Jul 16 12:40:49.880128 kernel: Linux version 5.15.188-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Tue Jul 15 10:04:37 -00 2025 Jul 16 12:40:49.880155 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=3fdbb2e3469f90ee764ea38c6fc4332d45967696e3c4fd4a8c65f8d0125b235b Jul 16 12:40:49.880168 kernel: BIOS-provided physical RAM map: Jul 16 12:40:49.880176 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Jul 16 12:40:49.880182 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Jul 16 12:40:49.880189 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Jul 16 12:40:49.880198 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdbfff] usable Jul 16 12:40:49.880205 kernel: BIOS-e820: [mem 0x000000007ffdc000-0x000000007fffffff] reserved Jul 16 12:40:49.880212 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Jul 16 12:40:49.880219 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved Jul 16 12:40:49.880228 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Jul 16 12:40:49.880235 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Jul 16 12:40:49.880242 kernel: NX (Execute Disable) protection: active Jul 16 12:40:49.880258 kernel: SMBIOS 2.8 present. Jul 16 12:40:49.880268 kernel: DMI: Red Hat KVM/RHEL-AV, BIOS 1.13.0-2.module_el8.5.0+2608+72063365 04/01/2014 Jul 16 12:40:49.880276 kernel: Hypervisor detected: KVM Jul 16 12:40:49.880286 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Jul 16 12:40:49.880294 kernel: kvm-clock: cpu 0, msr 2619b001, primary cpu clock Jul 16 12:40:49.880302 kernel: kvm-clock: using sched offset of 4107204297 cycles Jul 16 12:40:49.880310 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Jul 16 12:40:49.880318 kernel: tsc: Detected 2294.576 MHz processor Jul 16 12:40:49.880327 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Jul 16 12:40:49.880335 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Jul 16 12:40:49.880343 kernel: last_pfn = 0x7ffdc max_arch_pfn = 0x400000000 Jul 16 12:40:49.880351 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Jul 16 12:40:49.880361 kernel: Using GB pages for direct mapping Jul 16 12:40:49.880369 kernel: ACPI: Early table checksum verification disabled Jul 16 12:40:49.880377 kernel: ACPI: RSDP 0x00000000000F5AA0 000014 (v00 BOCHS ) Jul 16 12:40:49.880385 kernel: ACPI: RSDT 0x000000007FFE47A5 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 16 12:40:49.880393 kernel: ACPI: FACP 0x000000007FFE438D 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Jul 16 12:40:49.880400 kernel: ACPI: DSDT 0x000000007FFDFD80 00460D (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 16 12:40:49.880408 kernel: ACPI: FACS 0x000000007FFDFD40 000040 Jul 16 12:40:49.880416 kernel: ACPI: APIC 0x000000007FFE4481 0000F0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 16 12:40:49.880424 kernel: ACPI: SRAT 0x000000007FFE4571 0001D0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 16 12:40:49.880434 kernel: ACPI: MCFG 0x000000007FFE4741 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 16 12:40:49.880442 kernel: ACPI: WAET 0x000000007FFE477D 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 16 12:40:49.880450 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe438d-0x7ffe4480] Jul 16 12:40:49.880457 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffdfd80-0x7ffe438c] Jul 16 12:40:49.880465 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffdfd40-0x7ffdfd7f] Jul 16 12:40:49.880473 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe4481-0x7ffe4570] Jul 16 12:40:49.880485 kernel: ACPI: Reserving SRAT table memory at [mem 0x7ffe4571-0x7ffe4740] Jul 16 12:40:49.880496 kernel: ACPI: Reserving MCFG table memory at [mem 0x7ffe4741-0x7ffe477c] Jul 16 12:40:49.880504 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe477d-0x7ffe47a4] Jul 16 12:40:49.880513 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Jul 16 12:40:49.880521 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Jul 16 12:40:49.880530 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 Jul 16 12:40:49.880538 kernel: SRAT: PXM 0 -> APIC 0x03 -> Node 0 Jul 16 12:40:49.880546 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 Jul 16 12:40:49.880557 kernel: SRAT: PXM 0 -> APIC 0x05 -> Node 0 Jul 16 12:40:49.880565 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 Jul 16 12:40:49.880573 kernel: SRAT: PXM 0 -> APIC 0x07 -> Node 0 Jul 16 12:40:49.880582 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 Jul 16 12:40:49.880590 kernel: SRAT: PXM 0 -> APIC 0x09 -> Node 0 Jul 16 12:40:49.880606 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 Jul 16 12:40:49.880615 kernel: SRAT: PXM 0 -> APIC 0x0b -> Node 0 Jul 16 12:40:49.880623 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 Jul 16 12:40:49.880631 kernel: SRAT: PXM 0 -> APIC 0x0d -> Node 0 Jul 16 12:40:49.880640 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 Jul 16 12:40:49.880650 kernel: SRAT: PXM 0 -> APIC 0x0f -> Node 0 Jul 16 12:40:49.880659 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Jul 16 12:40:49.880667 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Jul 16 12:40:49.880676 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x20800fffff] hotplug Jul 16 12:40:49.880684 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7ffdbfff] -> [mem 0x00000000-0x7ffdbfff] Jul 16 12:40:49.880693 kernel: NODE_DATA(0) allocated [mem 0x7ffd6000-0x7ffdbfff] Jul 16 12:40:49.880702 kernel: Zone ranges: Jul 16 12:40:49.880710 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Jul 16 12:40:49.880719 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdbfff] Jul 16 12:40:49.880729 kernel: Normal empty Jul 16 12:40:49.880738 kernel: Movable zone start for each node Jul 16 12:40:49.880747 kernel: Early memory node ranges Jul 16 12:40:49.880755 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Jul 16 12:40:49.880764 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdbfff] Jul 16 12:40:49.880772 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdbfff] Jul 16 12:40:49.880781 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Jul 16 12:40:49.880789 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Jul 16 12:40:49.880798 kernel: On node 0, zone DMA32: 36 pages in unavailable ranges Jul 16 12:40:49.880808 kernel: ACPI: PM-Timer IO Port: 0x608 Jul 16 12:40:49.880817 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Jul 16 12:40:49.880825 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Jul 16 12:40:49.880834 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Jul 16 12:40:49.880842 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Jul 16 12:40:49.880851 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Jul 16 12:40:49.880859 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Jul 16 12:40:49.880867 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Jul 16 12:40:49.880876 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Jul 16 12:40:49.880887 kernel: TSC deadline timer available Jul 16 12:40:49.880895 kernel: smpboot: Allowing 16 CPUs, 14 hotplug CPUs Jul 16 12:40:49.880904 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices Jul 16 12:40:49.880912 kernel: Booting paravirtualized kernel on KVM Jul 16 12:40:49.880921 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Jul 16 12:40:49.880930 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Jul 16 12:40:49.880938 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Jul 16 12:40:49.880947 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Jul 16 12:40:49.880955 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Jul 16 12:40:49.880967 kernel: kvm-guest: stealtime: cpu 0, msr 7da1c0c0 Jul 16 12:40:49.880975 kernel: kvm-guest: PV spinlocks enabled Jul 16 12:40:49.880984 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Jul 16 12:40:49.880993 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515804 Jul 16 12:40:49.881001 kernel: Policy zone: DMA32 Jul 16 12:40:49.881011 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=3fdbb2e3469f90ee764ea38c6fc4332d45967696e3c4fd4a8c65f8d0125b235b Jul 16 12:40:49.881020 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Jul 16 12:40:49.881028 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jul 16 