF prog-id=97 op=UNLOAD Aug 13 00:56:28.560000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.560000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.560000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.560000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.560000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.560000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.560000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.560000 audit[2675]: AVC avc: denied { perfmon } for pid=2675 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.560000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.560000 audit[2675]: AVC avc: denied { bpf } for pid=2675 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.560000 audit: BPF prog-id=98 op=LOAD Aug 13 00:56:28.560000 audit[2675]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffedd8aa8f0 a2=94 a3=30 items=0 ppid=2540 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.560000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Aug 13 00:56:28.564000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.564000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.564000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.564000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.564000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.564000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.564000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.564000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.564000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.564000 audit: BPF prog-id=99 op=LOAD Aug 13 00:56:28.564000 audit[2678]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc9b203a00 a2=98 a3=0 items=0 ppid=2540 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.564000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:56:28.564000 audit: BPF prog-id=99 op=UNLOAD Aug 13 00:56:28.564000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.564000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.564000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.564000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.564000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.564000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.564000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.564000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.564000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.564000 audit: BPF prog-id=100 op=LOAD Aug 13 00:56:28.564000 audit[2678]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc9b2037f0 a2=94 a3=54428f items=0 ppid=2540 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.564000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:56:28.564000 audit: BPF prog-id=100 op=UNLOAD Aug 13 00:56:28.564000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.564000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.564000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.564000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.564000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.564000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.564000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.564000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.564000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.564000 audit: BPF prog-id=101 op=LOAD Aug 13 00:56:28.564000 audit[2678]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc9b203820 a2=94 a3=2 items=0 ppid=2540 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.564000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:56:28.564000 audit: BPF prog-id=101 op=UNLOAD Aug 13 00:56:28.617822 kubelet[1948]: E0813 00:56:28.617771 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:28.700000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.700000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.700000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.700000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.700000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.700000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.700000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.700000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.700000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.700000 audit: BPF prog-id=102 op=LOAD Aug 13 00:56:28.700000 audit[2678]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc9b2036e0 a2=94 a3=1 items=0 ppid=2540 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.700000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:56:28.700000 audit: BPF prog-id=102 op=UNLOAD Aug 13 00:56:28.700000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.700000 audit[2678]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc9b2037b0 a2=50 a3=7ffc9b203890 items=0 ppid=2540 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.700000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:56:28.710000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.710000 audit[2678]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc9b2036f0 a2=28 a3=0 items=0 ppid=2540 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.710000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:56:28.711000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.711000 audit[2678]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc9b203720 a2=28 a3=0 items=0 ppid=2540 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.711000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:56:28.711000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.711000 audit[2678]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc9b203630 a2=28 a3=0 items=0 ppid=2540 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.711000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:56:28.711000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.711000 audit[2678]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc9b203740 a2=28 a3=0 items=0 ppid=2540 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.711000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:56:28.711000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.711000 audit[2678]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc9b203720 a2=28 a3=0 items=0 ppid=2540 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.711000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:56:28.711000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.711000 audit[2678]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc9b203710 a2=28 a3=0 items=0 ppid=2540 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.711000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:56:28.711000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.711000 audit[2678]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc9b203740 a2=28 a3=0 items=0 ppid=2540 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.711000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:56:28.711000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.711000 audit[2678]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc9b203720 a2=28 a3=0 items=0 ppid=2540 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.711000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:56:28.711000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.711000 audit[2678]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc9b203740 a2=28 a3=0 items=0 ppid=2540 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.711000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:56:28.711000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.711000 audit[2678]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc9b203710 a2=28 a3=0 items=0 ppid=2540 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.711000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:56:28.711000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.711000 audit[2678]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc9b203780 a2=28 a3=0 items=0 ppid=2540 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.711000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:56:28.711000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.711000 audit[2678]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc9b203530 a2=50 a3=1 items=0 ppid=2540 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.711000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:56:28.711000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.711000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.711000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.711000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.711000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.711000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.711000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.711000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.711000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.711000 audit: BPF prog-id=103 op=LOAD Aug 13 00:56:28.711000 audit[2678]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc9b203530 a2=94 a3=5 items=0 ppid=2540 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.711000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:56:28.711000 audit: BPF prog-id=103 op=UNLOAD Aug 13 00:56:28.711000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.711000 audit[2678]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc9b2035e0 a2=50 a3=1 items=0 ppid=2540 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.711000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:56:28.711000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.711000 audit[2678]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc9b203700 a2=4 a3=38 items=0 ppid=2540 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.711000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:56:28.711000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.711000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.711000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.711000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.711000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.711000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.711000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.711000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.711000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.711000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.711000 audit[2678]: AVC avc: denied { confidentiality } for pid=2678 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:56:28.711000 audit[2678]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc9b203750 a2=94 a3=6 items=0 ppid=2540 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.711000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:56:28.712000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.712000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.712000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.712000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.712000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.712000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.712000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.712000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.712000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.712000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.712000 audit[2678]: AVC avc: denied { confidentiality } for pid=2678 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:56:28.712000 audit[2678]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc9b202f00 a2=94 a3=88 items=0 ppid=2540 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.712000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:56:28.712000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.712000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.712000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.712000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.712000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.712000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.712000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.712000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.712000 audit[2678]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc9b202f00 a2=94 a3=88 items=0 ppid=2540 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.712000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:56:28.712000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.712000 audit[2678]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc9b204930 a2=10 a3=f8f00800 items=0 ppid=2540 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.712000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:56:28.713000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.713000 audit[2678]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc9b2047d0 a2=10 a3=3 items=0 ppid=2540 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.713000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:56:28.713000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.713000 audit[2678]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc9b204770 a2=10 a3=3 items=0 ppid=2540 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.713000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:56:28.713000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:28.713000 audit[2678]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc9b204770 a2=10 a3=7 items=0 ppid=2540 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.713000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Aug 13 00:56:28.721000 audit: BPF prog-id=98 op=UNLOAD Aug 13 00:56:28.794000 audit[2703]: NETFILTER_CFG table=mangle:68 family=2 entries=16 op=nft_register_chain pid=2703 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Aug 13 00:56:28.794000 audit[2703]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffc8786a440 a2=0 a3=7ffc8786a42c items=0 ppid=2540 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.794000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Aug 13 00:56:28.805000 audit[2704]: NETFILTER_CFG table=nat:69 family=2 entries=15 op=nft_register_chain pid=2704 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Aug 13 00:56:28.805000 audit[2704]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffe521fb680 a2=0 a3=7ffe521fb66c items=0 ppid=2540 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.805000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Aug 13 00:56:28.815000 audit[2702]: NETFILTER_CFG table=raw:70 family=2 entries=21 op=nft_register_chain pid=2702 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Aug 13 00:56:28.815000 audit[2702]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffef9ba79e0 a2=0 a3=7ffef9ba79cc items=0 ppid=2540 pid=2702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.815000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Aug 13 00:56:28.820000 audit[2709]: NETFILTER_CFG table=filter:71 family=2 entries=39 op=nft_register_chain pid=2709 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Aug 13 00:56:28.820000 audit[2709]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7fff41c23580 a2=0 a3=7fff41c2356c items=0 ppid=2540 pid=2709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:28.820000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Aug 13 00:56:29.619024 kubelet[1948]: E0813 00:56:29.618951 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:29.968151 systemd-networkd[1585]: vxlan.calico: Gained IPv6LL Aug 13 00:56:30.619901 kubelet[1948]: E0813 00:56:30.619836 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:30.946647 kubelet[1948]: I0813 00:56:30.946486 1948 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Aug 13 00:56:30.970103 systemd[1]: run-containerd-runc-k8s.io-6ff1643bc958f8d64a94710d2d88079b409b6e61a7a9a72ab842c9e4cff96cde-runc.D60XCX.mount: Deactivated successfully. Aug 13 00:56:31.620081 kubelet[1948]: E0813 00:56:31.620030 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:31.964195 systemd[1]: run-containerd-runc-k8s.io-6ff1643bc958f8d64a94710d2d88079b409b6e61a7a9a72ab842c9e4cff96cde-runc.ENKUVp.mount: Deactivated successfully. Aug 13 00:56:32.620241 kubelet[1948]: E0813 00:56:32.620174 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:33.620736 kubelet[1948]: E0813 00:56:33.620676 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:33.659034 env[1437]: time="2025-08-13T00:56:33.658964486Z" level=info msg="StopPodSandbox for \"b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b\"" Aug 13 00:56:33.659633 env[1437]: time="2025-08-13T00:56:33.659565886Z" level=info msg="StopPodSandbox for \"b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0\"" Aug 13 00:56:33.766297 env[1437]: 2025-08-13 00:56:33.717 [INFO][2778] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b" Aug 13 00:56:33.766297 env[1437]: 2025-08-13 00:56:33.717 [INFO][2778] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b" iface="eth0" netns="/var/run/netns/cni-2f5b568d-72ad-8abd-aa24-56fd243a3ca3" Aug 13 00:56:33.766297 env[1437]: 2025-08-13 00:56:33.717 [INFO][2778] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b" iface="eth0" netns="/var/run/netns/cni-2f5b568d-72ad-8abd-aa24-56fd243a3ca3" Aug 13 00:56:33.766297 env[1437]: 2025-08-13 00:56:33.717 [INFO][2778] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b" iface="eth0" netns="/var/run/netns/cni-2f5b568d-72ad-8abd-aa24-56fd243a3ca3" Aug 13 00:56:33.766297 env[1437]: 2025-08-13 00:56:33.717 [INFO][2778] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b" Aug 13 00:56:33.766297 env[1437]: 2025-08-13 00:56:33.717 [INFO][2778] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b" Aug 13 00:56:33.766297 env[1437]: 2025-08-13 00:56:33.751 [INFO][2791] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b" HandleID="k8s-pod-network.b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b" Workload="10.200.4.18-k8s-nginx--deployment--7fcdb87857--7vhg4-eth0" Aug 13 00:56:33.766297 env[1437]: 2025-08-13 00:56:33.752 [INFO][2791] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 00:56:33.766297 env[1437]: 2025-08-13 00:56:33.752 [INFO][2791] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 00:56:33.766297 env[1437]: 2025-08-13 00:56:33.761 [WARNING][2791] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b" HandleID="k8s-pod-network.b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b" Workload="10.200.4.18-k8s-nginx--deployment--7fcdb87857--7vhg4-eth0" Aug 13 00:56:33.766297 env[1437]: 2025-08-13 00:56:33.761 [INFO][2791] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b" HandleID="k8s-pod-network.b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b" Workload="10.200.4.18-k8s-nginx--deployment--7fcdb87857--7vhg4-eth0" Aug 13 00:56:33.766297 env[1437]: 2025-08-13 00:56:33.762 [INFO][2791] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 00:56:33.766297 env[1437]: 2025-08-13 00:56:33.764 [INFO][2778] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b" Aug 13 00:56:33.770426 env[1437]: time="2025-08-13T00:56:33.768933783Z" level=info msg="TearDown network for sandbox \"b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b\" successfully" Aug 13 00:56:33.770426 env[1437]: time="2025-08-13T00:56:33.768977183Z" level=info msg="StopPodSandbox for \"b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b\" returns successfully" Aug 13 00:56:33.768990 systemd[1]: run-netns-cni\x2d2f5b568d\x2d72ad\x2d8abd\x2daa24\x2d56fd243a3ca3.mount: Deactivated successfully. Aug 13 00:56:33.770783 env[1437]: time="2025-08-13T00:56:33.770631083Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-7vhg4,Uid:c6d770dc-1557-4d20-95ad-ae5ed2398dea,Namespace:default,Attempt:1,}" Aug 13 00:56:33.778346 env[1437]: 2025-08-13 00:56:33.722 [INFO][2779] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0" Aug 13 00:56:33.778346 env[1437]: 2025-08-13 00:56:33.722 [INFO][2779] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0" iface="eth0" netns="/var/run/netns/cni-095bbcda-c766-5504-d26e-5b1371363569" Aug 13 00:56:33.778346 env[1437]: 2025-08-13 00:56:33.722 [INFO][2779] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0" iface="eth0" netns="/var/run/netns/cni-095bbcda-c766-5504-d26e-5b1371363569" Aug 13 00:56:33.778346 env[1437]: 2025-08-13 00:56:33.722 [INFO][2779] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0" iface="eth0" netns="/var/run/netns/cni-095bbcda-c766-5504-d26e-5b1371363569" Aug 13 00:56:33.778346 env[1437]: 2025-08-13 00:56:33.722 [INFO][2779] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0" Aug 13 00:56:33.778346 env[1437]: 2025-08-13 00:56:33.722 [INFO][2779] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0" Aug 13 00:56:33.778346 env[1437]: 2025-08-13 00:56:33.759 [INFO][2797] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0" HandleID="k8s-pod-network.b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0" Workload="10.200.4.18-k8s-csi--node--driver--xvhbw-eth0" Aug 13 00:56:33.778346 env[1437]: 2025-08-13 00:56:33.760 [INFO][2797] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 00:56:33.778346 env[1437]: 2025-08-13 00:56:33.762 [INFO][2797] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 00:56:33.778346 env[1437]: 2025-08-13 00:56:33.773 [WARNING][2797] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0" HandleID="k8s-pod-network.b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0" Workload="10.200.4.18-k8s-csi--node--driver--xvhbw-eth0" Aug 13 00:56:33.778346 env[1437]: 2025-08-13 00:56:33.774 [INFO][2797] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0" HandleID="k8s-pod-network.b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0" Workload="10.200.4.18-k8s-csi--node--driver--xvhbw-eth0" Aug 13 00:56:33.778346 env[1437]: 2025-08-13 00:56:33.775 [INFO][2797] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 00:56:33.778346 env[1437]: 2025-08-13 00:56:33.777 [INFO][2779] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0" Aug 13 00:56:33.783600 env[1437]: time="2025-08-13T00:56:33.780979682Z" level=info msg="TearDown network for sandbox \"b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0\" successfully" Aug 13 00:56:33.783600 env[1437]: time="2025-08-13T00:56:33.781024182Z" level=info msg="StopPodSandbox for \"b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0\" returns successfully" Aug 13 00:56:33.783600 env[1437]: time="2025-08-13T00:56:33.781778682Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xvhbw,Uid:fc4549c2-8a59-4fe9-a647-702140e0849a,Namespace:calico-system,Attempt:1,}" Aug 13 00:56:33.782866 systemd[1]: run-netns-cni\x2d095bbcda\x2dc766\x2d5504\x2dd26e\x2d5b1371363569.mount: Deactivated successfully. Aug 13 00:56:33.967632 systemd-networkd[1585]: cali9f7df7bb2de: Link UP Aug 13 00:56:33.981526 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Aug 13 00:56:33.981660 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9f7df7bb2de: link becomes ready Aug 13 00:56:33.982187 systemd-networkd[1585]: cali9f7df7bb2de: Gained carrier Aug 13 00:56:34.002039 env[1437]: 2025-08-13 00:56:33.892 [INFO][2823] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.4.18-k8s-csi--node--driver--xvhbw-eth0 csi-node-driver- calico-system fc4549c2-8a59-4fe9-a647-702140e0849a 1450 0 2025-08-13 00:56:04 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:8967bcb6f k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.200.4.18 csi-node-driver-xvhbw eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali9f7df7bb2de [] [] }} ContainerID="9dab18d40760879eb61c00fd9ca0c4822fd9321c6de93dee267dc6a9b37d9d0c" Namespace="calico-system" Pod="csi-node-driver-xvhbw" WorkloadEndpoint="10.200.4.18-k8s-csi--node--driver--xvhbw-" Aug 13 00:56:34.002039 env[1437]: 2025-08-13 00:56:33.893 [INFO][2823] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="9dab18d40760879eb61c00fd9ca0c4822fd9321c6de93dee267dc6a9b37d9d0c" Namespace="calico-system" Pod="csi-node-driver-xvhbw" WorkloadEndpoint="10.200.4.18-k8s-csi--node--driver--xvhbw-eth0" Aug 13 00:56:34.002039 env[1437]: 2025-08-13 00:56:33.931 [INFO][2843] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9dab18d40760879eb61c00fd9ca0c4822fd9321c6de93dee267dc6a9b37d9d0c" HandleID="k8s-pod-network.9dab18d40760879eb61c00fd9ca0c4822fd9321c6de93dee267dc6a9b37d9d0c" Workload="10.200.4.18-k8s-csi--node--driver--xvhbw-eth0" Aug 13 00:56:34.002039 env[1437]: 2025-08-13 00:56:33.931 [INFO][2843] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="9dab18d40760879eb61c00fd9ca0c4822fd9321c6de93dee267dc6a9b37d9d0c" HandleID="k8s-pod-network.9dab18d40760879eb61c00fd9ca0c4822fd9321c6de93dee267dc6a9b37d9d0c" Workload="10.200.4.18-k8s-csi--node--driver--xvhbw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00025b100), Attrs:map[string]string{"namespace":"calico-system", "node":"10.200.4.18", "pod":"csi-node-driver-xvhbw", "timestamp":"2025-08-13 00:56:33.931208478 +0000 UTC"}, Hostname:"10.200.4.18", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Aug 13 00:56:34.002039 env[1437]: 2025-08-13 00:56:33.931 [INFO][2843] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 00:56:34.002039 env[1437]: 2025-08-13 00:56:33.931 [INFO][2843] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 00:56:34.002039 env[1437]: 2025-08-13 00:56:33.931 [INFO][2843] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.4.18' Aug 13 00:56:34.002039 env[1437]: 2025-08-13 00:56:33.938 [INFO][2843] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.9dab18d40760879eb61c00fd9ca0c4822fd9321c6de93dee267dc6a9b37d9d0c" host="10.200.4.18" Aug 13 00:56:34.002039 env[1437]: 2025-08-13 00:56:33.942 [INFO][2843] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.4.18" Aug 13 00:56:34.002039 env[1437]: 2025-08-13 00:56:33.945 [INFO][2843] ipam/ipam.go 511: Trying affinity for 192.168.76.64/26 host="10.200.4.18" Aug 13 00:56:34.002039 env[1437]: 2025-08-13 00:56:33.947 [INFO][2843] ipam/ipam.go 158: Attempting to load block cidr=192.168.76.64/26 host="10.200.4.18" Aug 13 00:56:34.002039 env[1437]: 2025-08-13 00:56:33.949 [INFO][2843] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.76.64/26 host="10.200.4.18" Aug 13 00:56:34.002039 env[1437]: 2025-08-13 00:56:33.949 [INFO][2843] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.76.64/26 handle="k8s-pod-network.9dab18d40760879eb61c00fd9ca0c4822fd9321c6de93dee267dc6a9b37d9d0c" host="10.200.4.18" Aug 13 00:56:34.002039 env[1437]: 2025-08-13 00:56:33.950 [INFO][2843] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.9dab18d40760879eb61c00fd9ca0c4822fd9321c6de93dee267dc6a9b37d9d0c Aug 13 00:56:34.002039 env[1437]: 2025-08-13 00:56:33.957 [INFO][2843] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.76.64/26 handle="k8s-pod-network.9dab18d40760879eb61c00fd9ca0c4822fd9321c6de93dee267dc6a9b37d9d0c" host="10.200.4.18" Aug 13 00:56:34.002039 env[1437]: 2025-08-13 00:56:33.962 [INFO][2843] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.76.65/26] block=192.168.76.64/26 handle="k8s-pod-network.9dab18d40760879eb61c00fd9ca0c4822fd9321c6de93dee267dc6a9b37d9d0c" host="10.200.4.18" Aug 13 00:56:34.002039 env[1437]: 2025-08-13 00:56:33.962 [INFO][2843] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.76.65/26] handle="k8s-pod-network.9dab18d40760879eb61c00fd9ca0c4822fd9321c6de93dee267dc6a9b37d9d0c" host="10.200.4.18" Aug 13 00:56:34.002039 env[1437]: 2025-08-13 00:56:33.962 [INFO][2843] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 00:56:34.002039 env[1437]: 2025-08-13 00:56:33.962 [INFO][2843] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.76.65/26] IPv6=[] ContainerID="9dab18d40760879eb61c00fd9ca0c4822fd9321c6de93dee267dc6a9b37d9d0c" HandleID="k8s-pod-network.9dab18d40760879eb61c00fd9ca0c4822fd9321c6de93dee267dc6a9b37d9d0c" Workload="10.200.4.18-k8s-csi--node--driver--xvhbw-eth0" Aug 13 00:56:34.002688 env[1437]: 2025-08-13 00:56:33.964 [INFO][2823] cni-plugin/k8s.go 418: Populated endpoint ContainerID="9dab18d40760879eb61c00fd9ca0c4822fd9321c6de93dee267dc6a9b37d9d0c" Namespace="calico-system" Pod="csi-node-driver-xvhbw" WorkloadEndpoint="10.200.4.18-k8s-csi--node--driver--xvhbw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.18-k8s-csi--node--driver--xvhbw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"fc4549c2-8a59-4fe9-a647-702140e0849a", ResourceVersion:"1450", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 0, 56, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"8967bcb6f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.18", ContainerID:"", Pod:"csi-node-driver-xvhbw", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.76.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali9f7df7bb2de", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 00:56:34.002688 env[1437]: 2025-08-13 00:56:33.964 [INFO][2823] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.76.65/32] ContainerID="9dab18d40760879eb61c00fd9ca0c4822fd9321c6de93dee267dc6a9b37d9d0c" Namespace="calico-system" Pod="csi-node-driver-xvhbw" WorkloadEndpoint="10.200.4.18-k8s-csi--node--driver--xvhbw-eth0" Aug 13 00:56:34.002688 env[1437]: 2025-08-13 00:56:33.964 [INFO][2823] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali9f7df7bb2de ContainerID="9dab18d40760879eb61c00fd9ca0c4822fd9321c6de93dee267dc6a9b37d9d0c" Namespace="calico-system" Pod="csi-node-driver-xvhbw" WorkloadEndpoint="10.200.4.18-k8s-csi--node--driver--xvhbw-eth0" Aug 13 00:56:34.002688 env[1437]: 2025-08-13 00:56:33.983 [INFO][2823] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="9dab18d40760879eb61c00fd9ca0c4822fd9321c6de93dee267dc6a9b37d9d0c" Namespace="calico-system" Pod="csi-node-driver-xvhbw" WorkloadEndpoint="10.200.4.18-k8s-csi--node--driver--xvhbw-eth0" Aug 13 00:56:34.002688 env[1437]: 2025-08-13 00:56:33.984 [INFO][2823] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="9dab18d40760879eb61c00fd9ca0c4822fd9321c6de93dee267dc6a9b37d9d0c" Namespace="calico-system" Pod="csi-node-driver-xvhbw" WorkloadEndpoint="10.200.4.18-k8s-csi--node--driver--xvhbw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.18-k8s-csi--node--driver--xvhbw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"fc4549c2-8a59-4fe9-a647-702140e0849a", ResourceVersion:"1450", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 0, 56, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"8967bcb6f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.18", ContainerID:"9dab18d40760879eb61c00fd9ca0c4822fd9321c6de93dee267dc6a9b37d9d0c", Pod:"csi-node-driver-xvhbw", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.76.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali9f7df7bb2de", MAC:"ea:d9:5b:2f:ff:48", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 00:56:34.002688 env[1437]: 2025-08-13 00:56:33.997 [INFO][2823] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="9dab18d40760879eb61c00fd9ca0c4822fd9321c6de93dee267dc6a9b37d9d0c" Namespace="calico-system" Pod="csi-node-driver-xvhbw" WorkloadEndpoint="10.200.4.18-k8s-csi--node--driver--xvhbw-eth0" Aug 13 00:56:34.020072 env[1437]: time="2025-08-13T00:56:34.020007775Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Aug 13 00:56:34.021784 env[1437]: time="2025-08-13T00:56:34.021737875Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Aug 13 00:56:34.021956 env[1437]: time="2025-08-13T00:56:34.021934275Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Aug 13 00:56:34.022261 env[1437]: time="2025-08-13T00:56:34.022202075Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9dab18d40760879eb61c00fd9ca0c4822fd9321c6de93dee267dc6a9b37d9d0c pid=2872 runtime=io.containerd.runc.v2 Aug 13 00:56:34.038665 systemd[1]: Started cri-containerd-9dab18d40760879eb61c00fd9ca0c4822fd9321c6de93dee267dc6a9b37d9d0c.scope. Aug 13 00:56:34.020000 audit[2863]: NETFILTER_CFG table=filter:72 family=2 entries=38 op=nft_register_chain pid=2863 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Aug 13 00:56:34.056519 kernel: kauditd_printk_skb: 614 callbacks suppressed Aug 13 00:56:34.056621 kernel: audit: type=1325 audit(1755046594.020:660): table=filter:72 family=2 entries=38 op=nft_register_chain pid=2863 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Aug 13 00:56:34.083087 kernel: audit: type=1400 audit(1755046594.068:661): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.098287 kernel: audit: type=1400 audit(1755046594.068:662): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.113379 kernel: audit: type=1400 audit(1755046594.068:663): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.125927 kernel: audit: type=1400 audit(1755046594.068:664): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.153482 kernel: audit: type=1400 audit(1755046594.068:665): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.154045 kernel: audit: type=1400 audit(1755046594.068:666): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.154071 kernel: audit: type=1400 audit(1755046594.068:667): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.180721 kernel: audit: type=1400 audit(1755046594.068:668): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.194905 kernel: audit: type=1400 audit(1755046594.068:669): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.020000 audit[2863]: SYSCALL arch=c000003e syscall=46 success=yes exit=21364 a0=3 a1=7ffebb2910b0 a2=0 a3=7ffebb29109c items=0 ppid=2540 pid=2863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:34.020000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Aug 13 00:56:34.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.096000 audit: BPF prog-id=104 op=LOAD Aug 13 00:56:34.097000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.097000 audit[2882]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00023dc48 a2=10 a3=1c items=0 ppid=2872 pid=2882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:34.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964616231386434303736303837396562363163303066643963613063 Aug 13 00:56:34.097000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.097000 audit[2882]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00023d6b0 a2=3c a3=c items=0 ppid=2872 pid=2882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:34.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964616231386434303736303837396562363163303066643963613063 Aug 13 00:56:34.097000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.097000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.097000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.097000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.097000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.097000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.097000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.097000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.097000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.097000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.097000 audit: BPF prog-id=105 op=LOAD Aug 13 00:56:34.097000 audit[2882]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00023d9d8 a2=78 a3=c0000a4c40 items=0 ppid=2872 pid=2882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:34.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964616231386434303736303837396562363163303066643963613063 Aug 13 00:56:34.112000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.112000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.112000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.112000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.112000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.112000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.112000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.112000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.112000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.112000 audit: BPF prog-id=106 op=LOAD Aug 13 00:56:34.112000 audit[2882]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00023d770 a2=78 a3=c0000a4c88 items=0 ppid=2872 pid=2882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:34.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964616231386434303736303837396562363163303066643963613063 Aug 13 00:56:34.125000 audit: BPF prog-id=106 op=UNLOAD Aug 13 00:56:34.125000 audit: BPF prog-id=105 op=UNLOAD Aug 13 00:56:34.125000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.125000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.125000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.125000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.125000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.125000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.125000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.125000 audit[2882]: AVC avc: denied { perfmon } for pid=2882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.125000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.125000 audit[2882]: AVC avc: denied { bpf } for pid=2882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.125000 audit: BPF prog-id=107 op=LOAD Aug 13 00:56:34.125000 audit[2882]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00023dc30 a2=78 a3=c0000a5098 items=0 ppid=2872 pid=2882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:34.125000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964616231386434303736303837396562363163303066643963613063 Aug 13 00:56:34.218496 systemd-networkd[1585]: cali15f5e87af72: Link UP Aug 13 00:56:34.218913 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali15f5e87af72: link becomes ready Aug 13 00:56:34.219663 systemd-networkd[1585]: cali15f5e87af72: Gained carrier Aug 13 00:56:34.233893 env[1437]: time="2025-08-13T00:56:34.233830770Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xvhbw,Uid:fc4549c2-8a59-4fe9-a647-702140e0849a,Namespace:calico-system,Attempt:1,} returns sandbox id \"9dab18d40760879eb61c00fd9ca0c4822fd9321c6de93dee267dc6a9b37d9d0c\"" Aug 13 00:56:34.237513 env[1437]: 2025-08-13 00:56:33.883 [INFO][2812] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.4.18-k8s-nginx--deployment--7fcdb87857--7vhg4-eth0 nginx-deployment-7fcdb87857- default c6d770dc-1557-4d20-95ad-ae5ed2398dea 1449 0 2025-08-13 00:56:19 +0000 UTC map[app:nginx pod-template-hash:7fcdb87857 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.4.18 nginx-deployment-7fcdb87857-7vhg4 eth0 default [] [] [kns.default ksa.default.default] cali15f5e87af72 [] [] }} ContainerID="58433a55f483a9ecb0dbcccc4fd553ca509fe02d5e7da6215b28ef24f5425f60" Namespace="default" Pod="nginx-deployment-7fcdb87857-7vhg4" WorkloadEndpoint="10.200.4.18-k8s-nginx--deployment--7fcdb87857--7vhg4-" Aug 13 00:56:34.237513 env[1437]: 2025-08-13 00:56:33.883 [INFO][2812] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="58433a55f483a9ecb0dbcccc4fd553ca509fe02d5e7da6215b28ef24f5425f60" Namespace="default" Pod="nginx-deployment-7fcdb87857-7vhg4" WorkloadEndpoint="10.200.4.18-k8s-nginx--deployment--7fcdb87857--7vhg4-eth0" Aug 13 00:56:34.237513 env[1437]: 2025-08-13 00:56:33.932 [INFO][2838] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="58433a55f483a9ecb0dbcccc4fd553ca509fe02d5e7da6215b28ef24f5425f60" HandleID="k8s-pod-network.58433a55f483a9ecb0dbcccc4fd553ca509fe02d5e7da6215b28ef24f5425f60" Workload="10.200.4.18-k8s-nginx--deployment--7fcdb87857--7vhg4-eth0" Aug 13 00:56:34.237513 env[1437]: 2025-08-13 00:56:33.933 [INFO][2838] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="58433a55f483a9ecb0dbcccc4fd553ca509fe02d5e7da6215b28ef24f5425f60" HandleID="k8s-pod-network.58433a55f483a9ecb0dbcccc4fd553ca509fe02d5e7da6215b28ef24f5425f60" Workload="10.200.4.18-k8s-nginx--deployment--7fcdb87857--7vhg4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000251190), Attrs:map[string]string{"namespace":"default", "node":"10.200.4.18", "pod":"nginx-deployment-7fcdb87857-7vhg4", "timestamp":"2025-08-13 00:56:33.932883978 +0000 UTC"}, Hostname:"10.200.4.18", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Aug 13 00:56:34.237513 env[1437]: 2025-08-13 00:56:33.933 [INFO][2838] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 00:56:34.237513 env[1437]: 2025-08-13 00:56:33.962 [INFO][2838] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 00:56:34.237513 env[1437]: 2025-08-13 00:56:33.962 [INFO][2838] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.4.18' Aug 13 00:56:34.237513 env[1437]: 2025-08-13 00:56:34.047 [INFO][2838] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.58433a55f483a9ecb0dbcccc4fd553ca509fe02d5e7da6215b28ef24f5425f60" host="10.200.4.18" Aug 13 00:56:34.237513 env[1437]: 2025-08-13 00:56:34.052 [INFO][2838] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.4.18" Aug 13 00:56:34.237513 env[1437]: 2025-08-13 00:56:34.097 [INFO][2838] ipam/ipam.go 511: Trying affinity for 192.168.76.64/26 host="10.200.4.18" Aug 13 00:56:34.237513 env[1437]: 2025-08-13 00:56:34.112 [INFO][2838] ipam/ipam.go 158: Attempting to load block cidr=192.168.76.64/26 host="10.200.4.18" Aug 13 00:56:34.237513 env[1437]: 2025-08-13 00:56:34.126 [INFO][2838] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.76.64/26 host="10.200.4.18" Aug 13 00:56:34.237513 env[1437]: 2025-08-13 00:56:34.126 [INFO][2838] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.76.64/26 handle="k8s-pod-network.58433a55f483a9ecb0dbcccc4fd553ca509fe02d5e7da6215b28ef24f5425f60" host="10.200.4.18" Aug 13 00:56:34.237513 env[1437]: 2025-08-13 00:56:34.140 [INFO][2838] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.58433a55f483a9ecb0dbcccc4fd553ca509fe02d5e7da6215b28ef24f5425f60 Aug 13 00:56:34.237513 env[1437]: 2025-08-13 00:56:34.154 [INFO][2838] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.76.64/26 handle="k8s-pod-network.58433a55f483a9ecb0dbcccc4fd553ca509fe02d5e7da6215b28ef24f5425f60" host="10.200.4.18" Aug 13 00:56:34.237513 env[1437]: 2025-08-13 00:56:34.181 [INFO][2838] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.76.66/26] block=192.168.76.64/26 handle="k8s-pod-network.58433a55f483a9ecb0dbcccc4fd553ca509fe02d5e7da6215b28ef24f5425f60" host="10.200.4.18" Aug 13 00:56:34.237513 env[1437]: 2025-08-13 00:56:34.181 [INFO][2838] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.76.66/26] handle="k8s-pod-network.58433a55f483a9ecb0dbcccc4fd553ca509fe02d5e7da6215b28ef24f5425f60" host="10.200.4.18" Aug 13 00:56:34.237513 env[1437]: 2025-08-13 00:56:34.181 [INFO][2838] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 00:56:34.237513 env[1437]: 2025-08-13 00:56:34.181 [INFO][2838] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.76.66/26] IPv6=[] ContainerID="58433a55f483a9ecb0dbcccc4fd553ca509fe02d5e7da6215b28ef24f5425f60" HandleID="k8s-pod-network.58433a55f483a9ecb0dbcccc4fd553ca509fe02d5e7da6215b28ef24f5425f60" Workload="10.200.4.18-k8s-nginx--deployment--7fcdb87857--7vhg4-eth0" Aug 13 00:56:34.239199 env[1437]: 2025-08-13 00:56:34.195 [INFO][2812] cni-plugin/k8s.go 418: Populated endpoint ContainerID="58433a55f483a9ecb0dbcccc4fd553ca509fe02d5e7da6215b28ef24f5425f60" Namespace="default" Pod="nginx-deployment-7fcdb87857-7vhg4" WorkloadEndpoint="10.200.4.18-k8s-nginx--deployment--7fcdb87857--7vhg4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.18-k8s-nginx--deployment--7fcdb87857--7vhg4-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"c6d770dc-1557-4d20-95ad-ae5ed2398dea", ResourceVersion:"1449", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 0, 56, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.18", ContainerID:"", Pod:"nginx-deployment-7fcdb87857-7vhg4", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.76.