12:40:49.881039 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Jul 16 12:40:49.881048 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jul 16 12:40:49.881057 kernel: Memory: 1903832K/2096616K available (12295K kernel code, 2276K rwdata, 13732K rodata, 47476K init, 4104K bss, 192524K reserved, 0K cma-reserved) Jul 16 12:40:49.881065 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Jul 16 12:40:49.881074 kernel: ftrace: allocating 34607 entries in 136 pages Jul 16 12:40:49.881082 kernel: ftrace: allocated 136 pages with 2 groups Jul 16 12:40:49.881091 kernel: rcu: Hierarchical RCU implementation. Jul 16 12:40:49.881100 kernel: rcu: RCU event tracing is enabled. Jul 16 12:40:49.881109 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Jul 16 12:40:49.881120 kernel: Rude variant of Tasks RCU enabled. Jul 16 12:40:49.881129 kernel: Tracing variant of Tasks RCU enabled. Jul 16 12:40:49.881137 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jul 16 12:40:49.881146 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Jul 16 12:40:49.881154 kernel: NR_IRQS: 33024, nr_irqs: 552, preallocated irqs: 16 Jul 16 12:40:49.881163 kernel: random: crng init done Jul 16 12:40:49.881171 kernel: Console: colour VGA+ 80x25 Jul 16 12:40:49.881190 kernel: printk: console [tty0] enabled Jul 16 12:40:49.881199 kernel: printk: console [ttyS0] enabled Jul 16 12:40:49.881208 kernel: ACPI: Core revision 20210730 Jul 16 12:40:49.881217 kernel: APIC: Switch to symmetric I/O mode setup Jul 16 12:40:49.881226 kernel: x2apic enabled Jul 16 12:40:49.881237 kernel: Switched APIC routing to physical x2apic. Jul 16 12:40:49.881246 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x2113312ac93, max_idle_ns: 440795244843 ns Jul 16 12:40:49.881261 kernel: Calibrating delay loop (skipped) preset value.. 4589.15 BogoMIPS (lpj=2294576) Jul 16 12:40:49.881270 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Jul 16 12:40:49.881279 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Jul 16 12:40:49.881290 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Jul 16 12:40:49.881299 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Jul 16 12:40:49.881308 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Jul 16 12:40:49.881317 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Jul 16 12:40:49.881326 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Jul 16 12:40:49.881335 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS Jul 16 12:40:49.881344 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Jul 16 12:40:49.881353 kernel: RETBleed: Mitigation: Enhanced IBRS Jul 16 12:40:49.881362 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Jul 16 12:40:49.881371 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Jul 16 12:40:49.881382 kernel: TAA: Mitigation: Clear CPU buffers Jul 16 12:40:49.881391 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Jul 16 12:40:49.881400 kernel: GDS: Unknown: Dependent on hypervisor status Jul 16 12:40:49.881409 kernel: ITS: Mitigation: Aligned branch/return thunks Jul 16 12:40:49.881418 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Jul 16 12:40:49.881427 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Jul 16 12:40:49.881436 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Jul 16 12:40:49.881445 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Jul 16 12:40:49.881454 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Jul 16 12:40:49.881463 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Jul 16 12:40:49.881472 kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' Jul 16 12:40:49.881484 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Jul 16 12:40:49.881493 kernel: x86/fpu: xstate_offset[5]: 832, xstate_sizes[5]: 64 Jul 16 12:40:49.881502 kernel: x86/fpu: xstate_offset[6]: 896, xstate_sizes[6]: 512 Jul 16 12:40:49.881511 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024 Jul 16 12:40:49.881520 kernel: x86/fpu: xstate_offset[9]: 2432, xstate_sizes[9]: 8 Jul 16 12:40:49.881529 kernel: x86/fpu: Enabled xstate features 0x2e7, context size is 2440 bytes, using 'compacted' format. Jul 16 12:40:49.881538 kernel: Freeing SMP alternatives memory: 32K Jul 16 12:40:49.881547 kernel: pid_max: default: 32768 minimum: 301 Jul 16 12:40:49.881555 kernel: LSM: Security Framework initializing Jul 16 12:40:49.881564 kernel: SELinux: Initializing. Jul 16 12:40:49.881574 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Jul 16 12:40:49.881583 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Jul 16 12:40:49.881594 kernel: smpboot: CPU0: Intel Xeon Processor (Cascadelake) (family: 0x6, model: 0x55, stepping: 0x6) Jul 16 12:40:49.884663 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Jul 16 12:40:49.884676 kernel: signal: max sigframe size: 3632 Jul 16 12:40:49.884686 kernel: rcu: Hierarchical SRCU implementation. Jul 16 12:40:49.884696 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Jul 16 12:40:49.884705 kernel: smp: Bringing up secondary CPUs ... Jul 16 12:40:49.884714 kernel: x86: Booting SMP configuration: Jul 16 12:40:49.884724 kernel: .... node #0, CPUs: #1 Jul 16 12:40:49.884733 kernel: kvm-clock: cpu 1, msr 2619b041, secondary cpu clock Jul 16 12:40:49.884748 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 Jul 16 12:40:49.884757 kernel: kvm-guest: stealtime: cpu 1, msr 7da5c0c0 Jul 16 12:40:49.884766 kernel: smp: Brought up 1 node, 2 CPUs Jul 16 12:40:49.884776 kernel: smpboot: Max logical packages: 16 Jul 16 12:40:49.884785 kernel: smpboot: Total of 2 processors activated (9178.30 BogoMIPS) Jul 16 12:40:49.884795 kernel: devtmpfs: initialized Jul 16 12:40:49.884804 kernel: x86/mm: Memory block size: 128MB Jul 16 12:40:49.884814 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jul 16 12:40:49.884823 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Jul 16 12:40:49.884832 kernel: pinctrl core: initialized pinctrl subsystem Jul 16 12:40:49.884844 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jul 16 12:40:49.884853 kernel: audit: initializing netlink subsys (disabled) Jul 16 12:40:49.884862 kernel: audit: type=2000 audit(1752669648.682:1): state=initialized audit_enabled=0 res=1 Jul 16 12:40:49.884871 kernel: thermal_sys: Registered thermal governor 'step_wise' Jul 16 12:40:49.884880 kernel: thermal_sys: Registered thermal governor 'user_space' Jul 16 12:40:49.884890 kernel: cpuidle: using governor menu Jul 16 12:40:49.884899 kernel: ACPI: bus type PCI registered Jul 16 12:40:49.884908 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jul 16 12:40:49.884918 kernel: dca service started, version 1.12.1 Jul 16 12:40:49.884929 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Jul 16 12:40:49.884938 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Jul 16 12:40:49.884947 kernel: PCI: Using configuration type 1 for base access Jul 16 12:40:49.884957 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Jul 16 12:40:49.884966 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Jul 16 12:40:49.884975 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Jul 16 12:40:49.884985 kernel: ACPI: Added _OSI(Module Device) Jul 16 12:40:49.884994 kernel: ACPI: Added _OSI(Processor Device) Jul 16 12:40:49.885003 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jul 16 12:40:49.885014 kernel: ACPI: Added _OSI(Linux-Dell-Video) Jul 16 12:40:49.885023 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Jul 16 12:40:49.885032 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Jul 16 12:40:49.885042 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Jul 16 12:40:49.885051 kernel: ACPI: Interpreter enabled Jul 16 12:40:49.885060 kernel: ACPI: PM: (supports S0 S5) Jul 16 12:40:49.885069 kernel: ACPI: Using IOAPIC for interrupt routing Jul 16 12:40:49.885079 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Jul 16 12:40:49.885088 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Jul 16 12:40:49.885099 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Jul 16 12:40:49.885265 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Jul 16 12:40:49.885358 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Jul 16 12:40:49.885444 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Jul 16 12:40:49.885456 kernel: PCI host bridge to bus 0000:00 Jul 16 12:40:49.885547 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Jul 16 12:40:49.885638 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Jul 16 12:40:49.885716 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Jul 16 12:40:49.885791 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xafffffff window] Jul 16 12:40:49.885867 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Jul 16 12:40:49.885942 kernel: pci_bus 0000:00: root bus resource [mem 0x20c0000000-0x28bfffffff window] Jul 16 12:40:49.886017 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Jul 16 12:40:49.886116 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Jul 16 12:40:49.886226 kernel: pci 0000:00:01.0: [1013:00b8] type 00 class 0x030000 Jul 16 12:40:49.886322 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfa000000-0xfbffffff pref] Jul 16 12:40:49.886409 kernel: pci 0000:00:01.0: reg 0x14: [mem 0xfea50000-0xfea50fff] Jul 16 12:40:49.886494 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfea40000-0xfea4ffff pref] Jul 16 12:40:49.886578 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Jul 16 12:40:49.889789 kernel: pci 0000:00:02.0: [1b36:000c] type 01 class 0x060400 Jul 16 12:40:49.889892 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfea51000-0xfea51fff] Jul 16 12:40:49.890000 kernel: pci 0000:00:02.1: [1b36:000c] type 01 class 0x060400 Jul 16 12:40:49.890095 kernel: pci 0000:00:02.1: reg 0x10: [mem 0xfea52000-0xfea52fff] Jul 16 12:40:49.890189 kernel: pci 0000:00:02.2: [1b36:000c] type 01 class 0x060400 Jul 16 12:40:49.890284 kernel: pci 0000:00:02.2: reg 0x10: [mem 0xfea53000-0xfea53fff] Jul 16 12:40:49.890376 kernel: pci 0000:00:02.3: [1b36:000c] type 01 class 0x060400 Jul 16 12:40:49.890462 kernel: pci 0000:00:02.3: reg 0x10: [mem 0xfea54000-0xfea54fff] Jul 16 12:40:49.890562 kernel: pci 0000:00:02.4: [1b36:000c] type 01 class 0x060400 Jul 16 12:40:49.890657 kernel: pci 0000:00:02.4: reg 0x10: [mem 0xfea55000-0xfea55fff] Jul 16 12:40:49.890748 kernel: pci 0000:00:02.5: [1b36:000c] type 01 class 0x060400 Jul 16 12:40:49.890834 kernel: pci 0000:00:02.5: reg 0x10: [mem 0xfea56000-0xfea56fff] Jul 16 12:40:49.890923 kernel: pci 0000:00:02.6: [1b36:000c] type 01 class 0x060400 Jul 16 12:40:49.891008 kernel: pci 0000:00:02.6: reg 0x10: [mem 0xfea57000-0xfea57fff] Jul 16 12:40:49.891102 kernel: pci 0000:00:02.7: [1b36:000c] type 01 class 0x060400 Jul 16 12:40:49.891188 kernel: pci 0000:00:02.7: reg 0x10: [mem 0xfea58000-0xfea58fff] Jul 16 12:40:49.891293 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Jul 16 12:40:49.891380 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc0c0-0xc0df] Jul 16 12:40:49.891465 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfea59000-0xfea59fff] Jul 16 12:40:49.891555 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfd000000-0xfd003fff 64bit pref] Jul 16 12:40:49.893758 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfea00000-0xfea3ffff pref] Jul 16 12:40:49.893881 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Jul 16 12:40:49.893982 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Jul 16 12:40:49.894088 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfea5a000-0xfea5afff] Jul 16 12:40:49.894192 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfd004000-0xfd007fff 64bit pref] Jul 16 12:40:49.894302 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Jul 16 12:40:49.894399 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Jul 16 12:40:49.894504 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Jul 16 12:40:49.894607 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc0e0-0xc0ff] Jul 16 12:40:49.894696 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfea5b000-0xfea5bfff] Jul 16 12:40:49.894787 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Jul 16 12:40:49.894872 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] Jul 16 12:40:49.894969 kernel: pci 0000:01:00.0: [1b36:000e] type 01 class 0x060400 Jul 16 12:40:49.895058 kernel: pci 0000:01:00.0: reg 0x10: [mem 0xfda00000-0xfda000ff 64bit] Jul 16 12:40:49.895149 kernel: pci 0000:00:02.0: PCI bridge to [bus 01-02] Jul 16 12:40:49.895234 kernel: pci 0000:00:02.0: bridge window [mem 0xfd800000-0xfdbfffff] Jul 16 12:40:49.895326 kernel: pci 0000:00:02.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Jul 16 12:40:49.895424 kernel: pci_bus 0000:02: extended config space not accessible Jul 16 12:40:49.895529 kernel: pci 0000:02:01.0: [8086:25ab] type 00 class 0x088000 Jul 16 12:40:49.896374 kernel: pci 0000:02:01.0: reg 0x10: [mem 0xfd800000-0xfd80000f] Jul 16 12:40:49.896486 kernel: pci 0000:01:00.0: PCI bridge to [bus 02] Jul 16 12:40:49.896580 kernel: pci 0000:01:00.0: bridge window [mem 0xfd800000-0xfd9fffff] Jul 16 12:40:49.896691 kernel: pci 0000:03:00.0: [1b36:000d] type 00 class 0x0c0330 Jul 16 12:40:49.896792 kernel: pci 0000:03:00.0: reg 0x10: [mem 0xfe800000-0xfe803fff 64bit] Jul 16 12:40:49.896892 kernel: pci 0000:00:02.1: PCI bridge to [bus 03] Jul 16 12:40:49.896993 kernel: pci 0000:00:02.1: bridge window [mem 0xfe800000-0xfe9fffff] Jul 16 12:40:49.897095 kernel: pci 0000:00:02.1: bridge window [mem 0xfcc00000-0xfcdfffff 64bit pref] Jul 16 12:40:49.897216 kernel: pci 0000:04:00.0: [1af4:1044] type 00 class 0x00ff00 Jul 16 12:40:49.897332 kernel: pci 0000:04:00.0: reg 0x20: [mem 0xfca00000-0xfca03fff 64bit pref] Jul 16 12:40:49.897435 kernel: pci 0000:00:02.2: PCI bridge to [bus 04] Jul 16 12:40:49.897532 kernel: pci 0000:00:02.2: bridge window [mem 0xfe600000-0xfe7fffff] Jul 16 12:40:49.897646 kernel: pci 0000:00:02.2: bridge window [mem 0xfca00000-0xfcbfffff 64bit pref] Jul 16 12:40:49.897757 kernel: pci 0000:00:02.3: PCI bridge to [bus 05] Jul 16 12:40:49.897843 kernel: pci 0000:00:02.3: bridge window [mem 0xfe400000-0xfe5fffff] Jul 16 12:40:49.897928 kernel: pci 0000:00:02.3: bridge window [mem 0xfc800000-0xfc9fffff 64bit pref] Jul 16 12:40:49.898017 kernel: pci 0000:00:02.4: PCI bridge to [bus 06] Jul 16 12:40:49.898101 kernel: pci 0000:00:02.4: bridge window [mem 0xfe200000-0xfe3fffff] Jul 16 12:40:49.898185 kernel: pci 0000:00:02.4: bridge window [mem 0xfc600000-0xfc7fffff 64bit pref] Jul 16 12:40:49.898278 kernel: pci 0000:00:02.5: PCI bridge to [bus 07] Jul 16 12:40:49.898364 kernel: pci 0000:00:02.5: bridge window [mem 0xfe000000-0xfe1fffff] Jul 16 12:40:49.898448 kernel: pci 0000:00:02.5: bridge window [mem 0xfc400000-0xfc5fffff 64bit pref] Jul 16 12:40:49.898534 kernel: pci 0000:00:02.6: PCI bridge to [bus 08] Jul 16 12:40:49.898626 kernel: pci 0000:00:02.6: bridge window [mem 0xfde00000-0xfdffffff] Jul 16 12:40:49.898714 kernel: pci 0000:00:02.6: bridge window [mem 0xfc200000-0xfc3fffff 64bit pref] Jul 16 12:40:49.898800 kernel: pci 0000:00:02.7: PCI bridge to [bus 09] Jul 16 12:40:49.898885 kernel: pci 0000:00:02.7: bridge window [mem 0xfdc00000-0xfddfffff] Jul 16 12:40:49.898971 kernel: pci 0000:00:02.7: bridge window [mem 0xfc000000-0xfc1fffff 64bit pref] Jul 16 12:40:49.898983 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Jul 16 12:40:49.898993 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Jul 16 12:40:49.899002 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Jul 16 12:40:49.899012 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Jul 16 12:40:49.899024 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 Jul 16 12:40:49.899033 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 Jul 16 12:40:49.899043 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Jul 16 12:40:49.899052 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Jul 16 12:40:49.899061 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 Jul 16 12:40:49.899071 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 Jul 16 12:40:49.899080 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 Jul 16 12:40:49.899089 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 Jul 16 12:40:49.899098 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 Jul 16 12:40:49.899110 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 Jul 16 12:40:49.899119 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 Jul 16 12:40:49.899128 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 Jul 16 12:40:49.899137 