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali15f5e87af72", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 00:56:34.239199 env[1437]: 2025-08-13 00:56:34.195 [INFO][2812] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.76.66/32] ContainerID="58433a55f483a9ecb0dbcccc4fd553ca509fe02d5e7da6215b28ef24f5425f60" Namespace="default" Pod="nginx-deployment-7fcdb87857-7vhg4" WorkloadEndpoint="10.200.4.18-k8s-nginx--deployment--7fcdb87857--7vhg4-eth0" Aug 13 00:56:34.239199 env[1437]: 2025-08-13 00:56:34.195 [INFO][2812] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali15f5e87af72 ContainerID="58433a55f483a9ecb0dbcccc4fd553ca509fe02d5e7da6215b28ef24f5425f60" Namespace="default" Pod="nginx-deployment-7fcdb87857-7vhg4" WorkloadEndpoint="10.200.4.18-k8s-nginx--deployment--7fcdb87857--7vhg4-eth0" Aug 13 00:56:34.239199 env[1437]: 2025-08-13 00:56:34.220 [INFO][2812] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="58433a55f483a9ecb0dbcccc4fd553ca509fe02d5e7da6215b28ef24f5425f60" Namespace="default" Pod="nginx-deployment-7fcdb87857-7vhg4" WorkloadEndpoint="10.200.4.18-k8s-nginx--deployment--7fcdb87857--7vhg4-eth0" Aug 13 00:56:34.239199 env[1437]: 2025-08-13 00:56:34.222 [INFO][2812] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="58433a55f483a9ecb0dbcccc4fd553ca509fe02d5e7da6215b28ef24f5425f60" Namespace="default" Pod="nginx-deployment-7fcdb87857-7vhg4" WorkloadEndpoint="10.200.4.18-k8s-nginx--deployment--7fcdb87857--7vhg4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.18-k8s-nginx--deployment--7fcdb87857--7vhg4-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"c6d770dc-1557-4d20-95ad-ae5ed2398dea", ResourceVersion:"1449", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 0, 56, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.18", ContainerID:"58433a55f483a9ecb0dbcccc4fd553ca509fe02d5e7da6215b28ef24f5425f60", Pod:"nginx-deployment-7fcdb87857-7vhg4", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.76.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali15f5e87af72", MAC:"86:fa:9c:0b:2e:c8", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 00:56:34.239199 env[1437]: 2025-08-13 00:56:34.233 [INFO][2812] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="58433a55f483a9ecb0dbcccc4fd553ca509fe02d5e7da6215b28ef24f5425f60" Namespace="default" Pod="nginx-deployment-7fcdb87857-7vhg4" WorkloadEndpoint="10.200.4.18-k8s-nginx--deployment--7fcdb87857--7vhg4-eth0" Aug 13 00:56:34.241891 env[1437]: time="2025-08-13T00:56:34.241844869Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.2\"" Aug 13 00:56:34.253000 audit[2915]: NETFILTER_CFG table=filter:73 family=2 entries=42 op=nft_register_chain pid=2915 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Aug 13 00:56:34.253000 audit[2915]: SYSCALL arch=c000003e syscall=46 success=yes exit=22512 a0=3 a1=7ffc0db906f0 a2=0 a3=7ffc0db906dc items=0 ppid=2540 pid=2915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:34.253000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Aug 13 00:56:34.263859 env[1437]: time="2025-08-13T00:56:34.263799069Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Aug 13 00:56:34.264059 env[1437]: time="2025-08-13T00:56:34.263833369Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Aug 13 00:56:34.264059 env[1437]: time="2025-08-13T00:56:34.263857969Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Aug 13 00:56:34.264187 env[1437]: time="2025-08-13T00:56:34.264154569Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/58433a55f483a9ecb0dbcccc4fd553ca509fe02d5e7da6215b28ef24f5425f60 pid=2925 runtime=io.containerd.runc.v2 Aug 13 00:56:34.277630 systemd[1]: Started cri-containerd-58433a55f483a9ecb0dbcccc4fd553ca509fe02d5e7da6215b28ef24f5425f60.scope. Aug 13 00:56:34.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.290000 audit: BPF prog-id=108 op=LOAD Aug 13 00:56:34.290000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.290000 audit[2935]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2925 pid=2935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:34.290000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538343333613535663438336139656362306462636363633466643535 Aug 13 00:56:34.290000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.290000 audit[2935]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2925 pid=2935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:34.290000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538343333613535663438336139656362306462636363633466643535 Aug 13 00:56:34.290000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.290000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.290000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.290000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.290000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.290000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.290000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.290000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.290000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.290000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.290000 audit: BPF prog-id=109 op=LOAD Aug 13 00:56:34.290000 audit[2935]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003e8270 items=0 ppid=2925 pid=2935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:34.290000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538343333613535663438336139656362306462636363633466643535 Aug 13 00:56:34.290000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.290000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.290000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.290000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.290000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.290000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.290000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.290000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.290000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.290000 audit: BPF prog-id=110 op=LOAD Aug 13 00:56:34.290000 audit[2935]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003e82b8 items=0 ppid=2925 pid=2935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:34.290000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538343333613535663438336139656362306462636363633466643535 Aug 13 00:56:34.291000 audit: BPF prog-id=110 op=UNLOAD Aug 13 00:56:34.291000 audit: BPF prog-id=109 op=UNLOAD Aug 13 00:56:34.291000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.291000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.291000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.291000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.291000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.291000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.291000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.291000 audit[2935]: AVC avc: denied { perfmon } for pid=2935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.291000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.291000 audit[2935]: AVC avc: denied { bpf } for pid=2935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:34.291000 audit: BPF prog-id=111 op=LOAD Aug 13 00:56:34.291000 audit[2935]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003e86c8 items=0 ppid=2925 pid=2935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:34.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538343333613535663438336139656362306462636363633466643535 Aug 13 00:56:34.323973 env[1437]: time="2025-08-13T00:56:34.323924067Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-7vhg4,Uid:c6d770dc-1557-4d20-95ad-ae5ed2398dea,Namespace:default,Attempt:1,} returns sandbox id \"58433a55f483a9ecb0dbcccc4fd553ca509fe02d5e7da6215b28ef24f5425f60\"" Aug 13 00:56:34.621754 kubelet[1948]: E0813 00:56:34.621692 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:35.492085 env[1437]: time="2025-08-13T00:56:35.492022784Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:35.497175 env[1437]: time="2025-08-13T00:56:35.496929042Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c7fd1cc652979d89a51bbcc125e28e90c9815c0bd8f922a5bd36eed4e1927c6d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:35.500675 env[1437]: time="2025-08-13T00:56:35.500616187Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:35.505229 env[1437]: time="2025-08-13T00:56:35.505174812Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e570128aa8067a2f06b96d3cc98afa2e0a4b9790b435ee36ca051c8e72aeb8d0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:35.505674 env[1437]: time="2025-08-13T00:56:35.505638256Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.2\" returns image reference \"sha256:c7fd1cc652979d89a51bbcc125e28e90c9815c0bd8f922a5bd36eed4e1927c6d\"" Aug 13 00:56:35.507437 env[1437]: time="2025-08-13T00:56:35.507325013Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Aug 13 00:56:35.508341 env[1437]: time="2025-08-13T00:56:35.508309805Z" level=info msg="CreateContainer within sandbox \"9dab18d40760879eb61c00fd9ca0c4822fd9321c6de93dee267dc6a9b37d9d0c\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Aug 13 00:56:35.542251 env[1437]: time="2025-08-13T00:56:35.542188768Z" level=info msg="CreateContainer within sandbox \"9dab18d40760879eb61c00fd9ca0c4822fd9321c6de93dee267dc6a9b37d9d0c\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"2b09248cbccacc8ba32bf6c2a26c891be04e2207356cbca89150edc398660ba9\"" Aug 13 00:56:35.542860 env[1437]: time="2025-08-13T00:56:35.542826328Z" level=info msg="StartContainer for \"2b09248cbccacc8ba32bf6c2a26c891be04e2207356cbca89150edc398660ba9\"" Aug 13 00:56:35.566569 systemd[1]: run-containerd-runc-k8s.io-2b09248cbccacc8ba32bf6c2a26c891be04e2207356cbca89150edc398660ba9-runc.DwSeiE.mount: Deactivated successfully. Aug 13 00:56:35.570469 systemd[1]: Started cri-containerd-2b09248cbccacc8ba32bf6c2a26c891be04e2207356cbca89150edc398660ba9.scope. Aug 13 00:56:35.586000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:35.586000 audit[2968]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f7c7c2b29b8 items=0 ppid=2872 pid=2968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:35.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262303932343863626363616363386261333262663663326132366338 Aug 13 00:56:35.586000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:35.586000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:35.586000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:35.586000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:35.586000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:35.586000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:35.586000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:35.586000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:35.586000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:35.586000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:35.586000 audit: BPF prog-id=112 op=LOAD Aug 13 00:56:35.586000 audit[2968]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00040c098 items=0 ppid=2872 pid=2968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:35.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262303932343863626363616363386261333262663663326132366338 Aug 13 00:56:35.587000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:35.587000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:35.587000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:35.587000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:35.587000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:35.587000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:35.587000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:35.587000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:35.587000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:35.587000 audit: BPF prog-id=113 op=LOAD Aug 13 00:56:35.587000 audit[2968]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00040c0e8 items=0 ppid=2872 pid=2968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:35.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262303932343863626363616363386261333262663663326132366338 Aug 13 00:56:35.587000 audit: BPF prog-id=113 op=UNLOAD Aug 13 00:56:35.587000 audit: BPF prog-id=112 op=UNLOAD Aug 13 00:56:35.587000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:35.587000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:35.587000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:35.587000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:35.587000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:35.587000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:35.587000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:35.587000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:35.587000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:35.587000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:35.587000 audit: BPF prog-id=114 op=LOAD Aug 13 00:56:35.587000 audit[2968]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00040c178 items=0 ppid=2872 pid=2968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:35.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262303932343863626363616363386261333262663663326132366338 Aug 13 00:56:35.601974 systemd-networkd[1585]: cali15f5e87af72: Gained IPv6LL Aug 13 00:56:35.609018 env[1437]: time="2025-08-13T00:56:35.608971904Z" level=info msg="StartContainer for \"2b09248cbccacc8ba32bf6c2a26c891be04e2207356cbca89150edc398660ba9\" returns successfully" Aug 13 00:56:35.622118 kubelet[1948]: E0813 00:56:35.622079 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:36.048321 systemd-networkd[1585]: cali9f7df7bb2de: Gained IPv6LL Aug 13 00:56:36.622243 kubelet[1948]: E0813 00:56:36.622190 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:37.622529 kubelet[1948]: E0813 00:56:37.622480 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:38.309978 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2763186837.mount: Deactivated successfully. Aug 13 00:56:38.623414 kubelet[1948]: E0813 00:56:38.623339 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:39.623894 kubelet[1948]: E0813 00:56:39.623811 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:39.820917 env[1437]: time="2025-08-13T00:56:39.820850446Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:39.826307 env[1437]: time="2025-08-13T00:56:39.826246396Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f36b8965af58ac17c6fcb27d986b37161ceb26b3d41d3cd53f232b0e16761305,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:39.831045 env[1437]: time="2025-08-13T00:56:39.830996993Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:39.834795 env[1437]: time="2025-08-13T00:56:39.834736905Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:a6969d434cb816d30787e9f7ab16b632e12dc05a2c8f4dae701d83ef2199c985,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:39.835365 env[1437]: time="2025-08-13T00:56:39.835327854Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:f36b8965af58ac17c6fcb27d986b37161ceb26b3d41d3cd53f232b0e16761305\"" Aug 13 00:56:39.837436 env[1437]: time="2025-08-13T00:56:39.837001994Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2\"" Aug 13 00:56:39.838355 env[1437]: time="2025-08-13T00:56:39.838325105Z" level=info msg="CreateContainer within sandbox \"58433a55f483a9ecb0dbcccc4fd553ca509fe02d5e7da6215b28ef24f5425f60\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Aug 13 00:56:39.869838 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2382783697.mount: Deactivated successfully. Aug 13 00:56:39.877445 env[1437]: time="2025-08-13T00:56:39.877336561Z" level=info msg="CreateContainer within sandbox \"58433a55f483a9ecb0dbcccc4fd553ca509fe02d5e7da6215b28ef24f5425f60\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"205fe20ba6fcd0b0b6f543b9cc77fca67f64dee79f85131bdd49f541ddd3b0e6\"" Aug 13 00:56:39.878514 env[1437]: time="2025-08-13T00:56:39.878479957Z" level=info msg="StartContainer for \"205fe20ba6fcd0b0b6f543b9cc77fca67f64dee79f85131bdd49f541ddd3b0e6\"" Aug 13 00:56:39.902950 systemd[1]: Started cri-containerd-205fe20ba6fcd0b0b6f543b9cc77fca67f64dee79f85131bdd49f541ddd3b0e6.scope. Aug 13 00:56:39.933202 kernel: kauditd_printk_skb: 153 callbacks suppressed Aug 13 00:56:39.933360 kernel: audit: type=1400 audit(1755046599.913:704): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:39.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:39.947411 kernel: audit: type=1400 audit(1755046599.913:705): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:39.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:39.961359 kernel: audit: type=1400 audit(1755046599.913:706): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:39.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:39.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:39.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:39.990089 kernel: audit: type=1400 audit(1755046599.913:707): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:39.990145 kernel: audit: type=1400 audit(1755046599.913:708): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:39.990179 kernel: audit: type=1400 audit(1755046599.913:709): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:39.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:39.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:39.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:40.035851 kernel: audit: type=1400 audit(1755046599.913:710): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:40.036031 kernel: audit: type=1400 audit(1755046599.913:711): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:40.036063 kernel: audit: type=1400 audit(1755046599.913:712): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:39.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:39.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:40.062496 kernel: audit: type=1400 audit(1755046599.932:713): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:39.932000 audit: BPF prog-id=115 op=LOAD Aug 13 00:56:39.932000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:39.932000 audit[3013]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2925 pid=3013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:39.932000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230356665323062613666636430623062366635343362396363373766 Aug 13 00:56:39.932000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:39.932000 audit[3013]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2925 pid=3013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:39.932000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230356665323062613666636430623062366635343362396363373766 Aug 13 00:56:39.932000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:39.932000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:39.932000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:39.932000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:39.932000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:39.932000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:39.932000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:39.932000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:39.932000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:39.932000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:39.932000 audit: BPF prog-id=116 op=LOAD Aug 13 00:56:39.932000 audit[3013]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00029b100 items=0 ppid=2925 pid=3013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:39.932000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230356665323062613666636430623062366635343362396363373766 Aug 13 00:56:39.946000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:39.946000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:39.946000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:39.946000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:39.946000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:39.946000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:39.946000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:39.946000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:39.946000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:39.946000 audit: BPF prog-id=117 op=LOAD Aug 13 00:56:39.946000 audit[3013]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00029b148 items=0 ppid=2925 pid=3013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:39.946000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230356665323062613666636430623062366635343362396363373766 Aug 13 00:56:39.946000 audit: BPF prog-id=117 op=UNLOAD Aug 13 00:56:39.946000 audit: BPF prog-id=116 op=UNLOAD Aug 13 00:56:39.946000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:39.946000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:39.946000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:39.946000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:39.946000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:39.946000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:39.946000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:39.946000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:39.946000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:39.946000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:39.946000 audit: BPF prog-id=118 op=LOAD Aug 13 00:56:39.946000 audit[3013]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00029b558 items=0 ppid=2925 pid=3013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:39.946000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230356665323062613666636430623062366635343362396363373766 Aug 13 00:56:40.064934 env[1437]: time="2025-08-13T00:56:40.064850868Z" level=info msg="StartContainer for \"205fe20ba6fcd0b0b6f543b9cc77fca67f64dee79f85131bdd49f541ddd3b0e6\" returns successfully" Aug 13 00:56:40.624011 kubelet[1948]: E0813 00:56:40.623962 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:40.763422 kubelet[1948]: I0813 00:56:40.763365 1948 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-7fcdb87857-7vhg4" podStartSLOduration=16.251542969 podStartE2EDuration="21.76334718s" podCreationTimestamp="2025-08-13 00:56:19 +0000 UTC" firstStartedPulling="2025-08-13 00:56:34.325001267 +0000 UTC m=+31.035031216" lastFinishedPulling="2025-08-13 00:56:39.836805378 +0000 UTC m=+36.546835427" observedRunningTime="2025-08-13 00:56:40.76321757 +0000 UTC m=+37.473247519" watchObservedRunningTime="2025-08-13 00:56:40.76334718 +0000 UTC m=+37.473377229" Aug 13 00:56:41.309888 env[1437]: time="2025-08-13T00:56:41.309825066Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:41.315667 env[1437]: time="2025-08-13T00:56:41.315618524Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9e48822a4fe26f4ed9231b361fdd1357ea3567f1fc0a8db4d616622fe570a866,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:41.319981 env[1437]: time="2025-08-13T00:56:41.319939365Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:41.323892 env[1437]: time="2025-08-13T00:56:41.323837673Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:8fec2de12dfa51bae89d941938a07af2598eb8bfcab55d0dded1d9c193d7b99f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:41.324425 env[1437]: time="2025-08-13T00:56:41.324389317Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2\" returns image reference \"sha256:9e48822a4fe26f4ed9231b361fdd1357ea3567f1fc0a8db4d616622fe570a866\"" Aug 13 00:56:41.326913 env[1437]: time="2025-08-13T00:56:41.326862712Z" level=info msg="CreateContainer within sandbox \"9dab18d40760879eb61c00fd9ca0c4822fd9321c6de93dee267dc6a9b37d9d0c\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Aug 13 00:56:41.365955 env[1437]: time="2025-08-13T00:56:41.365900895Z" level=info msg="CreateContainer within sandbox \"9dab18d40760879eb61c00fd9ca0c4822fd9321c6de93dee267dc6a9b37d9d0c\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"8c9f393e5881add6845e5ea154ba04301ee8d27506e115c013d3d83a2fa594d2\"" Aug 13 00:56:41.366734 env[1437]: time="2025-08-13T00:56:41.366698158Z" level=info msg="StartContainer for \"8c9f393e5881add6845e5ea154ba04301ee8d27506e115c013d3d83a2fa594d2\"" Aug 13 00:56:41.393015 systemd[1]: Started cri-containerd-8c9f393e5881add6845e5ea154ba04301ee8d27506e115c013d3d83a2fa594d2.scope. Aug 13 00:56:41.406000 audit[3069]: AVC avc: denied { perfmon } for pid=3069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.406000 audit[3069]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f7d9e7dd7c8 items=0 ppid=2872 pid=3069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:41.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863396633393365353838316164643638343565356561313534626130 Aug 13 00:56:41.406000 audit[3069]: AVC avc: denied { bpf } for pid=3069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.406000 audit[3069]: AVC avc: denied { bpf } for pid=3069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.406000 audit[3069]: AVC avc: denied { bpf } for pid=3069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.406000 audit[3069]: AVC avc: denied { perfmon } for pid=3069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.406000 audit[3069]: AVC avc: denied { perfmon } for pid=3069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.406000 audit[3069]: AVC avc: denied { perfmon } for pid=3069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.406000 audit[3069]: AVC avc: denied { perfmon } for pid=3069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.406000 audit[3069]: AVC avc: denied { perfmon } for pid=3069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.406000 audit[3069]: AVC avc: denied { bpf } for pid=3069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.406000 audit[3069]: AVC avc: denied { bpf } for pid=3069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.406000 audit: BPF prog-id=119 op=LOAD Aug 13 00:56:41.406000 audit[3069]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00038c858 items=0 ppid=2872 pid=3069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:41.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863396633393365353838316164643638343565356561313534626130 Aug 13 00:56:41.406000 audit[3069]: AVC avc: denied { bpf } for pid=3069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.406000 audit[3069]: AVC avc: denied { bpf } for pid=3069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.406000 audit[3069]: AVC avc: denied { perfmon } for pid=3069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.406000 audit[3069]: AVC avc: denied { perfmon } for pid=3069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.406000 audit[3069]: AVC avc: denied { perfmon } for pid=3069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.406000 audit[3069]: AVC avc: denied { perfmon } for pid=3069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.406000 audit[3069]: AVC avc: denied { perfmon } for pid=3069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.406000 audit[3069]: AVC avc: denied { bpf } for pid=3069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.406000 audit[3069]: AVC avc: denied { bpf } for pid=3069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.406000 audit: BPF prog-id=120 op=LOAD Aug 13 00:56:41.406000 audit[3069]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00038c8a8 items=0 ppid=2872 pid=3069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:41.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863396633393365353838316164643638343565356561313534626130 Aug 13 00:56:41.407000 audit: BPF prog-id=120 op=UNLOAD Aug 13 00:56:41.407000 audit: BPF prog-id=119 op=UNLOAD Aug 13 00:56:41.407000 audit[3069]: AVC avc: denied { bpf } for pid=3069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.407000 audit[3069]: AVC avc: denied { bpf } for pid=3069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.407000 audit[3069]: AVC avc: denied { bpf } for pid=3069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.407000 audit[3069]: AVC avc: denied { perfmon } for pid=3069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.407000 audit[3069]: AVC avc: denied { perfmon } for pid=3069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.407000 audit[3069]: AVC avc: denied { perfmon } for pid=3069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.407000 audit[3069]: AVC avc: denied { perfmon } for pid=3069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.407000 audit[3069]: AVC avc: denied { perfmon } for pid=3069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.407000 audit[3069]: AVC avc: denied { bpf } for pid=3069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.407000 audit[3069]: AVC avc: denied { bpf } for pid=3069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:41.407000 audit: BPF prog-id=121 op=LOAD Aug 13 00:56:41.407000 audit[3069]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00038c938 items=0 ppid=2872 pid=3069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:41.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863396633393365353838316164643638343565356561313534626130 Aug 13 00:56:41.428915 env[1437]: time="2025-08-13T00:56:41.428267121Z" level=info msg="StartContainer for \"8c9f393e5881add6845e5ea154ba04301ee8d27506e115c013d3d83a2fa594d2\" returns successfully" Aug 13 00:56:41.624805 kubelet[1948]: E0813 00:56:41.624737 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:41.713378 kubelet[1948]: I0813 00:56:41.713338 1948 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Aug 13 00:56:41.713378 kubelet[1948]: I0813 00:56:41.713378 1948 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Aug 13 00:56:41.771213 kubelet[1948]: I0813 00:56:41.771155 1948 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-xvhbw" podStartSLOduration=30.686903073 podStartE2EDuration="37.771139901s" podCreationTimestamp="2025-08-13 00:56:04 +0000 UTC" firstStartedPulling="2025-08-13 00:56:34.241168969 +0000 UTC m=+30.951198918" lastFinishedPulling="2025-08-13 00:56:41.325405697 +0000 UTC m=+38.035435746" observedRunningTime="2025-08-13 00:56:41.771091997 +0000 UTC m=+38.481122046" watchObservedRunningTime="2025-08-13 00:56:41.771139901 +0000 UTC m=+38.481169850" Aug 13 00:56:42.625816 kubelet[1948]: E0813 00:56:42.625753 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:43.626573 kubelet[1948]: E0813 00:56:43.626514 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:44.589184 kubelet[1948]: E0813 00:56:44.589119 1948 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:44.627099 kubelet[1948]: E0813 00:56:44.627023 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:45.628170 kubelet[1948]: E0813 00:56:45.628109 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:46.629055 kubelet[1948]: E0813 00:56:46.628993 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:47.629426 kubelet[1948]: E0813 00:56:47.629362 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:48.339000 audit[3106]: NETFILTER_CFG table=filter:74 family=2 entries=20 op=nft_register_rule pid=3106 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:56:48.345325 kernel: kauditd_printk_skb: 90 callbacks suppressed Aug 13 00:56:48.345415 kernel: audit: type=1325 audit(1755046608.339:728): table=filter:74 family=2 entries=20 op=nft_register_rule pid=3106 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:56:48.339000 audit[3106]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffcbe4f1d10 a2=0 a3=7ffcbe4f1cfc items=0 ppid=2166 pid=3106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:48.370601 systemd[1]: Created slice kubepods-besteffort-podf3ae34ec_8275_4649_ba03_7a5fcdc88ecc.slice. Aug 13 00:56:48.377179 kernel: audit: type=1300 audit(1755046608.339:728): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffcbe4f1d10 a2=0 a3=7ffcbe4f1cfc items=0 ppid=2166 pid=3106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:48.377270 kernel: audit: type=1327 audit(1755046608.339:728): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:56:48.339000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:56:48.355000 audit[3106]: NETFILTER_CFG table=nat:75 family=2 entries=26 op=nft_register_rule pid=3106 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:56:48.398526 kernel: audit: type=1325 audit(1755046608.355:729): table=nat:75 family=2 entries=26 op=nft_register_rule pid=3106 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:56:48.409383 kernel: audit: type=1300 audit(1755046608.355:729): arch=c000003e syscall=46 success=yes exit=8076 a0=3 a1=7ffcbe4f1d10 a2=0 a3=0 items=0 ppid=2166 pid=3106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:48.355000 audit[3106]: SYSCALL arch=c000003e syscall=46 success=yes exit=8076 a0=3 a1=7ffcbe4f1d10 a2=0 a3=0 items=0 ppid=2166 pid=3106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:48.427355 kernel: audit: type=1327 audit(1755046608.355:729): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:56:48.355000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:56:48.422000 audit[3110]: NETFILTER_CFG table=filter:76 family=2 entries=32 op=nft_register_rule pid=3110 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:56:48.439905 kernel: audit: type=1325 audit(1755046608.422:730): table=filter:76 family=2 entries=32 op=nft_register_rule pid=3110 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:56:48.439989 kernel: audit: type=1300 audit(1755046608.422:730): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffebf90e1d0 a2=0 a3=7ffebf90e1bc items=0 ppid=2166 pid=3110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:48.422000 audit[3110]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffebf90e1d0 a2=0 a3=7ffebf90e1bc items=0 ppid=2166 pid=3110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:48.422000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:56:48.470127 kernel: audit: type=1327 audit(1755046608.422:730): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:56:48.472000 audit[3110]: NETFILTER_CFG table=nat:77 family=2 entries=26 op=nft_register_rule pid=3110 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:56:48.472000 audit[3110]: SYSCALL arch=c000003e syscall=46 success=yes exit=8076 a0=3 a1=7ffebf90e1d0 a2=0 a3=0 items=0 ppid=2166 pid=3110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:48.472000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:56:48.483897 kernel: audit: type=1325 audit(1755046608.472:731): table=nat:77 family=2 entries=26 op=nft_register_rule pid=3110 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:56:48.528365 kubelet[1948]: I0813 00:56:48.528307 1948 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/f3ae34ec-8275-4649-ba03-7a5fcdc88ecc-data\") pod \"nfs-server-provisioner-0\" (UID: \"f3ae34ec-8275-4649-ba03-7a5fcdc88ecc\") " pod="default/nfs-server-provisioner-0" Aug 13 00:56:48.528365 kubelet[1948]: I0813 00:56:48.528363 1948 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8nfcx\" (UniqueName: \"kubernetes.io/projected/f3ae34ec-8275-4649-ba03-7a5fcdc88ecc-kube-api-access-8nfcx\") pod \"nfs-server-provisioner-0\" (UID: \"f3ae34ec-8275-4649-ba03-7a5fcdc88ecc\") " pod="default/nfs-server-provisioner-0" Aug 13 00:56:48.629995 kubelet[1948]: E0813 00:56:48.629952 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:48.673779 env[1437]: time="2025-08-13T00:56:48.673724657Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:f3ae34ec-8275-4649-ba03-7a5fcdc88ecc,Namespace:default,Attempt:0,}" Aug 13 00:56:48.858783 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Aug 13 00:56:48.858942 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Aug 13 00:56:48.859924 systemd-networkd[1585]: cali60e51b789ff: Link UP Aug 13 00:56:48.860142 systemd-networkd[1585]: cali60e51b789ff: Gained carrier Aug 13 00:56:48.877124 env[1437]: 2025-08-13 00:56:48.767 [INFO][3113] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.4.18-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default f3ae34ec-8275-4649-ba03-7a5fcdc88ecc 1524 0 2025-08-13 00:56:48 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.200.4.18 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="dc66b950dd5812a10f838e85d03948b8dcb3ed7ed5d28caa14f8856ed640adc5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.4.18-k8s-nfs--server--provisioner--0-" Aug 13 00:56:48.877124 env[1437]: 2025-08-13 00:56:48.767 [INFO][3113] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="dc66b950dd5812a10f838e85d03948b8dcb3ed7ed5d28caa14f8856ed640adc5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.4.18-k8s-nfs--server--provisioner--0-eth0" Aug 13 00:56:48.877124 env[1437]: 2025-08-13 00:56:48.794 [INFO][3128] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="dc66b950dd5812a10f838e85d03948b8dcb3ed7ed5d28caa14f8856ed640adc5" HandleID="k8s-pod-network.dc66b950dd5812a10f838e85d03948b8dcb3ed7ed5d28caa14f8856ed640adc5" Workload="10.200.4.18-k8s-nfs--server--provisioner--0-eth0" Aug 13 00:56:48.877124 env[1437]: 2025-08-13 00:56:48.795 [INFO][3128] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="dc66b950dd5812a10f838e85d03948b8dcb3ed7ed5d28caa14f8856ed640adc5" HandleID="k8s-pod-network.dc66b950dd5812a10f838e85d03948b8dcb3ed7ed5d28caa14f8856ed640adc5" Workload="10.200.4.18-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d5600), Attrs:map[string]string{"namespace":"default", "node":"10.200.4.18", "pod":"nfs-server-provisioner-0", "timestamp":"2025-08-13 00:56:48.79489027 +0000 UTC"}, Hostname:"10.200.4.18", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Aug 13 00:56:48.877124 env[1437]: 2025-08-13 00:56:48.795 [INFO][3128] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 00:56:48.877124 env[1437]: 2025-08-13 00:56:48.795 [INFO][3128] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 00:56:48.877124 env[1437]: 2025-08-13 00:56:48.795 [INFO][3128] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.4.18' Aug 13 00:56:48.877124 env[1437]: 2025-08-13 00:56:48.803 [INFO][3128] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.dc66b950dd5812a10f838e85d03948b8dcb3ed7ed5d28caa14f8856ed640adc5" host="10.200.4.18" Aug 13 00:56:48.877124 env[1437]: 2025-08-13 00:56:48.807 [INFO][3128] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.4.18" Aug 13 00:56:48.877124 env[1437]: 2025-08-13 00:56:48.811 [INFO][3128] ipam/ipam.go 511: Trying affinity for 192.168.76.64/26 host="10.200.4.18" Aug 13 00:56:48.877124 env[1437]: 2025-08-13 00:56:48.812 [INFO][3128] ipam/ipam.go 158: Attempting to load block cidr=192.168.76.64/26 host="10.200.4.18" Aug 13 00:56:48.877124 env[1437]: 2025-08-13 00:56:48.817 [INFO][3128] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.76.64/26 host="10.200.4.18" Aug 13 00:56:48.877124 env[1437]: 2025-08-13 00:56:48.817 [INFO][3128] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.76.64/26 handle="k8s-pod-network.dc66b950dd5812a10f838e85d03948b8dcb3ed7ed5d28caa14f8856ed640adc5" host="10.200.4.18" Aug 13 00:56:48.877124 env[1437]: 2025-08-13 00:56:48.825 [INFO][3128] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.dc66b950dd5812a10f838e85d03948b8dcb3ed7ed5d28caa14f8856ed640adc5 Aug 13 00:56:48.877124 env[1437]: 2025-08-13 00:56:48.834 [INFO][3128] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.76.64/26 handle="k8s-pod-network.dc66b950dd5812a10f838e85d03948b8dcb3ed7ed5d28caa14f8856ed640adc5" host="10.200.4.18" Aug 13 00:56:48.877124 env[1437]: 2025-08-13 00:56:48.843 [INFO][3128] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.76.67/26] block=192.168.76.64/26 handle="k8s-pod-network.dc66b950dd5812a10f838e85d03948b8dcb3ed7ed5d28caa14f8856ed640adc5" host="10.200.4.18" Aug 13 00:56:48.877124 env[1437]: 2025-08-13 00:56:48.843 [INFO][3128] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.76.67/26] handle="k8s-pod-network.dc66b950dd5812a10f838e85d03948b8dcb3ed7ed5d28caa14f8856ed640adc5" host="10.200.4.18" Aug 13 00:56:48.877124 env[1437]: 2025-08-13 00:56:48.843 [INFO][3128] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 00:56:48.877124 env[1437]: 2025-08-13 00:56:48.843 [INFO][3128] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.76.67/26] IPv6=[] ContainerID="dc66b950dd5812a10f838e85d03948b8dcb3ed7ed5d28caa14f8856ed640adc5" HandleID="k8s-pod-network.dc66b950dd5812a10f838e85d03948b8dcb3ed7ed5d28caa14f8856ed640adc5" Workload="10.200.4.18-k8s-nfs--server--provisioner--0-eth0" Aug 13 00:56:48.878101 env[1437]: 2025-08-13 00:56:48.844 [INFO][3113] cni-plugin/k8s.go 418: Populated endpoint ContainerID="dc66b950dd5812a10f838e85d03948b8dcb3ed7ed5d28caa14f8856ed640adc5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.4.18-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.18-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"f3ae34ec-8275-4649-ba03-7a5fcdc88ecc", ResourceVersion:"1524", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 0, 56, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.18", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.76.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 00:56:48.878101 env[1437]: 2025-08-13 00:56:48.844 [INFO][3113] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.76.67/32] ContainerID="dc66b950dd5812a10f838e85d03948b8dcb3ed7ed5d28caa14f8856ed640adc5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.4.18-k8s-nfs--server--provisioner--0-eth0" Aug 13 00:56:48.878101 env[1437]: 2025-08-13 00:56:48.844 [INFO][3113] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="dc66b950dd5812a10f838e85d03948b8dcb3ed7ed5d28caa14f8856ed640adc5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.4.18-k8s-nfs--server--provisioner--0-eth0" Aug 13 00:56:48.878101 env[1437]: 2025-08-13 00:56:48.859 [INFO][3113] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="dc66b950dd5812a10f838e85d03948b8dcb3ed7ed5d28caa14f8856ed640adc5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.4.18-k8s-nfs--server--provisioner--0-eth0" Aug 13 00:56:48.878343 env[1437]: 2025-08-13 00:56:48.861 [INFO][3113] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="dc66b950dd5812a10f838e85d03948b8dcb3ed7ed5d28caa14f8856ed640adc5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.4.18-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.18-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"f3ae34ec-8275-4649-ba03-7a5fcdc88ecc", ResourceVersion:"1524", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 0, 56, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.18", ContainerID:"dc66b950dd5812a10f838e85d03948b8dcb3ed7ed5d28caa14f8856ed640adc5", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.76.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"0e:4b:e9:0f:df:d6", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 00:56:48.878343 env[1437]: 2025-08-13 00:56:48.875 [INFO][3113] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="dc66b950dd5812a10f838e85d03948b8dcb3ed7ed5d28caa14f8856ed640adc5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.4.18-k8s-nfs--server--provisioner--0-eth0" Aug 13 00:56:48.891000 audit[3149]: NETFILTER_CFG table=filter:78 family=2 entries=40 op=nft_register_chain pid=3149 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Aug 13 00:56:48.891000 audit[3149]: SYSCALL arch=c000003e syscall=46 success=yes exit=20756 a0=3 a1=7ffc979070c0 a2=0 a3=7ffc979070ac items=0 ppid=2540 pid=3149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:48.891000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Aug 13 00:56:48.898139 env[1437]: time="2025-08-13T00:56:48.897941400Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Aug 13 00:56:48.898139 env[1437]: time="2025-08-13T00:56:48.897983503Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Aug 13 00:56:48.898139 env[1437]: time="2025-08-13T00:56:48.897998104Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Aug 13 00:56:48.898392 env[1437]: time="2025-08-13T00:56:48.898322125Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dc66b950dd5812a10f838e85d03948b8dcb3ed7ed5d28caa14f8856ed640adc5 pid=3156 runtime=io.containerd.runc.v2 Aug 13 00:56:48.924116 systemd[1]: Started cri-containerd-dc66b950dd5812a10f838e85d03948b8dcb3ed7ed5d28caa14f8856ed640adc5.scope. Aug 13 00:56:48.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.936000 audit: BPF prog-id=122 op=LOAD Aug 13 00:56:48.937000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.937000 audit[3168]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3156 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:48.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463363662393530646435383132613130663833386538356430333934 Aug 13 00:56:48.937000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.937000 audit[3168]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3156 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:48.