kernel: iommu: Default domain type: Translated Jul 16 12:40:49.899146 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Jul 16 12:40:49.899234 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Jul 16 12:40:49.899326 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Jul 16 12:40:49.899411 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Jul 16 12:40:49.899425 kernel: vgaarb: loaded Jul 16 12:40:49.899435 kernel: pps_core: LinuxPPS API ver. 1 registered Jul 16 12:40:49.899444 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Jul 16 12:40:49.899453 kernel: PTP clock support registered Jul 16 12:40:49.899462 kernel: PCI: Using ACPI for IRQ routing Jul 16 12:40:49.899472 kernel: PCI: pci_cache_line_size set to 64 bytes Jul 16 12:40:49.899481 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Jul 16 12:40:49.899490 kernel: e820: reserve RAM buffer [mem 0x7ffdc000-0x7fffffff] Jul 16 12:40:49.899499 kernel: clocksource: Switched to clocksource kvm-clock Jul 16 12:40:49.899510 kernel: VFS: Disk quotas dquot_6.6.0 Jul 16 12:40:49.899520 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jul 16 12:40:49.899529 kernel: pnp: PnP ACPI init Jul 16 12:40:49.899628 kernel: system 00:04: [mem 0xb0000000-0xbfffffff window] has been reserved Jul 16 12:40:49.899642 kernel: pnp: PnP ACPI: found 5 devices Jul 16 12:40:49.899651 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Jul 16 12:40:49.899661 kernel: NET: Registered PF_INET protocol family Jul 16 12:40:49.899670 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Jul 16 12:40:49.899682 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Jul 16 12:40:49.899692 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jul 16 12:40:49.899701 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Jul 16 12:40:49.899710 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Jul 16 12:40:49.899720 kernel: TCP: Hash tables configured (established 16384 bind 16384) Jul 16 12:40:49.899729 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Jul 16 12:40:49.899739 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Jul 16 12:40:49.899748 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jul 16 12:40:49.899757 kernel: NET: Registered PF_XDP protocol family Jul 16 12:40:49.899847 kernel: pci 0000:00:02.0: bridge window [io 0x1000-0x0fff] to [bus 01-02] add_size 1000 Jul 16 12:40:49.899932 kernel: pci 0000:00:02.1: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 Jul 16 12:40:49.900019 kernel: pci 0000:00:02.2: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 Jul 16 12:40:49.900111 kernel: pci 0000:00:02.3: bridge window [io 0x1000-0x0fff] to [bus 05] add_size 1000 Jul 16 12:40:49.900198 kernel: pci 0000:00:02.4: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 Jul 16 12:40:49.900291 kernel: pci 0000:00:02.5: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 Jul 16 12:40:49.900380 kernel: pci 0000:00:02.6: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 Jul 16 12:40:49.900465 kernel: pci 0000:00:02.7: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 Jul 16 12:40:49.900550 kernel: pci 0000:00:02.0: BAR 13: assigned [io 0x1000-0x1fff] Jul 16 12:40:49.900643 kernel: pci 0000:00:02.1: BAR 13: assigned [io 0x2000-0x2fff] Jul 16 12:40:49.900730 kernel: pci 0000:00:02.2: BAR 13: assigned [io 0x3000-0x3fff] Jul 16 12:40:49.900815 kernel: pci 0000:00:02.3: BAR 13: assigned [io 0x4000-0x4fff] Jul 16 12:40:49.900899 kernel: pci 0000:00:02.4: BAR 13: assigned [io 0x5000-0x5fff] Jul 16 12:40:49.901003 kernel: pci 0000:00:02.5: BAR 13: assigned [io 0x6000-0x6fff] Jul 16 12:40:49.901092 kernel: pci 0000:00:02.6: BAR 13: assigned [io 0x7000-0x7fff] Jul 16 12:40:49.901177 kernel: pci 0000:00:02.7: BAR 13: assigned [io 0x8000-0x8fff] Jul 16 12:40:49.901274 kernel: pci 0000:01:00.0: PCI bridge to [bus 02] Jul 16 12:40:49.901364 kernel: pci 0000:01:00.0: bridge window [mem 0xfd800000-0xfd9fffff] Jul 16 12:40:49.901451 kernel: pci 0000:00:02.0: PCI bridge to [bus 01-02] Jul 16 12:40:49.901535 kernel: pci 0000:00:02.0: bridge window [io 0x1000-0x1fff] Jul 16 12:40:49.901628 kernel: pci 0000:00:02.0: bridge window [mem 0xfd800000-0xfdbfffff] Jul 16 12:40:49.901715 kernel: pci 0000:00:02.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Jul 16 12:40:49.901804 kernel: pci 0000:00:02.1: PCI bridge to [bus 03] Jul 16 12:40:49.901889 kernel: pci 0000:00:02.1: bridge window [io 0x2000-0x2fff] Jul 16 12:40:49.901974 kernel: pci 0000:00:02.1: bridge window [mem 0xfe800000-0xfe9fffff] Jul 16 12:40:49.902059 kernel: pci 0000:00:02.1: bridge window [mem 0xfcc00000-0xfcdfffff 64bit pref] Jul 16 12:40:49.902143 kernel: pci 0000:00:02.2: PCI bridge to [bus 04] Jul 16 12:40:49.902231 kernel: pci 0000:00:02.2: bridge window [io 0x3000-0x3fff] Jul 16 12:40:49.902325 kernel: pci 0000:00:02.2: bridge window [mem 0xfe600000-0xfe7fffff] Jul 16 12:40:49.902411 kernel: pci 0000:00:02.2: bridge window [mem 0xfca00000-0xfcbfffff 64bit pref] Jul 16 12:40:49.902497 kernel: pci 0000:00:02.3: PCI bridge to [bus 05] Jul 16 12:40:49.902583 kernel: pci 0000:00:02.3: bridge window [io 0x4000-0x4fff] Jul 16 12:40:49.910742 kernel: pci 0000:00:02.3: bridge window [mem 0xfe400000-0xfe5fffff] Jul 16 12:40:49.910846 kernel: pci 0000:00:02.3: bridge window [mem 0xfc800000-0xfc9fffff 64bit pref] Jul 16 12:40:49.910937 kernel: pci 0000:00:02.4: PCI bridge to [bus 06] Jul 16 12:40:49.911024 kernel: pci 0000:00:02.4: bridge window [io 0x5000-0x5fff] Jul 16 12:40:49.911117 kernel: pci 0000:00:02.4: bridge window [mem 0xfe200000-0xfe3fffff] Jul 16 12:40:49.911203 kernel: pci 0000:00:02.4: bridge window [mem 0xfc600000-0xfc7fffff 64bit pref] Jul 16 12:40:49.911297 kernel: pci 0000:00:02.5: PCI bridge to [bus 07] Jul 16 12:40:49.911382 kernel: pci 0000:00:02.5: bridge window [io 0x6000-0x6fff] Jul 16 12:40:49.911468 kernel: pci 0000:00:02.5: bridge window [mem 0xfe000000-0xfe1fffff] Jul 16 12:40:49.911553 kernel: pci 0000:00:02.5: bridge window [mem 0xfc400000-0xfc5fffff 64bit pref] Jul 16 12:40:49.911659 kernel: pci 0000:00:02.6: PCI bridge to [bus 08] Jul 16 12:40:49.911750 kernel: pci 0000:00:02.6: bridge window [io 0x7000-0x7fff] Jul 16 12:40:49.911837 kernel: pci 0000:00:02.6: bridge window [mem 0xfde00000-0xfdffffff] Jul 16 12:40:49.911921 kernel: pci 0000:00:02.6: bridge window [mem 0xfc200000-0xfc3fffff 64bit pref] Jul 16 12:40:49.912007 kernel: pci 0000:00:02.7: PCI bridge to [bus 09] Jul 16 12:40:49.912093 kernel: pci 0000:00:02.7: bridge window [io 0x8000-0x8fff] Jul 16 12:40:49.912177 kernel: pci 0000:00:02.7: bridge window [mem 0xfdc00000-0xfddfffff] Jul 16 12:40:49.912270 kernel: pci 0000:00:02.7: bridge window [mem 0xfc000000-0xfc1fffff 64bit pref] Jul 16 12:40:49.912356 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Jul 16 12:40:49.912435 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Jul 16 12:40:49.912511 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Jul 16 12:40:49.912587 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xafffffff window] Jul 16 12:40:49.912675 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Jul 16 12:40:49.912752 kernel: pci_bus 0000:00: resource 9 [mem 0x20c0000000-0x28bfffffff window] Jul 16 12:40:49.912844 kernel: pci_bus 0000:01: resource 0 [io 0x1000-0x1fff] Jul 16 12:40:49.912930 kernel: pci_bus 0000:01: resource 1 [mem 0xfd800000-0xfdbfffff] Jul 16 12:40:49.913023 kernel: pci_bus 0000:01: resource 2 [mem 0xfce00000-0xfcffffff 64bit pref] Jul 16 12:40:49.913117 kernel: pci_bus 0000:02: resource 1 [mem 0xfd800000-0xfd9fffff] Jul 16 12:40:49.913207 kernel: pci_bus 0000:03: resource 0 [io 0x2000-0x2fff] Jul 16 12:40:49.913296 kernel: pci_bus 0000:03: resource 1 [mem 0xfe800000-0xfe9fffff] Jul 16 12:40:49.913377 kernel: pci_bus 0000:03: resource 2 [mem 0xfcc00000-0xfcdfffff 64bit pref] Jul 16 12:40:49.913472 kernel: pci_bus 0000:04: resource 0 [io 0x3000-0x3fff] Jul 16 12:40:49.913558 kernel: pci_bus 0000:04: resource 1 [mem 0xfe600000-0xfe7fffff] Jul 16 12:40:49.913650 kernel: pci_bus 0000:04: resource 2 [mem 0xfca00000-0xfcbfffff 64bit pref] Jul 16 12:40:49.913738 kernel: pci_bus 0000:05: resource 0 [io 0x4000-0x4fff] Jul 16 12:40:49.913819 kernel: pci_bus 0000:05: resource 1 [mem 0xfe400000-0xfe5fffff] Jul 