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463363662393530646435383132613130663833386538356430333934 Aug 13 00:56:48.937000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.937000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.937000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.937000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.937000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.937000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.937000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.937000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.937000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.937000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.937000 audit: BPF prog-id=123 op=LOAD Aug 13 00:56:48.937000 audit[3168]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000254d60 items=0 ppid=3156 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:48.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463363662393530646435383132613130663833386538356430333934 Aug 13 00:56:48.937000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.937000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.937000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.937000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.937000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.937000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.937000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.937000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.937000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.937000 audit: BPF prog-id=124 op=LOAD Aug 13 00:56:48.937000 audit[3168]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000254da8 items=0 ppid=3156 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:48.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463363662393530646435383132613130663833386538356430333934 Aug 13 00:56:48.937000 audit: BPF prog-id=124 op=UNLOAD Aug 13 00:56:48.937000 audit: BPF prog-id=123 op=UNLOAD Aug 13 00:56:48.938000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.938000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.938000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.938000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.938000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.938000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.938000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.938000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.938000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.938000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:48.938000 audit: BPF prog-id=125 op=LOAD Aug 13 00:56:48.938000 audit[3168]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0002551b8 items=0 ppid=3156 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:48.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463363662393530646435383132613130663833386538356430333934 Aug 13 00:56:48.966444 env[1437]: time="2025-08-13T00:56:48.966394571Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:f3ae34ec-8275-4649-ba03-7a5fcdc88ecc,Namespace:default,Attempt:0,} returns sandbox id \"dc66b950dd5812a10f838e85d03948b8dcb3ed7ed5d28caa14f8856ed640adc5\"" Aug 13 00:56:48.968386 env[1437]: time="2025-08-13T00:56:48.968280394Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Aug 13 00:56:49.630299 kubelet[1948]: E0813 00:56:49.630254 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:49.641834 systemd[1]: run-containerd-runc-k8s.io-dc66b950dd5812a10f838e85d03948b8dcb3ed7ed5d28caa14f8856ed640adc5-runc.FvUbzZ.mount: Deactivated successfully. Aug 13 00:56:50.448168 systemd-networkd[1585]: cali60e51b789ff: Gained IPv6LL Aug 13 00:56:50.630716 kubelet[1948]: E0813 00:56:50.630649 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:51.631689 kubelet[1948]: E0813 00:56:51.631620 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:52.016883 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3157288067.mount: Deactivated successfully. Aug 13 00:56:52.632572 kubelet[1948]: E0813 00:56:52.632496 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:53.633058 kubelet[1948]: E0813 00:56:53.633009 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:54.633662 kubelet[1948]: E0813 00:56:54.633599 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:55.634071 kubelet[1948]: E0813 00:56:55.634004 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:56.634807 kubelet[1948]: E0813 00:56:56.634747 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:57.635272 kubelet[1948]: E0813 00:56:57.635213 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:58.115687 env[1437]: time="2025-08-13T00:56:58.115630250Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:58.121139 env[1437]: time="2025-08-13T00:56:58.121091925Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:58.124701 env[1437]: time="2025-08-13T00:56:58.124656304Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:58.128749 env[1437]: time="2025-08-13T00:56:58.128705608Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:56:58.129486 env[1437]: time="2025-08-13T00:56:58.129451446Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Aug 13 00:56:58.132141 env[1437]: time="2025-08-13T00:56:58.132109780Z" level=info msg="CreateContainer within sandbox \"dc66b950dd5812a10f838e85d03948b8dcb3ed7ed5d28caa14f8856ed640adc5\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Aug 13 00:56:58.157370 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3873112505.mount: Deactivated successfully. Aug 13 00:56:58.174649 env[1437]: time="2025-08-13T00:56:58.174600320Z" level=info msg="CreateContainer within sandbox \"dc66b950dd5812a10f838e85d03948b8dcb3ed7ed5d28caa14f8856ed640adc5\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"3458b253c341740b95a7bab48842b14e31a3c5408c80e5606fdfa3135699c339\"" Aug 13 00:56:58.175313 env[1437]: time="2025-08-13T00:56:58.175213851Z" level=info msg="StartContainer for \"3458b253c341740b95a7bab48842b14e31a3c5408c80e5606fdfa3135699c339\"" Aug 13 00:56:58.201411 systemd[1]: Started cri-containerd-3458b253c341740b95a7bab48842b14e31a3c5408c80e5606fdfa3135699c339.scope. Aug 13 00:56:58.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.217787 kernel: kauditd_printk_skb: 62 callbacks suppressed Aug 13 00:56:58.217931 kernel: audit: type=1400 audit(1755046618.211:751): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.246042 kernel: audit: type=1400 audit(1755046618.211:752): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.246155 kernel: audit: type=1400 audit(1755046618.211:753): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.274933 kernel: audit: type=1400 audit(1755046618.211:754): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.289142 kernel: audit: type=1400 audit(1755046618.211:755): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.289247 kernel: audit: type=1400 audit(1755046618.211:756): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.316868 kernel: audit: type=1400 audit(1755046618.211:757): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.331994 kernel: audit: type=1400 audit(1755046618.211:758): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.332119 kernel: audit: type=1400 audit(1755046618.211:759): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.361406 kernel: audit: type=1400 audit(1755046618.211:760): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.211000 audit: BPF prog-id=126 op=LOAD Aug 13 00:56:58.212000 audit[3201]: AVC avc: denied { bpf } for pid=3201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.212000 audit[3201]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3156 pid=3201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:58.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334353862323533633334313734306239356137626162343838343262 Aug 13 00:56:58.212000 audit[3201]: AVC avc: denied { perfmon } for pid=3201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.212000 audit[3201]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3156 pid=3201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:58.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334353862323533633334313734306239356137626162343838343262 Aug 13 00:56:58.212000 audit[3201]: AVC avc: denied { bpf } for pid=3201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.212000 audit[3201]: AVC avc: denied { bpf } for pid=3201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.212000 audit[3201]: AVC avc: denied { bpf } for pid=3201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.212000 audit[3201]: AVC avc: denied { perfmon } for pid=3201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.212000 audit[3201]: AVC avc: denied { perfmon } for pid=3201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.212000 audit[3201]: AVC avc: denied { perfmon } for pid=3201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.212000 audit[3201]: AVC avc: denied { perfmon } for pid=3201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.212000 audit[3201]: AVC avc: denied { perfmon } for pid=3201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.212000 audit[3201]: AVC avc: denied { bpf } for pid=3201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.212000 audit[3201]: AVC avc: denied { bpf } for pid=3201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.212000 audit: BPF prog-id=127 op=LOAD Aug 13 00:56:58.212000 audit[3201]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003805c0 items=0 ppid=3156 pid=3201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:58.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334353862323533633334313734306239356137626162343838343262 Aug 13 00:56:58.231000 audit[3201]: AVC avc: denied { bpf } for pid=3201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.231000 audit[3201]: AVC avc: denied { bpf } for pid=3201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.231000 audit[3201]: AVC avc: denied { perfmon } for pid=3201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.231000 audit[3201]: AVC avc: denied { perfmon } for pid=3201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.231000 audit[3201]: AVC avc: denied { perfmon } for pid=3201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.231000 audit[3201]: AVC avc: denied { perfmon } for pid=3201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.231000 audit[3201]: AVC avc: denied { perfmon } for pid=3201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.231000 audit[3201]: AVC avc: denied { bpf } for pid=3201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.231000 audit[3201]: AVC avc: denied { bpf } for pid=3201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.231000 audit: BPF prog-id=128 op=LOAD Aug 13 00:56:58.231000 audit[3201]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000380608 items=0 ppid=3156 pid=3201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:58.231000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334353862323533633334313734306239356137626162343838343262 Aug 13 00:56:58.259000 audit: BPF prog-id=128 op=UNLOAD Aug 13 00:56:58.260000 audit: BPF prog-id=127 op=UNLOAD Aug 13 00:56:58.260000 audit[3201]: AVC avc: denied { bpf } for pid=3201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.260000 audit[3201]: AVC avc: denied { bpf } for pid=3201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.260000 audit[3201]: AVC avc: denied { bpf } for pid=3201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.260000 audit[3201]: AVC avc: denied { perfmon } for pid=3201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.260000 audit[3201]: AVC avc: denied { perfmon } for pid=3201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.260000 audit[3201]: AVC avc: denied { perfmon } for pid=3201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.260000 audit[3201]: AVC avc: denied { perfmon } for pid=3201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.260000 audit[3201]: AVC avc: denied { perfmon } for pid=3201 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.260000 audit[3201]: AVC avc: denied { bpf } for pid=3201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.260000 audit[3201]: AVC avc: denied { bpf } for pid=3201 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:56:58.260000 audit: BPF prog-id=129 op=LOAD Aug 13 00:56:58.260000 audit[3201]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000380a18 items=0 ppid=3156 pid=3201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:58.260000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334353862323533633334313734306239356137626162343838343262 Aug 13 00:56:58.364593 env[1437]: time="2025-08-13T00:56:58.364546487Z" level=info msg="StartContainer for \"3458b253c341740b95a7bab48842b14e31a3c5408c80e5606fdfa3135699c339\" returns successfully" Aug 13 00:56:58.385000 audit[3229]: AVC avc: denied { search } for pid=3229 comm="rpcbind" name="crypto" dev="proc" ino=26642 scontext=system_u:system_r:svirt_lxc_net_t:s0:c233,c699 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Aug 13 00:56:58.385000 audit[3229]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7efe7fb0d0c0 a2=0 a3=0 items=0 ppid=3213 pid=3229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c233,c699 key=(null) Aug 13 00:56:58.385000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Aug 13 00:56:58.423000 audit[3234]: AVC avc: denied { search } for pid=3234 comm="dbus-daemon" name="crypto" dev="proc" ino=26642 scontext=system_u:system_r:svirt_lxc_net_t:s0:c233,c699 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Aug 13 00:56:58.423000 audit[3234]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7febc9dc10c0 a2=0 a3=0 items=0 ppid=3213 pid=3234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c233,c699 key=(null) Aug 13 00:56:58.423000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Aug 13 00:56:58.427000 audit[3235]: AVC avc: denied { watch } for pid=3235 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538113 scontext=system_u:system_r:svirt_lxc_net_t:s0:c233,c699 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c233,c699 tclass=dir permissive=0 Aug 13 00:56:58.427000 audit[3235]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55c59c415c10 a2=2c8 a3=7ffe29b4e32c items=0 ppid=3213 pid=3235 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c233,c699 key=(null) Aug 13 00:56:58.427000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Aug 13 00:56:58.432000 audit[3236]: AVC avc: denied { read } for pid=3236 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=26732 scontext=system_u:system_r:svirt_lxc_net_t:s0:c233,c699 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Aug 13 00:56:58.432000 audit[3236]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f310d18e320 a1=80000 a2=d a3=7ffe70a960e0 items=0 ppid=3213 pid=3236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c233,c699 key=(null) Aug 13 00:56:58.432000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Aug 13 00:56:58.434000 audit[3236]: AVC avc: denied { search } for pid=3236 comm="ganesha.nfsd" name="crypto" dev="proc" ino=26642 scontext=system_u:system_r:svirt_lxc_net_t:s0:c233,c699 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Aug 13 00:56:58.434000 audit[3236]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f310c6e20c0 a2=0 a3=0 items=0 ppid=3213 pid=3236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c233,c699 key=(null) Aug 13 00:56:58.434000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Aug 13 00:56:58.635816 kubelet[1948]: E0813 00:56:58.635763 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:56:58.851000 audit[3241]: NETFILTER_CFG table=filter:79 family=2 entries=20 op=nft_register_rule pid=3241 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:56:58.851000 audit[3241]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffce0b8f030 a2=0 a3=7ffce0b8f01c items=0 ppid=2166 pid=3241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:58.851000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:56:58.856000 audit[3241]: NETFILTER_CFG table=nat:80 family=2 entries=110 op=nft_register_chain pid=3241 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Aug 13 00:56:58.856000 audit[3241]: SYSCALL arch=c000003e syscall=46 success=yes exit=50988 a0=3 a1=7ffce0b8f030 a2=0 a3=7ffce0b8f01c items=0 ppid=2166 pid=3241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:56:58.856000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Aug 13 00:56:59.636431 kubelet[1948]: E0813 00:56:59.636371 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:00.636943 kubelet[1948]: E0813 00:57:00.636884 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:01.132493 kubelet[1948]: I0813 00:57:01.132373 1948 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=3.969657975 podStartE2EDuration="13.132350909s" podCreationTimestamp="2025-08-13 00:56:48 +0000 UTC" firstStartedPulling="2025-08-13 00:56:48.96792017 +0000 UTC m=+45.677950119" lastFinishedPulling="2025-08-13 00:56:58.130613004 +0000 UTC m=+54.840643053" observedRunningTime="2025-08-13 00:56:58.832814472 +0000 UTC m=+55.542844421" watchObservedRunningTime="2025-08-13 00:57:01.132350909 +0000 UTC m=+57.842380958" Aug 13 00:57:01.637811 kubelet[1948]: E0813 00:57:01.637750 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:02.638925 kubelet[1948]: E0813 00:57:02.638858 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:03.639782 kubelet[1948]: E0813 00:57:03.639709 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:04.589843 kubelet[1948]: E0813 00:57:04.589789 1948 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:04.631728 env[1437]: time="2025-08-13T00:57:04.631685300Z" level=info msg="StopPodSandbox for \"b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0\"" Aug 13 00:57:04.640497 kubelet[1948]: E0813 00:57:04.640435 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:04.720367 env[1437]: 2025-08-13 00:57:04.674 [WARNING][3275] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.18-k8s-csi--node--driver--xvhbw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"fc4549c2-8a59-4fe9-a647-702140e0849a", ResourceVersion:"1492", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 0, 56, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"8967bcb6f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.18", ContainerID:"9dab18d40760879eb61c00fd9ca0c4822fd9321c6de93dee267dc6a9b37d9d0c", Pod:"csi-node-driver-xvhbw", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.76.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali9f7df7bb2de", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 00:57:04.720367 env[1437]: 2025-08-13 00:57:04.675 [INFO][3275] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0" Aug 13 00:57:04.720367 env[1437]: 2025-08-13 00:57:04.675 [INFO][3275] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0" iface="eth0" netns="" Aug 13 00:57:04.720367 env[1437]: 2025-08-13 00:57:04.675 [INFO][3275] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0" Aug 13 00:57:04.720367 env[1437]: 2025-08-13 00:57:04.675 [INFO][3275] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0" Aug 13 00:57:04.720367 env[1437]: 2025-08-13 00:57:04.700 [INFO][3284] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0" HandleID="k8s-pod-network.b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0" Workload="10.200.4.18-k8s-csi--node--driver--xvhbw-eth0" Aug 13 00:57:04.720367 env[1437]: 2025-08-13 00:57:04.700 [INFO][3284] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 00:57:04.720367 env[1437]: 2025-08-13 00:57:04.701 [INFO][3284] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 00:57:04.720367 env[1437]: 2025-08-13 00:57:04.716 [WARNING][3284] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0" HandleID="k8s-pod-network.b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0" Workload="10.200.4.18-k8s-csi--node--driver--xvhbw-eth0" Aug 13 00:57:04.720367 env[1437]: 2025-08-13 00:57:04.716 [INFO][3284] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0" HandleID="k8s-pod-network.b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0" Workload="10.200.4.18-k8s-csi--node--driver--xvhbw-eth0" Aug 13 00:57:04.720367 env[1437]: 2025-08-13 00:57:04.718 [INFO][3284] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 00:57:04.720367 env[1437]: 2025-08-13 00:57:04.719 [INFO][3275] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0" Aug 13 00:57:04.721072 env[1437]: time="2025-08-13T00:57:04.720467555Z" level=info msg="TearDown network for sandbox \"b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0\" successfully" Aug 13 00:57:04.721072 env[1437]: time="2025-08-13T00:57:04.720513457Z" level=info msg="StopPodSandbox for \"b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0\" returns successfully" Aug 13 00:57:04.721351 env[1437]: time="2025-08-13T00:57:04.721320692Z" level=info msg="RemovePodSandbox for \"b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0\"" Aug 13 00:57:04.721449 env[1437]: time="2025-08-13T00:57:04.721356794Z" level=info msg="Forcibly stopping sandbox \"b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0\"" Aug 13 00:57:04.805203 env[1437]: 2025-08-13 00:57:04.763 [WARNING][3299] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.18-k8s-csi--node--driver--xvhbw-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"fc4549c2-8a59-4fe9-a647-702140e0849a", ResourceVersion:"1492", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 0, 56, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"8967bcb6f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.18", ContainerID:"9dab18d40760879eb61c00fd9ca0c4822fd9321c6de93dee267dc6a9b37d9d0c", Pod:"csi-node-driver-xvhbw", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.76.