16 12:40:49.913900 kernel: pci_bus 0000:05: resource 2 [mem 0xfc800000-0xfc9fffff 64bit pref] Jul 16 12:40:49.913986 kernel: pci_bus 0000:06: resource 0 [io 0x5000-0x5fff] Jul 16 12:40:49.914068 kernel: pci_bus 0000:06: resource 1 [mem 0xfe200000-0xfe3fffff] Jul 16 12:40:49.914154 kernel: pci_bus 0000:06: resource 2 [mem 0xfc600000-0xfc7fffff 64bit pref] Jul 16 12:40:49.914241 kernel: pci_bus 0000:07: resource 0 [io 0x6000-0x6fff] Jul 16 12:40:49.914332 kernel: pci_bus 0000:07: resource 1 [mem 0xfe000000-0xfe1fffff] Jul 16 12:40:49.914413 kernel: pci_bus 0000:07: resource 2 [mem 0xfc400000-0xfc5fffff 64bit pref] Jul 16 12:40:49.914501 kernel: pci_bus 0000:08: resource 0 [io 0x7000-0x7fff] Jul 16 12:40:49.914581 kernel: pci_bus 0000:08: resource 1 [mem 0xfde00000-0xfdffffff] Jul 16 12:40:49.914674 kernel: pci_bus 0000:08: resource 2 [mem 0xfc200000-0xfc3fffff 64bit pref] Jul 16 12:40:49.914766 kernel: pci_bus 0000:09: resource 0 [io 0x8000-0x8fff] Jul 16 12:40:49.914848 kernel: pci_bus 0000:09: resource 1 [mem 0xfdc00000-0xfddfffff] Jul 16 12:40:49.914929 kernel: pci_bus 0000:09: resource 2 [mem 0xfc000000-0xfc1fffff 64bit pref] Jul 16 12:40:49.914942 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 Jul 16 12:40:49.914953 kernel: PCI: CLS 0 bytes, default 64 Jul 16 12:40:49.914963 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Jul 16 12:40:49.914973 kernel: software IO TLB: mapped [mem 0x0000000079800000-0x000000007d800000] (64MB) Jul 16 12:40:49.914983 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Jul 16 12:40:49.914996 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x2113312ac93, max_idle_ns: 440795244843 ns Jul 16 12:40:49.915006 kernel: Initialise system trusted keyrings Jul 16 12:40:49.915016 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Jul 16 12:40:49.915026 kernel: Key type asymmetric registered Jul 16 12:40:49.915036 kernel: Asymmetric key parser 'x509' registered Jul 16 12:40:49.915045 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Jul 16 12:40:49.915055 kernel: io scheduler mq-deadline registered Jul 16 12:40:49.915065 kernel: io scheduler kyber registered Jul 16 12:40:49.915075 kernel: io scheduler bfq registered Jul 16 12:40:49.915166 kernel: pcieport 0000:00:02.0: PME: Signaling with IRQ 24 Jul 16 12:40:49.915261 kernel: pcieport 0000:00:02.0: AER: enabled with IRQ 24 Jul 16 12:40:49.915348 kernel: pcieport 0000:00:02.0: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Jul 16 12:40:49.915436 kernel: pcieport 0000:00:02.1: PME: Signaling with IRQ 25 Jul 16 12:40:49.915524 kernel: pcieport 0000:00:02.1: AER: enabled with IRQ 25 Jul 16 12:40:49.923649 kernel: pcieport 0000:00:02.1: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Jul 16 12:40:49.923770 kernel: pcieport 0000:00:02.2: PME: Signaling with IRQ 26 Jul 16 12:40:49.923863 kernel: pcieport 0000:00:02.2: AER: enabled with IRQ 26 Jul 16 12:40:49.923951 kernel: pcieport 0000:00:02.2: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Jul 16 12:40:49.924039 kernel: pcieport 0000:00:02.3: PME: Signaling with IRQ 27 Jul 16 12:40:49.924126 kernel: pcieport 0000:00:02.3: AER: enabled with IRQ 27 Jul 16 12:40:49.924213 kernel: pcieport 0000:00:02.3: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Jul 16 12:40:49.924312 kernel: pcieport 0000:00:02.4: PME: Signaling with IRQ 28 Jul 16 12:40:49.924397 kernel: pcieport 0000:00:02.4: AER: enabled with IRQ 28 Jul 16 12:40:49.924482 kernel: pcieport 0000:00:02.4: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Jul 16 12:40:49.924568 kernel: pcieport 0000:00:02.5: PME: Signaling with IRQ 29 Jul 16 12:40:49.924662 kernel: pcieport 0000:00:02.5: AER: enabled with IRQ 29 Jul 16 12:40:49.924747 kernel: pcieport 0000:00:02.5: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Jul 16 12:40:49.924837 kernel: pcieport 0000:00:02.6: PME: Signaling with IRQ 30 Jul 16 12:40:49.924923 kernel: pcieport 0000:00:02.6: AER: enabled with IRQ 30 Jul 16 12:40:49.925008 kernel: pcieport 0000:00:02.6: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Jul 16 12:40:49.925094 kernel: pcieport 0000:00:02.7: PME: Signaling with IRQ 31 Jul 16 12:40:49.925179 kernel: pcieport 0000:00:02.7: AER: enabled with IRQ 31 Jul 16 12:40:49.925270 kernel: pcieport 0000:00:02.7: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Jul 16 12:40:49.925286 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Jul 16 12:40:49.925297 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 Jul 16 12:40:49.925310 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 Jul 16 12:40:49.925320 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jul 16 12:40:49.925330 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Jul 16 12:40:49.925340 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Jul 16 12:40:49.925351 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Jul 16 12:40:49.925361 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Jul 16 12:40:49.925370 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Jul 16 12:40:49.925472 kernel: rtc_cmos 00:03: RTC can wake from S4 Jul 16 12:40:49.925554 kernel: rtc_cmos 00:03: registered as rtc0 Jul 16 12:40:49.925641 kernel: rtc_cmos 00:03: setting system clock to 2025-07-16T12:40:49 UTC (1752669649) Jul 16 12:40:49.925719 kernel: rtc_cmos 00:03: alarms up to one day, y3k, 242 bytes nvram Jul 16 12:40:49.925732 kernel: intel_pstate: CPU model not supported Jul 16 12:40:49.925742 kernel: NET: Registered PF_INET6 protocol family Jul 16 12:40:49.925752 kernel: Segment Routing with IPv6 Jul 16 12:40:49.925762 kernel: In-situ OAM (IOAM) with IPv6 Jul 16 12:40:49.925775 kernel: NET: Registered PF_PACKET protocol family Jul 16 12:40:49.925785 kernel: Key type dns_resolver registered Jul 16 12:40:49.925795 kernel: IPI shorthand broadcast: enabled Jul 16 12:40:49.925805 kernel: sched_clock: Marking stable (756110318, 119982197)->(1087962985, -211870470) Jul 16 12:40:49.925816 kernel: registered taskstats version 1 Jul 16 12:40:49.925825 kernel: Loading compiled-in X.509 certificates Jul 16 12:40:49.925836 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.188-flatcar: c4b3a19d3bd6de5654dc12075428550cf6251289' Jul 16 12:40:49.925845 kernel: Key type .fscrypt registered Jul 16 12:40:49.925855 kernel: Key type fscrypt-provisioning registered Jul 16 12:40:49.925868 kernel: ima: No TPM chip found, activating TPM-bypass! Jul 16 12:40:49.925878 kernel: ima: Allocated hash algorithm: sha1 Jul 16 12:40:49.925888 kernel: ima: No architecture policies found Jul 16 12:40:49.925898 kernel: clk: Disabling unused clocks Jul 16 12:40:49.925908 kernel: Freeing unused kernel image (initmem) memory: 47476K Jul 16 12:40:49.925918 kernel: Write protecting the kernel read-only data: 28672k Jul 16 12:40:49.925928 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Jul 16 12:40:49.925938 kernel: Freeing unused kernel image (rodata/data gap) memory: 604K Jul 16 12:40:49.925950 kernel: Run /init as init process Jul 16 12:40:49.925960 kernel: with arguments: Jul 16 12:40:49.925970 kernel: /init Jul 16 12:40:49.925979 kernel: with environment: Jul 16 12:40:49.925989 kernel: HOME=/ Jul 16 12:40:49.925998 kernel: TERM=linux Jul 16 12:40:49.926008 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Jul 16 12:40:49.926021 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 16 12:40:49.926036 systemd[1]: Detected virtualization kvm. Jul 16 12:40:49.926047 systemd[1]: Detected architecture x86-64. Jul 16 12:40:49.926057 systemd[1]: Running in initrd. Jul 16 12:40:49.926067 systemd[1]: No hostname configured, using default hostname. Jul 16 12:40:49.926077 systemd[1]: Hostname set to . Jul 16 12:40:49.926088 systemd[1]: Initializing machine ID from VM UUID. Jul 16 12:40:49.926098 systemd[1]: Queued start job for default target initrd.target. Jul 16 12:40:49.926109 systemd[1]: Started systemd-ask-password-console.path. Jul 16 12:40:49.926121 systemd[1]: Reached target cryptsetup.target. Jul 16 12:40:49.926131 systemd[1]: Reached target paths.target. Jul 16 12:40:49.926141 systemd[1]: Reached target slices.target. Jul 16 12:40:49.926151 systemd[1]: Reached target swap.target. Jul 16 12:40:49.926161 systemd[1]: Reached target timers.target. Jul 16 12:40:49.926172 systemd[1]: Listening on iscsid.socket. Jul 16 12:40:49.926182 systemd[1]: Listening on iscsiuio.socket. Jul 16 12:40:49.926193 systemd[1]: Listening on systemd-journald-audit.socket. Jul 16 12:40:49.926205 systemd[1]: Listening on systemd-journald-dev-log.socket. Jul 16 12:40:49.926216 systemd[1]: Listening on systemd-journald.socket. Jul 16 12:40:49.926226 systemd[1]: Listening on systemd-networkd.socket. Jul 16 12:40:49.926239 systemd[1]: Listening on systemd-udevd-control.socket. Jul 16 12:40:49.926257 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 16 12:40:49.926267 systemd[1]: Reached target sockets.target. Jul 16 12:40:49.926277 systemd[1]: Starting kmod-static-nodes.service... Jul 16 12:40:49.926288 systemd[1]: Finished network-cleanup.service. Jul 16 12:40:49.926298 systemd[1]: Starting systemd-fsck-usr.service... Jul 16 12:40:49.926310 systemd[1]: Starting systemd-journald.service... Jul 16 12:40:49.926321 systemd[1]: Starting systemd-modules-load.service... Jul 16 12:40:49.926332 systemd[1]: Starting systemd-resolved.service... Jul 16 12:40:49.926342 systemd[1]: Starting systemd-vconsole-setup.service... Jul 16 12:40:49.926352 systemd[1]: Finished kmod-static-nodes.service. Jul 16 12:40:49.926362 systemd[1]: Finished systemd-fsck-usr.service. Jul 16 12:40:49.926372 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 16 12:40:49.926388 systemd-journald[202]: Journal started Jul 16 12:40:49.926445 systemd-journald[202]: Runtime Journal (/run/log/journal/3703781f6a954fff83f072c708699217) is 4.7M, max 38.1M, 33.3M free. Jul 16 12:40:49.886665 systemd-modules-load[203]: Inserted module 'overlay' Jul 16 12:40:49.921107 systemd-resolved[204]: Positive Trust Anchors: Jul 16 12:40:49.937061 systemd[1]: Started systemd-journald.service. Jul 16 12:40:49.921120 systemd-resolved[204]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 16 12:40:49.921156 systemd-resolved[204]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 16 12:40:49.952189 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Jul 16 12:40:49.952212 kernel: audit: type=1130 audit(1752669649.940:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:49.952226 kernel: audit: type=1130 audit(1752669649.943:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:49.952239 kernel: Bridge firewalling registered Jul 16 12:40:49.952265 kernel: audit: type=1130 audit(1752669649.947:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:49.940000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:49.943000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:49.947000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:49.927317 systemd-resolved[204]: Defaulting to hostname 'linux'. Jul 16 12:40:49.944093 systemd[1]: Started systemd-resolved.service. Jul 16 12:40:49.947338 systemd[1]: Finished systemd-vconsole-setup.service. Jul 16 12:40:49.947893 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 16 12:40:49.951296 systemd-modules-load[203]: Inserted module 'br_netfilter' Jul 16 12:40:49.953041 systemd[1]: Reached target nss-lookup.target. Jul 16 12:40:49.955307 systemd[1]: Starting dracut-cmdline-ask.service... Jul 16 12:40:49.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:49.960646 kernel: audit: type=1130 audit(1752669649.952:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:49.972626 kernel: SCSI subsystem initialized Jul 16 12:40:49.982565 systemd[1]: Finished dracut-cmdline-ask.service. Jul 16 12:40:49.993547 kernel: audit: type=1130 audit(1752669649.982:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:49.993576 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jul 16 12:40:49.993591 kernel: device-mapper: uevent: version 1.0.3 Jul 16 12:40:49.993615 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Jul 16 12:40:49.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:49.983862 systemd[1]: Starting dracut-cmdline.service... Jul 16 12:40:49.995079 systemd-modules-load[203]: Inserted module 'dm_multipath' Jul 16 12:40:49.995918 systemd[1]: Finished systemd-modules-load.service. Jul 16 12:40:49.996000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:49.999796 systemd[1]: Starting systemd-sysctl.service... Jul 16 12:40:50.009853 kernel: audit: type=1130 audit(1752669649.996:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:50.009884 dracut-cmdline[219]: dracut-dracut-053 Jul 16 12:40:50.009884 dracut-cmdline[219]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=3fdbb2e3469f90ee764ea38c6fc4332d45967696e3c4fd4a8c65f8d0125b235b Jul 16 12:40:50.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:50.016299 systemd[1]: Finished systemd-sysctl.service. Jul 16 12:40:50.019783 kernel: audit: type=1130 audit(1752669650.016:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:50.101687 kernel: Loading iSCSI transport class v2.0-870. Jul 16 12:40:50.120654 kernel: iscsi: registered transport (tcp) Jul 16 12:40:50.149659 kernel: iscsi: registered transport (qla4xxx) Jul 16 12:40:50.149789 kernel: QLogic iSCSI HBA Driver Jul 16 12:40:50.221760 systemd[1]: Finished dracut-cmdline.service. Jul 16 12:40:50.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:50.224161 systemd[1]: Starting dracut-pre-udev.service... Jul 16 12:40:50.230785 kernel: audit: type=1130 audit(1752669650.221:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:50.285685 kernel: raid6: avx512x4 gen() 17712 MB/s Jul 16 12:40:50.302712 kernel: raid6: avx512x4 xor() 7596 MB/s Jul 16 12:40:50.319694 kernel: raid6: avx512x2 gen() 17888 MB/s Jul 16 12:40:50.336675 kernel: raid6: avx512x2 xor() 21619 MB/s Jul 16 12:40:50.353654 kernel: raid6: avx512x1 gen() 17840 MB/s Jul 16 12:40:50.370702 kernel: raid6: avx512x1 xor() 19606 MB/s Jul 16 12:40:50.387662 kernel: raid6: avx2x4 gen() 17753 MB/s Jul 16 12:40:50.404656 kernel: raid6: avx2x4 xor() 6964 MB/s Jul 16 12:40:50.421684 kernel: raid6: avx2x2 gen() 17764 MB/s Jul 16 12:40:50.438676 kernel: raid6: avx2x2 xor() 15851 MB/s Jul 16 12:40:50.455693 kernel: raid6: avx2x1 gen() 13778 MB/s Jul 16 12:40:50.472687 kernel: raid6: avx2x1 xor() 13765 MB/s Jul 16 12:40:50.489685 kernel: raid6: sse2x4 gen() 8210 MB/s Jul 16 12:40:50.506686 kernel: raid6: sse2x4 xor() 5442 MB/s Jul 16 12:40:50.523687 kernel: raid6: sse2x2 gen() 9001 MB/s Jul 16 12:40:50.540707 kernel: raid6: sse2x2 xor() 5226 MB/s Jul 16 12:40:50.557739 kernel: raid6: sse2x1 gen() 8216 MB/s Jul 16 12:40:50.575277 kernel: raid6: sse2x1 xor() 4137 MB/s Jul 16 12:40:50.575391 kernel: raid6: using algorithm avx512x2 gen() 17888 MB/s Jul 16 12:40:50.575429 kernel: raid6: .... xor() 21619 MB/s, rmw enabled Jul 16 12:40:50.575982 kernel: raid6: using avx512x2 recovery algorithm Jul 16 12:40:50.590659 kernel: xor: automatically using best checksumming function avx Jul 16 12:40:50.693656 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Jul 16 12:40:50.708450 systemd[1]: Finished dracut-pre-udev.service. Jul 16 12:40:50.710085 systemd[1]: Starting systemd-udevd.service... Jul 16 12:40:50.719424 kernel: audit: type=1130 audit(1752669650.708:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:50.708000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:50.708000 audit: BPF prog-id=7 op=LOAD Jul 16 12:40:50.708000 audit: BPF prog-id=8 op=LOAD Jul 16 12:40:50.730697 systemd-udevd[401]: Using default interface naming scheme 'v252'. Jul 16 12:40:50.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:50.736326 systemd[1]: Started systemd-udevd.service. Jul 16 12:40:50.739241 systemd[1]: Starting dracut-pre-trigger.service... Jul 16 12:40:50.756505 dracut-pre-trigger[412]: rd.md=0: removing MD RAID activation Jul 16 12:40:50.795420 systemd[1]: Finished dracut-pre-trigger.service. Jul 16 12:40:50.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:50.796667 systemd[1]: Starting systemd-udev-trigger.service... Jul 16 12:40:50.