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali9f7df7bb2de", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 00:57:04.805203 env[1437]: 2025-08-13 00:57:04.763 [INFO][3299] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0" Aug 13 00:57:04.805203 env[1437]: 2025-08-13 00:57:04.763 [INFO][3299] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0" iface="eth0" netns="" Aug 13 00:57:04.805203 env[1437]: 2025-08-13 00:57:04.763 [INFO][3299] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0" Aug 13 00:57:04.805203 env[1437]: 2025-08-13 00:57:04.763 [INFO][3299] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0" Aug 13 00:57:04.805203 env[1437]: 2025-08-13 00:57:04.786 [INFO][3307] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0" HandleID="k8s-pod-network.b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0" Workload="10.200.4.18-k8s-csi--node--driver--xvhbw-eth0" Aug 13 00:57:04.805203 env[1437]: 2025-08-13 00:57:04.786 [INFO][3307] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 00:57:04.805203 env[1437]: 2025-08-13 00:57:04.786 [INFO][3307] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 00:57:04.805203 env[1437]: 2025-08-13 00:57:04.801 [WARNING][3307] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0" HandleID="k8s-pod-network.b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0" Workload="10.200.4.18-k8s-csi--node--driver--xvhbw-eth0" Aug 13 00:57:04.805203 env[1437]: 2025-08-13 00:57:04.801 [INFO][3307] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0" HandleID="k8s-pod-network.b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0" Workload="10.200.4.18-k8s-csi--node--driver--xvhbw-eth0" Aug 13 00:57:04.805203 env[1437]: 2025-08-13 00:57:04.802 [INFO][3307] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 00:57:04.805203 env[1437]: 2025-08-13 00:57:04.804 [INFO][3299] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0" Aug 13 00:57:04.805203 env[1437]: time="2025-08-13T00:57:04.805182035Z" level=info msg="TearDown network for sandbox \"b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0\" successfully" Aug 13 00:57:04.812656 env[1437]: time="2025-08-13T00:57:04.812614457Z" level=info msg="RemovePodSandbox \"b10f6e4f1c49fcb2c2b8a1b184be1b4bb37c224115664d5584b9683769d57ed0\" returns successfully" Aug 13 00:57:04.813222 env[1437]: time="2025-08-13T00:57:04.813190282Z" level=info msg="StopPodSandbox for \"b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b\"" Aug 13 00:57:04.889848 env[1437]: 2025-08-13 00:57:04.849 [WARNING][3322] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.18-k8s-nginx--deployment--7fcdb87857--7vhg4-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"c6d770dc-1557-4d20-95ad-ae5ed2398dea", ResourceVersion:"1480", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 0, 56, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.18", ContainerID:"58433a55f483a9ecb0dbcccc4fd553ca509fe02d5e7da6215b28ef24f5425f60", Pod:"nginx-deployment-7fcdb87857-7vhg4", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.76.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali15f5e87af72", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 00:57:04.889848 env[1437]: 2025-08-13 00:57:04.849 [INFO][3322] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b" Aug 13 00:57:04.889848 env[1437]: 2025-08-13 00:57:04.849 [INFO][3322] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b" iface="eth0" netns="" Aug 13 00:57:04.889848 env[1437]: 2025-08-13 00:57:04.849 [INFO][3322] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b" Aug 13 00:57:04.889848 env[1437]: 2025-08-13 00:57:04.849 [INFO][3322] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b" Aug 13 00:57:04.889848 env[1437]: 2025-08-13 00:57:04.879 [INFO][3329] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b" HandleID="k8s-pod-network.b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b" Workload="10.200.4.18-k8s-nginx--deployment--7fcdb87857--7vhg4-eth0" Aug 13 00:57:04.889848 env[1437]: 2025-08-13 00:57:04.879 [INFO][3329] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 00:57:04.889848 env[1437]: 2025-08-13 00:57:04.879 [INFO][3329] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 00:57:04.889848 env[1437]: 2025-08-13 00:57:04.886 [WARNING][3329] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b" HandleID="k8s-pod-network.b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b" Workload="10.200.4.18-k8s-nginx--deployment--7fcdb87857--7vhg4-eth0" Aug 13 00:57:04.889848 env[1437]: 2025-08-13 00:57:04.886 [INFO][3329] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b" HandleID="k8s-pod-network.b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b" Workload="10.200.4.18-k8s-nginx--deployment--7fcdb87857--7vhg4-eth0" Aug 13 00:57:04.889848 env[1437]: 2025-08-13 00:57:04.887 [INFO][3329] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 00:57:04.889848 env[1437]: 2025-08-13 00:57:04.888 [INFO][3322] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b" Aug 13 00:57:04.890624 env[1437]: time="2025-08-13T00:57:04.889981017Z" level=info msg="TearDown network for sandbox \"b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b\" successfully" Aug 13 00:57:04.890624 env[1437]: time="2025-08-13T00:57:04.890022319Z" level=info msg="StopPodSandbox for \"b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b\" returns successfully" Aug 13 00:57:04.890721 env[1437]: time="2025-08-13T00:57:04.890673247Z" level=info msg="RemovePodSandbox for \"b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b\"" Aug 13 00:57:04.890798 env[1437]: time="2025-08-13T00:57:04.890712949Z" level=info msg="Forcibly stopping sandbox \"b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b\"" Aug 13 00:57:04.959033 env[1437]: 2025-08-13 00:57:04.927 [WARNING][3343] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.18-k8s-nginx--deployment--7fcdb87857--7vhg4-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"c6d770dc-1557-4d20-95ad-ae5ed2398dea", ResourceVersion:"1480", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 0, 56, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.18", ContainerID:"58433a55f483a9ecb0dbcccc4fd553ca509fe02d5e7da6215b28ef24f5425f60", Pod:"nginx-deployment-7fcdb87857-7vhg4", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.76.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali15f5e87af72", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 00:57:04.959033 env[1437]: 2025-08-13 00:57:04.927 [INFO][3343] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b" Aug 13 00:57:04.959033 env[1437]: 2025-08-13 00:57:04.928 [INFO][3343] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b" iface="eth0" netns="" Aug 13 00:57:04.959033 env[1437]: 2025-08-13 00:57:04.928 [INFO][3343] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b" Aug 13 00:57:04.959033 env[1437]: 2025-08-13 00:57:04.928 [INFO][3343] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b" Aug 13 00:57:04.959033 env[1437]: 2025-08-13 00:57:04.948 [INFO][3350] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b" HandleID="k8s-pod-network.b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b" Workload="10.200.4.18-k8s-nginx--deployment--7fcdb87857--7vhg4-eth0" Aug 13 00:57:04.959033 env[1437]: 2025-08-13 00:57:04.948 [INFO][3350] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 00:57:04.959033 env[1437]: 2025-08-13 00:57:04.948 [INFO][3350] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 00:57:04.959033 env[1437]: 2025-08-13 00:57:04.955 [WARNING][3350] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b" HandleID="k8s-pod-network.b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b" Workload="10.200.4.18-k8s-nginx--deployment--7fcdb87857--7vhg4-eth0" Aug 13 00:57:04.959033 env[1437]: 2025-08-13 00:57:04.955 [INFO][3350] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b" HandleID="k8s-pod-network.b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b" Workload="10.200.4.18-k8s-nginx--deployment--7fcdb87857--7vhg4-eth0" Aug 13 00:57:04.959033 env[1437]: 2025-08-13 00:57:04.956 [INFO][3350] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 00:57:04.959033 env[1437]: 2025-08-13 00:57:04.957 [INFO][3343] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b" Aug 13 00:57:04.959723 env[1437]: time="2025-08-13T00:57:04.959092119Z" level=info msg="TearDown network for sandbox \"b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b\" successfully" Aug 13 00:57:04.965476 env[1437]: time="2025-08-13T00:57:04.965433794Z" level=info msg="RemovePodSandbox \"b3fa12b76ffed127f5943b2a98d3708293c11ec55e7c40519031955ab05f263b\" returns successfully" Aug 13 00:57:05.641475 kubelet[1948]: E0813 00:57:05.641413 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:06.642205 kubelet[1948]: E0813 00:57:06.642154 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:07.642477 kubelet[1948]: E0813 00:57:07.642414 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:08.643305 kubelet[1948]: E0813 00:57:08.643242 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:09.644034 kubelet[1948]: E0813 00:57:09.643967 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:10.645123 kubelet[1948]: E0813 00:57:10.645055 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:11.645729 kubelet[1948]: E0813 00:57:11.645669 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:12.646360 kubelet[1948]: E0813 00:57:12.646301 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:13.647169 kubelet[1948]: E0813 00:57:13.647107 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:14.647849 kubelet[1948]: E0813 00:57:14.647791 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:15.648992 kubelet[1948]: E0813 00:57:15.648929 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:16.649124 kubelet[1948]: E0813 00:57:16.649057 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:17.649553 kubelet[1948]: E0813 00:57:17.649488 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:18.650658 kubelet[1948]: E0813 00:57:18.650601 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:19.651629 kubelet[1948]: E0813 00:57:19.651562 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:20.652762 kubelet[1948]: E0813 00:57:20.652695 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:21.653313 kubelet[1948]: E0813 00:57:21.653250 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:22.654215 kubelet[1948]: E0813 00:57:22.654153 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:23.498901 systemd[1]: Created slice kubepods-besteffort-pode8eb7477_e249_488c_88f8_4eeb98b6e475.slice. Aug 13 00:57:23.627680 kubelet[1948]: I0813 00:57:23.627609 1948 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-d781e624-b0ea-4ef2-8e72-3e6e201e5b04\" (UniqueName: \"kubernetes.io/nfs/e8eb7477-e249-488c-88f8-4eeb98b6e475-pvc-d781e624-b0ea-4ef2-8e72-3e6e201e5b04\") pod \"test-pod-1\" (UID: \"e8eb7477-e249-488c-88f8-4eeb98b6e475\") " pod="default/test-pod-1" Aug 13 00:57:23.627955 kubelet[1948]: I0813 00:57:23.627693 1948 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tx9xw\" (UniqueName: \"kubernetes.io/projected/e8eb7477-e249-488c-88f8-4eeb98b6e475-kube-api-access-tx9xw\") pod \"test-pod-1\" (UID: \"e8eb7477-e249-488c-88f8-4eeb98b6e475\") " pod="default/test-pod-1" Aug 13 00:57:23.655372 kubelet[1948]: E0813 00:57:23.655312 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:23.873148 kernel: Failed to create system directory netfs Aug 13 00:57:23.873299 kernel: kauditd_printk_skb: 68 callbacks suppressed Aug 13 00:57:23.873328 kernel: audit: type=1400 audit(1755046643.862:776): avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:23.873351 kernel: Failed to create system directory netfs Aug 13 00:57:23.862000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:23.893561 kernel: audit: type=1400 audit(1755046643.862:776): avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:23.893712 kernel: Failed to create system directory netfs Aug 13 00:57:23.862000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:23.914482 kernel: audit: type=1400 audit(1755046643.862:776): avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:23.914616 kernel: Failed to create system directory netfs Aug 13 00:57:23.862000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:23.951328 kernel: audit: type=1400 audit(1755046643.862:776): avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:23.862000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:23.862000 audit[3385]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55869e2315e0 a1=153bc a2=55868668c2b0 a3=5 items=0 ppid=50 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:57:23.862000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Aug 13 00:57:23.977563 kernel: audit: type=1300 audit(1755046643.862:776): arch=c000003e syscall=175 success=yes exit=0 a0=55869e2315e0 a1=153bc a2=55868668c2b0 a3=5 items=0 ppid=50 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:57:23.978150 kernel: audit: type=1327 audit(1755046643.862:776): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Aug 13 00:57:23.980000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:23.990046 kernel: Failed to create system directory fscache Aug 13 00:57:23.990114 kernel: audit: type=1400 audit(1755046643.980:777): avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.009393 kernel: Failed to create system directory fscache Aug 13 00:57:24.009511 kernel: audit: type=1400 audit(1755046643.980:777): avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:23.980000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.030613 kernel: Failed to create system directory fscache Aug 13 00:57:24.030737 kernel: audit: type=1400 audit(1755046643.980:777): avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:23.980000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.050885 kernel: Failed to create system directory fscache Aug 13 00:57:24.051002 kernel: audit: type=1400 audit(1755046643.980:777): avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:23.980000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.068435 kernel: Failed to create system directory fscache Aug 13 00:57:23.980000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:23.980000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.074912 kernel: Failed to create system directory fscache Aug 13 00:57:23.980000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.079511 kernel: Failed to create system directory fscache Aug 13 00:57:24.080396 kernel: Failed to create system directory fscache Aug 13 00:57:23.980000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:23.980000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.087477 kernel: Failed to create system directory fscache Aug 13 00:57:24.087564 kernel: Failed to create system directory fscache Aug 13 00:57:23.980000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:23.980000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.094612 kernel: Failed to create system directory fscache Aug 13 00:57:24.094705 kernel: Failed to create system directory fscache Aug 13 00:57:23.980000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:23.980000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.101516 kernel: Failed to create system directory fscache Aug 13 00:57:24.101800 kernel: Failed to create system directory fscache Aug 13 00:57:23.980000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.106511 kernel: FS-Cache: Loaded Aug 13 00:57:23.980000 audit[3385]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55869e4469c0 a1=4c0fc a2=55868668c2b0 a3=5 items=0 ppid=50 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:57:23.980000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.200455 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.200532 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.200575 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.207260 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.207338 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.214013 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.214088 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.217430 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.224077 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.224149 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.230567 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.230637 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.233902 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.240504 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.240556 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.244317 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.252964 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.253030 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.253054 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.259076 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.259142 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.264910 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.264973 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.270810 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.270883 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.277832 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.277911 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.284270 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.284326 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.290405 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.290466 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.296337 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.296390 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.300245 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.305426 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.305469 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.311316 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.311389 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.317317 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.317375 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.323908 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.323951 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.329897 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.329964 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.332975 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.338844 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.338913 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.344693 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.344775 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.350608 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.351535 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.360131 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.360227 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.360250 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.366281 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.366340 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.371763 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.371820 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.377245 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.377291 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.383242 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.383305 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.388587 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.388640 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.393464 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.393502 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.399000 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.399063 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.404262 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.410187 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.410240 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.410261 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.415664 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.415780 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.421173 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.421228 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.427068 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.427127 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.432384 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.432437 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.435064 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.440468 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.440519 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.445977 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.446032 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.451418 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.451485 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.456920 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.456969 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.460445 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.462894 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.467967 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.468067 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.473480 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.473519 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.478892 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.478935 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.481894 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.486669 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.486725 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.491744 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.491787 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.497334 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.497895 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.503226 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.503304 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.506166 