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:50.852459 systemd[1]: Finished systemd-udev-trigger.service. Jul 16 12:40:50.942622 kernel: cryptd: max_cpu_qlen set to 1000 Jul 16 12:40:50.947619 kernel: virtio_blk virtio1: [vda] 125829120 512-byte logical blocks (64.4 GB/60.0 GiB) Jul 16 12:40:50.976820 kernel: AVX2 version of gcm_enc/dec engaged. Jul 16 12:40:50.976841 kernel: AES CTR mode by8 optimization enabled Jul 16 12:40:50.976854 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Jul 16 12:40:50.976873 kernel: GPT:17805311 != 125829119 Jul 16 12:40:50.976884 kernel: GPT:Alternate GPT header not at the end of the disk. Jul 16 12:40:50.976896 kernel: GPT:17805311 != 125829119 Jul 16 12:40:50.976907 kernel: GPT: Use GNU Parted to correct GPT errors. Jul 16 12:40:50.976918 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 16 12:40:50.992725 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Jul 16 12:40:51.048887 kernel: libata version 3.00 loaded. Jul 16 12:40:51.048926 kernel: ACPI: bus type USB registered Jul 16 12:40:51.048950 kernel: usbcore: registered new interface driver usbfs Jul 16 12:40:51.048967 kernel: usbcore: registered new interface driver hub Jul 16 12:40:51.048983 kernel: usbcore: registered new device driver usb Jul 16 12:40:51.048999 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/vda6 scanned by (udev-worker) (452) Jul 16 12:40:51.049014 kernel: ahci 0000:00:1f.2: version 3.0 Jul 16 12:40:51.081530 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 Jul 16 12:40:51.081552 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Jul 16 12:40:51.081684 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Jul 16 12:40:51.081790 kernel: scsi host0: ahci Jul 16 12:40:51.081901 kernel: xhci_hcd 0000:03:00.0: xHCI Host Controller Jul 16 12:40:51.082019 kernel: xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 1 Jul 16 12:40:51.082115 kernel: xhci_hcd 0000:03:00.0: hcc params 0x00087001 hci version 0x100 quirks 0x0000000000000010 Jul 16 12:40:51.082217 kernel: xhci_hcd 0000:03:00.0: xHCI Host Controller Jul 16 12:40:51.082313 kernel: xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 2 Jul 16 12:40:51.082408 kernel: xhci_hcd 0000:03:00.0: Host supports USB 3.0 SuperSpeed Jul 16 12:40:51.082505 kernel: hub 1-0:1.0: USB hub found Jul 16 12:40:51.082639 kernel: hub 1-0:1.0: 4 ports detected Jul 16 12:40:51.082750 kernel: usb usb2: We don't know the algorithms for LPM for this host, disabling LPM. Jul 16 12:40:51.082938 kernel: scsi host1: ahci Jul 16 12:40:51.083061 kernel: hub 2-0:1.0: USB hub found Jul 16 12:40:51.083183 kernel: hub 2-0:1.0: 4 ports detected Jul 16 12:40:51.083293 kernel: scsi host2: ahci Jul 16 12:40:51.083397 kernel: scsi host3: ahci Jul 16 12:40:51.083497 kernel: scsi host4: ahci Jul 16 12:40:51.083608 kernel: scsi host5: ahci Jul 16 12:40:51.083715 kernel: ata1: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b100 irq 38 Jul 16 12:40:51.083730 kernel: ata2: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b180 irq 38 Jul 16 12:40:51.083742 kernel: ata3: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b200 irq 38 Jul 16 12:40:51.083757 kernel: ata4: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b280 irq 38 Jul 16 12:40:51.083769 kernel: ata5: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b300 irq 38 Jul 16 12:40:51.083781 kernel: ata6: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b380 irq 38 Jul 16 12:40:51.064053 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Jul 16 12:40:51.073856 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Jul 16 12:40:51.078712 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Jul 16 12:40:51.089965 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 16 12:40:51.091355 systemd[1]: Starting disk-uuid.service... Jul 16 12:40:51.099622 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 16 12:40:51.101702 disk-uuid[537]: Primary Header is updated. Jul 16 12:40:51.101702 disk-uuid[537]: Secondary Entries is updated. Jul 16 12:40:51.101702 disk-uuid[537]: Secondary Header is updated. Jul 16 12:40:51.292728 kernel: usb 1-1: new high-speed USB device number 2 using xhci_hcd Jul 16 12:40:51.393657 kernel: ata1: SATA link down (SStatus 0 SControl 300) Jul 16 12:40:51.393805 kernel: ata3: SATA link down (SStatus 0 SControl 300) Jul 16 12:40:51.403775 kernel: ata4: SATA link down (SStatus 0 SControl 300) Jul 16 12:40:51.404046 kernel: ata2: SATA link down (SStatus 0 SControl 300) Jul 16 12:40:51.406934 kernel: ata5: SATA link down (SStatus 0 SControl 300) Jul 16 12:40:51.408880 kernel: ata6: SATA link down (SStatus 0 SControl 300) Jul 16 12:40:51.431626 kernel: hid: raw HID events driver (C) Jiri Kosina Jul 16 12:40:51.437034 kernel: usbcore: registered new interface driver usbhid Jul 16 12:40:51.437077 kernel: usbhid: USB HID core driver Jul 16 12:40:51.443392 kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:02.1/0000:03:00.0/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input2 Jul 16 12:40:51.443433 kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:03:00.0-1/input0 Jul 16 12:40:52.118650 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 16 12:40:52.119137 disk-uuid[538]: The operation has completed successfully. Jul 16 12:40:52.171450 systemd[1]: disk-uuid.service: Deactivated successfully. Jul 16 12:40:52.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:52.171000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:52.171629 systemd[1]: Finished disk-uuid.service. Jul 16 12:40:52.183631 systemd[1]: Starting verity-setup.service... Jul 16 12:40:52.204780 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Jul 16 12:40:52.257251 systemd[1]: Found device dev-mapper-usr.device. Jul 16 12:40:52.259866 systemd[1]: Mounting sysusr-usr.mount... Jul 16 12:40:52.262930 systemd[1]: Finished verity-setup.service. Jul 16 12:40:52.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:52.347654 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 16 12:40:52.349207 systemd[1]: Mounted sysusr-usr.mount. Jul 16 12:40:52.349959 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Jul 16 12:40:52.351024 systemd[1]: Starting ignition-setup.service... Jul 16 12:40:52.352549 systemd[1]: Starting parse-ip-for-networkd.service... Jul 16 12:40:52.383835 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Jul 16 12:40:52.383916 kernel: BTRFS info (device vda6): using free space tree Jul 16 12:40:52.383940 kernel: BTRFS info (device vda6): has skinny extents Jul 16 12:40:52.398133 systemd[1]: mnt-oem.mount: Deactivated successfully. Jul 16 12:40:52.403721 systemd[1]: Finished ignition-setup.service. Jul 16 12:40:52.403000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:52.405199 systemd[1]: Starting ignition-fetch-offline.service... Jul 16 12:40:52.512755 systemd[1]: Finished parse-ip-for-networkd.service. Jul 16 12:40:52.512000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:52.513000 audit: BPF prog-id=9 op=LOAD Jul 16 12:40:52.515287 systemd[1]: Starting systemd-networkd.service... Jul 16 12:40:52.547669 ignition[628]: Ignition 2.14.0 Jul 16 12:40:52.547685 ignition[628]: Stage: fetch-offline Jul 16 12:40:52.547765 ignition[628]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 16 12:40:52.547805 ignition[628]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Jul 16 12:40:52.551514 ignition[628]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Jul 16 12:40:52.551679 ignition[628]: parsed url from cmdline: "" Jul 16 12:40:52.551686 ignition[628]: no config URL provided Jul 16 12:40:52.551694 ignition[628]: reading system config file "/usr/lib/ignition/user.ign" Jul 16 12:40:52.551703 ignition[628]: no config at "/usr/lib/ignition/user.ign" Jul 16 12:40:52.552891 systemd[1]: Finished ignition-fetch-offline.service. Jul 16 12:40:52.551712 ignition[628]: failed to fetch config: resource requires networking Jul 16 12:40:52.551996 ignition[628]: Ignition finished successfully Jul 16 12:40:52.554361 systemd-networkd[712]: lo: Link UP Jul 16 12:40:52.554369 systemd-networkd[712]: lo: Gained carrier Jul 16 12:40:52.554981 systemd-networkd[712]: Enumeration completed Jul 16 12:40:52.555330 systemd-networkd[712]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 16 12:40:52.556587 systemd-networkd[712]: eth0: Link UP Jul 16 12:40:52.556602 systemd-networkd[712]: eth0: Gained carrier Jul 16 12:40:52.559094 systemd[1]: Started systemd-networkd.service. Jul 16 12:40:52.