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.511920 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.511974 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.517480 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.517542 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.526346 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.526410 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.538301 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.538426 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.549200 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.549306 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.560841 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.560940 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.572894 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.572950 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.581492 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.581550 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.589823 kubelet[1948]: E0813 00:57:24.589766 1948 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:24.590856 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.590924 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.178000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.600242 kernel: Failed to create system directory sunrpc Aug 13 00:57:24.617802 kernel: RPC: Registered named UNIX socket transport module. Aug 13 00:57:24.617940 kernel: RPC: Registered udp transport module. Aug 13 00:57:24.617969 kernel: RPC: Registered tcp transport module. Aug 13 00:57:24.622236 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Aug 13 00:57:24.178000 audit[3385]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55869e492ad0 a1=1a81bc a2=55868668c2b0 a3=5 items=6 ppid=50 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:57:24.178000 audit: CWD cwd="/" Aug 13 00:57:24.178000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:57:24.178000 audit: PATH item=1 name=(null) inode=26567 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:57:24.178000 audit: PATH item=2 name=(null) inode=26567 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:57:24.178000 audit: PATH item=3 name=(null) inode=26568 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:57:24.178000 audit: PATH item=4 name=(null) inode=26567 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:57:24.178000 audit: PATH item=5 name=(null) inode=26569 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Aug 13 00:57:24.178000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Aug 13 00:57:24.656201 kubelet[1948]: E0813 00:57:24.656159 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.692689 kernel: Failed to create system directory nfs Aug 13 00:57:24.692786 kernel: Failed to create system directory nfs Aug 13 00:57:24.692807 kernel: Failed to create system directory nfs Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.698168 kernel: Failed to create system directory nfs Aug 13 00:57:24.698254 kernel: Failed to create system directory nfs Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.701016 kernel: Failed to create system directory nfs Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.706022 kernel: Failed to create system directory nfs Aug 13 00:57:24.706102 kernel: Failed to create system directory nfs Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.711294 kernel: Failed to create system directory nfs Aug 13 00:57:24.711354 kernel: Failed to create system directory nfs Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.716445 kernel: Failed to create system directory nfs Aug 13 00:57:24.716504 kernel: Failed to create system directory nfs Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.721489 kernel: Failed to create system directory nfs Aug 13 00:57:24.721555 kernel: Failed to create system directory nfs Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.726836 kernel: Failed to create system directory nfs Aug 13 00:57:24.726899 kernel: Failed to create system directory nfs Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.729597 kernel: Failed to create system directory nfs Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.734590 kernel: Failed to create system directory nfs Aug 13 00:57:24.734653 kernel: Failed to create system directory nfs Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.739681 kernel: Failed to create system directory nfs Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.742949 kernel: Failed to create system directory nfs Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.745890 kernel: Failed to create system directory nfs Aug 13 00:57:24.745917 kernel: Failed to create system directory nfs Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.750948 kernel: Failed to create system directory nfs Aug 13 00:57:24.751011 kernel: Failed to create system directory nfs Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.753886 kernel: Failed to create system directory nfs Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.759275 kernel: Failed to create system directory nfs Aug 13 00:57:24.759332 kernel: Failed to create system directory nfs Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.767351 kernel: Failed to create system directory nfs Aug 13 00:57:24.767399 kernel: Failed to create system directory nfs Aug 13 00:57:24.767432 kernel: Failed to create system directory nfs Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.772663 kernel: Failed to create system directory nfs Aug 13 00:57:24.772726 kernel: Failed to create system directory nfs Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.778146 kernel: Failed to create system directory nfs Aug 13 00:57:24.778202 kernel: Failed to create system directory nfs Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.783724 kernel: Failed to create system directory nfs Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.786979 kernel: Failed to create system directory nfs Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.793039 kernel: Failed to create system directory nfs Aug 13 00:57:24.793126 kernel: Failed to create system directory nfs Aug 13 00:57:24.793926 kernel: Failed to create system directory nfs Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.799706 kernel: Failed to create system directory nfs Aug 13 00:57:24.799783 kernel: Failed to create system directory nfs Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.805396 kernel: Failed to create system directory nfs Aug 13 00:57:24.805445 kernel: Failed to create system directory nfs Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.810608 kernel: Failed to create system directory nfs Aug 13 00:57:24.810665 kernel: Failed to create system directory nfs Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.816117 kernel: Failed to create system directory nfs Aug 13 00:57:24.816174 kernel: Failed to create system directory nfs Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.821305 kernel: Failed to create system directory nfs Aug 13 00:57:24.821358 kernel: Failed to create system directory nfs Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.826594 kernel: Failed to create system directory nfs Aug 13 00:57:24.826660 kernel: Failed to create system directory nfs Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.831732 kernel: Failed to create system directory nfs Aug 13 00:57:24.831791 kernel: Failed to create system directory nfs Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.836944 kernel: Failed to create system directory nfs Aug 13 00:57:24.836986 kernel: Failed to create system directory nfs Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.841897 kernel: Failed to create system directory nfs Aug 13 00:57:24.841947 kernel: Failed to create system directory nfs Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.847224 kernel: Failed to create system directory nfs Aug 13 00:57:24.848026 kernel: Failed to create system directory nfs Aug 13 00:57:24.676000 audit[3385]: AVC avc: denied { confidentiality } for pid=3385 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.872890 kernel: FS-Cache: Netfs 'nfs' registered for caching Aug 13 00:57:24.676000 audit[3385]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55869e6b3af0 a1=16ed54 a2=55868668c2b0 a3=5 items=0 ppid=50 pid=3385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:57:24.676000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.928609 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.928721 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.928898 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.934415 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.934473 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.939677 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.939735 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.945138 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.945200 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.950630 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.950673 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.955859 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.955929 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.963683 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.963749 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.966754 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.966820 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.972188 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.972239 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.977516 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.977570 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.982838 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.982898 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.988198 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.988264 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.993678 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.993746 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.999229 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.999295 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.004600 kernel: Failed to create system directory nfs4 Aug 13 00:57:25.004658 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.010023 kernel: Failed to create system directory nfs4 Aug 13 00:57:25.010102 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.015591 kernel: Failed to create system directory nfs4 Aug 13 00:57:25.015665 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.020999 kernel: Failed to create system directory nfs4 Aug 13 00:57:25.021057 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.026348 kernel: Failed to create system directory nfs4 Aug 13 00:57:25.027158 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.029888 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.034819 kernel: Failed to create system directory nfs4 Aug 13 00:57:25.034890 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.040049 kernel: Failed to create system directory nfs4 Aug 13 00:57:25.040117 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.045517 kernel: Failed to create system directory nfs4 Aug 13 00:57:25.045586 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.048891 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.053923 kernel: Failed to create system directory nfs4 Aug 13 00:57:25.053976 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.056894 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.062727 kernel: Failed to create system directory nfs4 Aug 13 00:57:25.062770 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.068545 kernel: Failed to create system directory nfs4 Aug 13 00:57:25.068609 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.071892 kernel: Failed to create system directory nfs4 Aug 13 00:57:25.074258 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.083851 kernel: Failed to create system directory nfs4 Aug 13 00:57:25.083928 kernel: Failed to create system directory nfs4 Aug 13 00:57:25.083954 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.089183 kernel: Failed to create system directory nfs4 Aug 13 00:57:25.089236 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.094664 kernel: Failed to create system directory nfs4 Aug 13 00:57:25.094711 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.099882 kernel: Failed to create system directory nfs4 Aug 13 00:57:25.099926 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.105098 kernel: Failed to create system directory nfs4 Aug 13 00:57:25.105150 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.111145 kernel: Failed to create system directory nfs4 Aug 13 00:57:25.111231 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.116231 kernel: Failed to create system directory nfs4 Aug 13 00:57:25.116317 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.121318 kernel: Failed to create system directory nfs4 Aug 13 00:57:25.121377 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.126620 kernel: Failed to create system directory nfs4 Aug 13 00:57:25.126684 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.129901 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.131891 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.137745 kernel: Failed to create system directory nfs4 Aug 13 00:57:25.137799 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.142902 kernel: Failed to create system directory nfs4 Aug 13 00:57:25.142949 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.148145 kernel: Failed to create system directory nfs4 Aug 13 00:57:25.148200 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.153106 kernel: Failed to create system directory nfs4 Aug 13 00:57:25.153155 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.158519 kernel: Failed to create system directory nfs4 Aug 13 00:57:25.158570 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.163990 kernel: Failed to create system directory nfs4 Aug 13 00:57:25.164051 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.167245 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.172085 kernel: Failed to create system directory nfs4 Aug 13 00:57:25.172148 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.177381 kernel: Failed to create system directory nfs4 Aug 13 00:57:25.177452 kernel: Failed to create system directory nfs4 Aug 13 00:57:24.907000 audit[3390]: AVC avc: denied { confidentiality } for pid=3390 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.319169 kernel: NFS: Registering the id_resolver key type Aug 13 00:57:25.319332 kernel: Key type id_resolver registered Aug 13 00:57:25.319360 kernel: Key type id_legacy registered Aug 13 00:57:24.907000 audit[3390]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7ff32c559010 a1=2095ac a2=55a6139952b0 a3=5 items=0 ppid=50 pid=3390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:57:24.907000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Aug 13 00:57:25.338000 audit[3392]: AVC avc: denied { confidentiality } for pid=3392 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.338000 audit[3392]: AVC avc: denied { confidentiality } for pid=3392 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.348799 kernel: Failed to create system directory rpcgss Aug 13 00:57:25.348899 kernel: Failed to create system directory rpcgss Aug 13 00:57:25.348927 kernel: Failed to create system directory rpcgss Aug 13 00:57:25.338000 audit[3392]: AVC avc: denied { confidentiality } for pid=3392 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.338000 audit[3392]: AVC avc: denied { confidentiality } for pid=3392 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.354469 kernel: Failed to create system directory rpcgss Aug 13 00:57:25.354581 kernel: Failed to create system directory rpcgss Aug 13 00:57:25.338000 audit[3392]: AVC avc: denied { confidentiality } for pid=3392 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.338000 audit[3392]: AVC avc: denied { confidentiality } for pid=3392 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.360327 kernel: Failed to create system directory rpcgss Aug 13 00:57:25.360412 kernel: Failed to create system directory rpcgss Aug 13 00:57:25.338000 audit[3392]: AVC avc: denied { confidentiality } for pid=3392 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.338000 audit[3392]: AVC avc: denied { confidentiality } for pid=3392 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.365848 kernel: Failed to create system directory rpcgss Aug 13 00:57:25.338000 audit[3392]: AVC avc: denied { confidentiality } for pid=3392 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.338000 audit[3392]: AVC avc: denied { confidentiality } for pid=3392 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.371895 kernel: Failed to create system directory rpcgss Aug 13 00:57:25.371965 kernel: Failed to create system directory rpcgss Aug 13 00:57:25.371990 kernel: Failed to create system directory rpcgss Aug 13 00:57:25.338000 audit[3392]: AVC avc: denied { confidentiality } for pid=3392 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.338000 audit[3392]: AVC avc: denied { confidentiality } for pid=3392 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.377503 kernel: Failed to create system directory rpcgss Aug 13 00:57:25.377575 kernel: Failed to create system directory rpcgss Aug 13 00:57:25.338000 audit[3392]: AVC avc: denied { confidentiality } for pid=3392 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.338000 audit[3392]: AVC avc: denied { confidentiality } for pid=3392 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.382964 kernel: Failed to create system directory rpcgss Aug 13 00:57:25.383029 kernel: Failed to create system directory rpcgss Aug 13 00:57:25.338000 audit[3392]: AVC avc: denied { confidentiality } for pid=3392 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.338000 audit[3392]: AVC avc: denied { confidentiality } for pid=3392 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.388550 kernel: Failed to create system directory rpcgss Aug 13 00:57:25.388606 kernel: Failed to create system directory rpcgss Aug 13 00:57:25.338000 audit[3392]: AVC avc: denied { confidentiality } for pid=3392 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.338000 audit[3392]: AVC avc: denied { confidentiality } for pid=3392 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.394032 kernel: Failed to create system directory rpcgss Aug 13 00:57:25.394104 kernel: Failed to create system directory rpcgss Aug 13 00:57:25.338000 audit[3392]: AVC avc: denied { confidentiality } for pid=3392 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.338000 audit[3392]: AVC avc: denied { confidentiality } for pid=3392 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.399557 kernel: Failed to create system directory rpcgss Aug 13 00:57:25.399624 kernel: Failed to create system directory rpcgss Aug 13 00:57:25.338000 audit[3392]: AVC avc: denied { confidentiality } for pid=3392 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.338000 audit[3392]: AVC avc: denied { confidentiality } for pid=3392 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.404830 kernel: Failed to create system directory rpcgss Aug 13 00:57:25.404913 kernel: Failed to create system directory rpcgss Aug 13 00:57:25.338000 audit[3392]: AVC avc: denied { confidentiality } for pid=3392 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.338000 audit[3392]: AVC avc: denied { confidentiality } for pid=3392 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.410334 kernel: Failed to create system directory rpcgss Aug 13 00:57:25.410397 kernel: Failed to create system directory rpcgss Aug 13 00:57:25.338000 audit[3392]: AVC avc: denied { confidentiality } for pid=3392 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.338000 audit[3392]: AVC avc: denied { confidentiality } for pid=3392 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Aug 13 00:57:25.415886 kernel: Failed to create system directory rpcgss Aug 13 00:57:25.338000 audit[3392]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fb56bf49010 a1=70bac a2=55cc6f2a62b0 a3=5 items=0 ppid=50 pid=3392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:57:25.338000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Aug 13 00:57:25.550441 nfsidmap[3397]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.8-a-e88d8da36a' Aug 13 00:57:25.605049 nfsidmap[3398]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.8-a-e88d8da36a' Aug 13 00:57:25.614000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2968 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Aug 13 00:57:25.614000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2968 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Aug 13 00:57:25.614000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2968 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Aug 13 00:57:25.614000 audit[1537]: AVC avc: denied { watch_reads } for pid=1537 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2968 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Aug 13 00:57:25.614000 audit[1537]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55de9f219650 a2=10 a3=da0d1ce60cef536c items=0 ppid=1 pid=1537 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:57:25.614000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Aug 13 00:57:25.614000 audit[1537]: AVC avc: denied { watch_reads } for pid=1537 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2968 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Aug 13 00:57:25.614000 audit[1537]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55de9f219650 a2=10 a3=da0d1ce60cef536c items=0 ppid=1 pid=1537 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:57:25.614000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Aug 13 00:57:25.614000 audit[1537]: AVC avc: denied { watch_reads } for pid=1537 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2968 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Aug 13 00:57:25.614000 audit[1537]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55de9f219650 a2=10 a3=da0d1ce60cef536c items=0 ppid=1 pid=1537 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:57:25.614000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Aug 13 00:57:25.656383 kubelet[1948]: E0813 00:57:25.656323 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:25.903638 env[1437]: time="2025-08-13T00:57:25.902862917Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:e8eb7477-e249-488c-88f8-4eeb98b6e475,Namespace:default,Attempt:0,}" Aug 13 00:57:26.044799 systemd-networkd[1585]: cali5ec59c6bf6e: Link UP Aug 13 00:57:26.053164 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Aug 13 00:57:26.054621 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Aug 13 00:57:26.053475 systemd-networkd[1585]: cali5ec59c6bf6e: Gained carrier Aug 13 00:57:26.069512 env[1437]: 2025-08-13 00:57:25.970 [INFO][3400] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.4.18-k8s-test--pod--1-eth0 default e8eb7477-e249-488c-88f8-4eeb98b6e475 1633 0 2025-08-13 00:56:49 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.4.18 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="bedd3cf9146492ad0b0b8753d092a15ec85d01a077bbf25b2fbdbe71ad1b86f0" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.4.18-k8s-test--pod--1-" Aug 13 00:57:26.069512 env[1437]: 2025-08-13 00:57:25.970 [INFO][3400] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="bedd3cf9146492ad0b0b8753d092a15ec85d01a077bbf25b2fbdbe71ad1b86f0" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.4.18-k8s-test--pod--1-eth0" Aug 13 00:57:26.069512 env[1437]: 2025-08-13 00:57:26.001 [INFO][3413] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="bedd3cf9146492ad0b0b8753d092a15ec85d01a077bbf25b2fbdbe71ad1b86f0" HandleID="k8s-pod-network.bedd3cf9146492ad0b0b8753d092a15ec85d01a077bbf25b2fbdbe71ad1b86f0" Workload="10.200.4.18-k8s-test--pod--1-eth0" Aug 13 00:57:26.069512 env[1437]: 2025-08-13 00:57:26.001 [INFO][3413] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="bedd3cf9146492ad0b0b8753d092a15ec85d01a077bbf25b2fbdbe71ad1b86f0" HandleID="k8s-pod-network.bedd3cf9146492ad0b0b8753d092a15ec85d01a077bbf25b2fbdbe71ad1b86f0" Workload="10.200.4.18-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d5640), Attrs:map[string]string{"namespace":"default", "node":"10.200.4.18", "pod":"test-pod-1", "timestamp":"2025-08-13 00:57:26.001691719 +0000 UTC"}, Hostname:"10.200.4.18", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Aug 13 00:57:26.069512 env[1437]: 2025-08-13 00:57:26.002 [INFO][3413] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Aug 13 00:57:26.069512 env[1437]: 2025-08-13 00:57:26.002 [INFO][3413] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Aug 13 00:57:26.069512 env[1437]: 2025-08-13 00:57:26.002 [INFO][3413] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.4.18' Aug 13 00:57:26.069512 env[1437]: 2025-08-13 00:57:26.010 [INFO][3413] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.bedd3cf9146492ad0b0b8753d092a15ec85d01a077bbf25b2fbdbe71ad1b86f0" host="10.200.4.18" Aug 13 00:57:26.069512 env[1437]: 2025-08-13 00:57:26.016 [INFO][3413] ipam/ipam.go 394: Looking up existing affinities for host host="10.200.4.18" Aug 13 00:57:26.069512 env[1437]: 2025-08-13 00:57:26.020 [INFO][3413] ipam/ipam.go 511: Trying affinity for 192.168.76.64/26 host="10.200.4.18" Aug 13 00:57:26.069512 env[1437]: 2025-08-13 00:57:26.021 [INFO][3413] ipam/ipam.go 158: Attempting to load block cidr=192.168.76.64/26 host="10.200.4.18" Aug 13 00:57:26.069512 env[1437]: 2025-08-13 00:57:26.023 [INFO][3413] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.76.64/26 host="10.200.4.18" Aug 13 00:57:26.069512 env[1437]: 2025-08-13 00:57:26.023 [INFO][3413] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.76.64/26 handle="k8s-pod-network.bedd3cf9146492ad0b0b8753d092a15ec85d01a077bbf25b2fbdbe71ad1b86f0" host="10.200.4.18" Aug 13 00:57:26.069512 env[1437]: 2025-08-13 00:57:26.025 [INFO][3413] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.bedd3cf9146492ad0b0b8753d092a15ec85d01a077bbf25b2fbdbe71ad1b86f0 Aug 13 00:57:26.069512 env[1437]: 2025-08-13 00:57:26.032 [INFO][3413] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.76.64/26 handle="k8s-pod-network.bedd3cf9146492ad0b0b8753d092a15ec85d01a077bbf25b2fbdbe71ad1b86f0" host="10.200.4.18" Aug 13 00:57:26.069512 env[1437]: 2025-08-13 00:57:26.039 [INFO][3413] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.76.68/26] block=192.168.76.64/26 handle="k8s-pod-network.bedd3cf9146492ad0b0b8753d092a15ec85d01a077bbf25b2fbdbe71ad1b86f0" host="10.200.4.18" Aug 13 00:57:26.069512 env[1437]: 2025-08-13 00:57:26.039 [INFO][3413] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.76.68/26] handle="k8s-pod-network.bedd3cf9146492ad0b0b8753d092a15ec85d01a077bbf25b2fbdbe71ad1b86f0" host="10.200.4.18" Aug 13 00:57:26.069512 env[1437]: 2025-08-13 00:57:26.039 [INFO][3413] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Aug 13 00:57:26.069512 env[1437]: 2025-08-13 00:57:26.039 [INFO][3413] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.76.68/26] IPv6=[] ContainerID="bedd3cf9146492ad0b0b8753d092a15ec85d01a077bbf25b2fbdbe71ad1b86f0" HandleID="k8s-pod-network.bedd3cf9146492ad0b0b8753d092a15ec85d01a077bbf25b2fbdbe71ad1b86f0" Workload="10.200.4.18-k8s-test--pod--1-eth0" Aug 13 00:57:26.069512 env[1437]: 2025-08-13 00:57:26.041 [INFO][3400] cni-plugin/k8s.go 418: Populated endpoint ContainerID="bedd3cf9146492ad0b0b8753d092a15ec85d01a077bbf25b2fbdbe71ad1b86f0" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.4.18-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.18-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"e8eb7477-e249-488c-88f8-4eeb98b6e475", ResourceVersion:"1633", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 0, 56, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.18", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.76.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 00:57:26.070697 env[1437]: 2025-08-13 00:57:26.041 [INFO][3400] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.76.68/32] ContainerID="bedd3cf9146492ad0b0b8753d092a15ec85d01a077bbf25b2fbdbe71ad1b86f0" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.4.18-k8s-test--pod--1-eth0" Aug 13 00:57:26.070697 env[1437]: 2025-08-13 00:57:26.041 [INFO][3400] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="bedd3cf9146492ad0b0b8753d092a15ec85d01a077bbf25b2fbdbe71ad1b86f0" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.4.18-k8s-test--pod--1-eth0" Aug 13 00:57:26.070697 env[1437]: 2025-08-13 00:57:26.055 [INFO][3400] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="bedd3cf9146492ad0b0b8753d092a15ec85d01a077bbf25b2fbdbe71ad1b86f0" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.4.18-k8s-test--pod--1-eth0" Aug 13 00:57:26.070697 env[1437]: 2025-08-13 00:57:26.055 [INFO][3400] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="bedd3cf9146492ad0b0b8753d092a15ec85d01a077bbf25b2fbdbe71ad1b86f0" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.4.18-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.4.18-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"e8eb7477-e249-488c-88f8-4eeb98b6e475", ResourceVersion:"1633", Generation:0, CreationTimestamp:time.Date(2025, time.August, 13, 0, 56, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.4.18", ContainerID:"bedd3cf9146492ad0b0b8753d092a15ec85d01a077bbf25b2fbdbe71ad1b86f0", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.76.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"82:49:f2:cc:af:7d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Aug 13 00:57:26.070697 env[1437]: 2025-08-13 00:57:26.064 [INFO][3400] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="bedd3cf9146492ad0b0b8753d092a15ec85d01a077bbf25b2fbdbe71ad1b86f0" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.4.18-k8s-test--pod--1-eth0" Aug 13 00:57:26.081000 audit[3429]: NETFILTER_CFG table=filter:81 family=2 entries=40 op=nft_register_chain pid=3429 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Aug 13 00:57:26.081000 audit[3429]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffff37efb60 a2=0 a3=7ffff37efb4c items=0 ppid=2540 pid=3429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:57:26.081000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Aug 13 00:57:26.085925 env[1437]: time="2025-08-13T00:57:26.085821775Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Aug 13 00:57:26.086086 env[1437]: time="2025-08-13T00:57:26.085899277Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Aug 13 00:57:26.086086 env[1437]: time="2025-08-13T00:57:26.085914277Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Aug 13 00:57:26.086310 env[1437]: time="2025-08-13T00:57:26.086214085Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bedd3cf9146492ad0b0b8753d092a15ec85d01a077bbf25b2fbdbe71ad1b86f0 pid=3437 runtime=io.containerd.runc.v2 Aug 13 00:57:26.105656 systemd[1]: Started cri-containerd-bedd3cf9146492ad0b0b8753d092a15ec85d01a077bbf25b2fbdbe71ad1b86f0.scope. Aug 13 00:57:26.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.118000 audit: BPF prog-id=130 op=LOAD Aug 13 00:57:26.119000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.119000 audit[3447]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3437 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:57:26.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265646433636639313436343932616430623062383735336430393261 Aug 13 00:57:26.119000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.119000 audit[3447]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3437 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:57:26.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265646433636639313436343932616430623062383735336430393261 Aug 13 00:57:26.119000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.119000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.119000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.119000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.119000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.119000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.119000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.119000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.119000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.119000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.119000 audit: BPF prog-id=131 op=LOAD Aug 13 00:57:26.119000 audit[3447]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0002d3ce0 items=0 ppid=3437 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:57:26.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265646433636639313436343932616430623062383735336430393261 Aug 13 00:57:26.119000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.119000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.119000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.119000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.119000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.119000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.119000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.119000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.119000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.119000 audit: BPF prog-id=132 op=LOAD Aug 13 00:57:26.119000 audit[3447]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0002d3d28 items=0 ppid=3437 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:57:26.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265646433636639313436343932616430623062383735336430393261 Aug 13 00:57:26.119000 audit: BPF prog-id=132 op=UNLOAD Aug 13 00:57:26.119000 audit: BPF prog-id=131 op=UNLOAD Aug 13 00:57:26.119000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.119000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.119000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.119000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.119000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.119000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.119000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.119000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.119000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.119000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.119000 audit: BPF prog-id=133 op=LOAD Aug 13 00:57:26.119000 audit[3447]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003d8138 items=0 ppid=3437 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:57:26.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265646433636639313436343932616430623062383735336430393261 Aug 13 00:57:26.162142 env[1437]: time="2025-08-13T00:57:26.159862960Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:e8eb7477-e249-488c-88f8-4eeb98b6e475,Namespace:default,Attempt:0,} returns sandbox id \"bedd3cf9146492ad0b0b8753d092a15ec85d01a077bbf25b2fbdbe71ad1b86f0\"" Aug 13 00:57:26.166297 env[1437]: time="2025-08-13T00:57:26.166191330Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Aug 13 00:57:26.490336 env[1437]: time="2025-08-13T00:57:26.490221419Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:57:26.496114 env[1437]: time="2025-08-13T00:57:26.496070576Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:f36b8965af58ac17c6fcb27d986b37161ceb26b3d41d3cd53f232b0e16761305,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:57:26.499437 env[1437]: time="2025-08-13T00:57:26.499401865Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:57:26.503102 env[1437]: time="2025-08-13T00:57:26.503068264Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:a6969d434cb816d30787e9f7ab16b632e12dc05a2c8f4dae701d83ef2199c985,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Aug 13 00:57:26.503672 env[1437]: time="2025-08-13T00:57:26.503636679Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:f36b8965af58ac17c6fcb27d986b37161ceb26b3d41d3cd53f232b0e16761305\"" Aug 13 00:57:26.506451 env[1437]: time="2025-08-13T00:57:26.506421053Z" level=info msg="CreateContainer within sandbox \"bedd3cf9146492ad0b0b8753d092a15ec85d01a077bbf25b2fbdbe71ad1b86f0\" for container &ContainerMetadata{Name:test,Attempt:0,}" Aug 13 00:57:26.540619 env[1437]: time="2025-08-13T00:57:26.540566069Z" level=info msg="CreateContainer within sandbox \"bedd3cf9146492ad0b0b8753d092a15ec85d01a077bbf25b2fbdbe71ad1b86f0\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"b7644d210a645f22675ea0a9787ab05dc0b74af074409c2def791333f441cff0\"" Aug 13 00:57:26.541629 env[1437]: time="2025-08-13T00:57:26.541590797Z" level=info msg="StartContainer for \"b7644d210a645f22675ea0a9787ab05dc0b74af074409c2def791333f441cff0\"" Aug 13 00:57:26.559346 systemd[1]: Started cri-containerd-b7644d210a645f22675ea0a9787ab05dc0b74af074409c2def791333f441cff0.scope. Aug 13 00:57:26.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.573000 audit: BPF prog-id=134 op=LOAD Aug 13 00:57:26.573000 audit[3480]: AVC avc: denied { bpf } for pid=3480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.573000 audit[3480]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=3437 pid=3480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:57:26.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237363434643231306136343566323236373565613061393738376162 Aug 13 00:57:26.574000 audit[3480]: AVC avc: denied { perfmon } for pid=3480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.574000 audit[3480]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=8 items=0 ppid=3437 pid=3480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:57:26.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237363434643231306136343566323236373565613061393738376162 Aug 13 00:57:26.574000 audit[3480]: AVC avc: denied { bpf } for pid=3480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.574000 audit[3480]: AVC avc: denied { bpf } for pid=3480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.574000 audit[3480]: AVC avc: denied { bpf } for pid=3480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.574000 audit[3480]: AVC avc: denied { perfmon } for pid=3480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.574000 audit[3480]: AVC avc: denied { perfmon } for pid=3480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.574000 audit[3480]: AVC avc: denied { perfmon } for pid=3480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.574000 audit[3480]: AVC avc: denied { perfmon } for pid=3480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.574000 audit[3480]: AVC avc: denied { perfmon } for pid=3480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.574000 audit[3480]: AVC avc: denied { bpf } for pid=3480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.574000 audit[3480]: AVC avc: denied { bpf } for pid=3480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.574000 audit: BPF prog-id=135 op=LOAD Aug 13 00:57:26.574000 audit[3480]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c000259d10 items=0 ppid=3437 pid=3480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:57:26.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237363434643231306136343566323236373565613061393738376162 Aug 13 00:57:26.574000 audit[3480]: AVC avc: denied { bpf } for pid=3480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.574000 audit[3480]: AVC avc: denied { bpf } for pid=3480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.574000 audit[3480]: AVC avc: denied { perfmon } for pid=3480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.574000 audit[3480]: AVC avc: denied { perfmon } for pid=3480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.574000 audit[3480]: AVC avc: denied { perfmon } for pid=3480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.574000 audit[3480]: AVC avc: denied { perfmon } for pid=3480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.574000 audit[3480]: AVC avc: denied { perfmon } for pid=3480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.574000 audit[3480]: AVC avc: denied { bpf } for pid=3480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.574000 audit[3480]: AVC avc: denied { bpf } for pid=3480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.574000 audit: BPF prog-id=136 op=LOAD Aug 13 00:57:26.574000 audit[3480]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c000259d58 items=0 ppid=3437 pid=3480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:57:26.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237363434643231306136343566323236373565613061393738376162 Aug 13 00:57:26.574000 audit: BPF prog-id=136 op=UNLOAD Aug 13 00:57:26.574000 audit: BPF prog-id=135 op=UNLOAD Aug 13 00:57:26.574000 audit[3480]: AVC avc: denied { bpf } for pid=3480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.574000 audit[3480]: AVC avc: denied { bpf } for pid=3480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.574000 audit[3480]: AVC avc: denied { bpf } for pid=3480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.574000 audit[3480]: AVC avc: denied { perfmon } for pid=3480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.574000 audit[3480]: AVC avc: denied { perfmon } for pid=3480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.574000 audit[3480]: AVC avc: denied { perfmon } for pid=3480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.574000 audit[3480]: AVC avc: denied { perfmon } for pid=3480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.574000 audit[3480]: AVC avc: denied { perfmon } for pid=3480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.574000 audit[3480]: AVC avc: denied { bpf } for pid=3480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.574000 audit[3480]: AVC avc: denied { bpf } for pid=3480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Aug 13 00:57:26.574000 audit: BPF prog-id=137 op=LOAD Aug 13 00:57:26.574000 audit[3480]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c0003c4168 items=0 ppid=3437 pid=3480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Aug 13 00:57:26.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237363434643231306136343566323236373565613061393738376162 Aug 13 00:57:26.594240 env[1437]: time="2025-08-13T00:57:26.594199807Z" level=info msg="StartContainer for \"b7644d210a645f22675ea0a9787ab05dc0b74af074409c2def791333f441cff0\" returns successfully" Aug 13 00:57:26.656991 kubelet[1948]: E0813 00:57:26.656913 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:26.896132 kubelet[1948]: I0813 00:57:26.896072 1948 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=37.556945508 podStartE2EDuration="37.896055602s" podCreationTimestamp="2025-08-13 00:56:49 +0000 UTC" firstStartedPulling="2025-08-13 00:57:26.165784919 +0000 UTC m=+82.875814868" lastFinishedPulling="2025-08-13 00:57:26.504895013 +0000 UTC m=+83.214924962" observedRunningTime="2025-08-13 00:57:26.895950499 +0000 UTC m=+83.605980548" watchObservedRunningTime="2025-08-13 00:57:26.896055602 +0000 UTC m=+83.606085651" Aug 13 00:57:27.440193 systemd-networkd[1585]: cali5ec59c6bf6e: Gained IPv6LL Aug 13 00:57:27.657671 kubelet[1948]: E0813 00:57:27.657606 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:28.658025 kubelet[1948]: E0813 00:57:28.657970 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:29.658592 kubelet[1948]: E0813 00:57:29.658527 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:30.658750 kubelet[1948]: E0813 00:57:30.658675 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:31.057418 systemd[1]: run-containerd-runc-k8s.io-6ff1643bc958f8d64a94710d2d88079b409b6e61a7a9a72ab842c9e4cff96cde-runc.6rqHuu.mount: Deactivated successfully. Aug 13 00:57:31.659741 kubelet[1948]: E0813 00:57:31.659684 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:32.660065 kubelet[1948]: E0813 00:57:32.660004 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Aug 13 00:57:33.660617 kubelet[1948]: E0813 00:57:33.660556 1948 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"