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:52.559000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:52.559738 systemd[1]: Reached target network.target. Jul 16 12:40:52.561529 systemd[1]: Starting ignition-fetch.service... Jul 16 12:40:52.563238 systemd[1]: Starting iscsiuio.service... Jul 16 12:40:52.574861 ignition[714]: Ignition 2.14.0 Jul 16 12:40:52.575472 ignition[714]: Stage: fetch Jul 16 12:40:52.575974 ignition[714]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 16 12:40:52.576518 ignition[714]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Jul 16 12:40:52.577379 systemd[1]: Started iscsiuio.service. Jul 16 12:40:52.578127 ignition[714]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Jul 16 12:40:52.578697 systemd[1]: Starting iscsid.service... Jul 16 12:40:52.577000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:52.578787 ignition[714]: parsed url from cmdline: "" Jul 16 12:40:52.578792 ignition[714]: no config URL provided Jul 16 12:40:52.578798 ignition[714]: reading system config file "/usr/lib/ignition/user.ign" Jul 16 12:40:52.578807 ignition[714]: no config at "/usr/lib/ignition/user.ign" Jul 16 12:40:52.584537 ignition[714]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... Jul 16 12:40:52.584839 ignition[714]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... Jul 16 12:40:52.585839 ignition[714]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 Jul 16 12:40:52.587317 iscsid[722]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Jul 16 12:40:52.587317 iscsid[722]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Jul 16 12:40:52.587317 iscsid[722]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Jul 16 12:40:52.587317 iscsid[722]: If using hardware iscsi like qla4xxx this message can be ignored. Jul 16 12:40:52.587317 iscsid[722]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Jul 16 12:40:52.587317 iscsid[722]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Jul 16 12:40:52.592000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:52.590112 ignition[714]: GET error: Get "http://169.254.169.254/openstack/latest/user_data": dial tcp 169.254.169.254:80: connect: network is unreachable Jul 16 12:40:52.591139 systemd[1]: Started iscsid.service. Jul 16 12:40:52.594015 systemd[1]: Starting dracut-initqueue.service... Jul 16 12:40:52.618415 systemd[1]: Finished dracut-initqueue.service. Jul 16 12:40:52.618000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:52.619750 systemd[1]: Reached target remote-fs-pre.target. Jul 16 12:40:52.621799 systemd[1]: Reached target remote-cryptsetup.target. Jul 16 12:40:52.622891 systemd[1]: Reached target remote-fs.target. Jul 16 12:40:52.626346 systemd[1]: Starting dracut-pre-mount.service... Jul 16 12:40:52.631759 systemd-networkd[712]: eth0: DHCPv4 address 10.244.102.154/30, gateway 10.244.102.153 acquired from 10.244.102.153 Jul 16 12:40:52.640000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:52.640894 systemd[1]: Finished dracut-pre-mount.service. Jul 16 12:40:52.790832 ignition[714]: GET http://169.254.169.254/openstack/latest/user_data: attempt #2 Jul 16 12:40:52.811821 ignition[714]: GET result: OK Jul 16 12:40:52.812900 ignition[714]: parsing config with SHA512: 07c1ad6807a69e676758b361cf9ce24e83cd47b51e5316e0fd271d82511cb1d67f0ab7dfc78e41197ad5913b2f039bdcf23ebcda34e542e8244daffb44a388d5 Jul 16 12:40:52.824418 unknown[714]: fetched base config from "system" Jul 16 12:40:52.824445 unknown[714]: fetched base config from "system" Jul 16 12:40:52.824883 ignition[714]: fetch: fetch complete Jul 16 12:40:52.824454 unknown[714]: fetched user config from "openstack" Jul 16 12:40:52.824890 ignition[714]: fetch: fetch passed Jul 16 12:40:52.824941 ignition[714]: Ignition finished successfully Jul 16 12:40:52.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:52.826836 systemd[1]: Finished ignition-fetch.service. Jul 16 12:40:52.828638 systemd[1]: Starting ignition-kargs.service... Jul 16 12:40:52.839785 ignition[737]: Ignition 2.14.0 Jul 16 12:40:52.839796 ignition[737]: Stage: kargs Jul 16 12:40:52.839923 ignition[737]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 16 12:40:52.839941 ignition[737]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Jul 16 12:40:52.840943 ignition[737]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Jul 16 12:40:52.841863 ignition[737]: kargs: kargs passed Jul 16 12:40:52.841920 ignition[737]: Ignition finished successfully Jul 16 12:40:52.843000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:52.843520 systemd[1]: Finished ignition-kargs.service. Jul 16 12:40:52.844893 systemd[1]: Starting ignition-disks.service... Jul 16 12:40:52.853120 ignition[742]: Ignition 2.14.0 Jul 16 12:40:52.853132 ignition[742]: Stage: disks Jul 16 12:40:52.853246 ignition[742]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 16 12:40:52.853265 ignition[742]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Jul 16 12:40:52.854637 ignition[742]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Jul 16 12:40:52.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:52.856729 systemd[1]: Finished ignition-disks.service. Jul 16 12:40:52.855404 ignition[742]: disks: disks passed Jul 16 12:40:52.857792 systemd[1]: Reached target initrd-root-device.target. Jul 16 12:40:52.855449 ignition[742]: Ignition finished successfully Jul 16 12:40:52.858783 systemd[1]: Reached target local-fs-pre.target. Jul 16 12:40:52.859639 systemd[1]: Reached target local-fs.target. Jul 16 12:40:52.860947 systemd[1]: Reached target sysinit.target. Jul 16 12:40:52.862142 systemd[1]: Reached target basic.target. Jul 16 12:40:52.865571 systemd[1]: Starting systemd-fsck-root.service... Jul 16 12:40:52.882772 systemd-fsck[749]: ROOT: clean, 619/1628000 files, 124060/1617920 blocks Jul 16 12:40:52.887591 systemd[1]: Finished systemd-fsck-root.service. Jul 16 12:40:52.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:52.890642 systemd[1]: Mounting sysroot.mount... Jul 16 12:40:52.901633 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Jul 16 12:40:52.902256 systemd[1]: Mounted sysroot.mount. Jul 16 12:40:52.902764 systemd[1]: Reached target initrd-root-fs.target. Jul 16 12:40:52.905261 systemd[1]: Mounting sysroot-usr.mount... Jul 16 12:40:52.908425 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Jul 16 12:40:52.909400 systemd[1]: Starting flatcar-openstack-hostname.service... Jul 16 12:40:52.911644 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Jul 16 12:40:52.912395 systemd[1]: Reached target ignition-diskful.target. Jul 16 12:40:52.915742 systemd[1]: Mounted sysroot-usr.mount. Jul 16 12:40:52.917553 systemd[1]: Starting initrd-setup-root.service... Jul 16 12:40:52.927793 initrd-setup-root[760]: cut: /sysroot/etc/passwd: No such file or directory Jul 16 12:40:52.940566 initrd-setup-root[768]: cut: /sysroot/etc/group: No such file or directory Jul 16 12:40:52.951793 initrd-setup-root[777]: cut: /sysroot/etc/shadow: No such file or directory Jul 16 12:40:52.960587 initrd-setup-root[786]: cut: /sysroot/etc/gshadow: No such file or directory Jul 16 12:40:53.003252 systemd[1]: Finished initrd-setup-root.service. Jul 16 12:40:53.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:53.004809 systemd[1]: Starting ignition-mount.service... Jul 16 12:40:53.006222 systemd[1]: Starting sysroot-boot.service... Jul 16 12:40:53.030321 bash[804]: umount: /sysroot/usr/share/oem: not mounted. Jul 16 12:40:53.035784 systemd[1]: Finished sysroot-boot.service. Jul 16 12:40:53.036723 coreos-metadata[755]: Jul 16 12:40:53.035 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Jul 16 12:40:53.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:53.042411 ignition[808]: INFO : Ignition 2.14.0 Jul 16 12:40:53.042411 ignition[808]: INFO : Stage: mount Jul 16 12:40:53.043368 ignition[808]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 16 12:40:53.043368 ignition[808]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Jul 16 12:40:53.044559 ignition[808]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Jul 16 12:40:53.044559 ignition[808]: INFO : mount: mount passed Jul 16 12:40:53.044559 ignition[808]: INFO : Ignition finished successfully Jul 16 12:40:53.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:53.045197 systemd[1]: Finished ignition-mount.service. Jul 16 12:40:53.051268 coreos-metadata[755]: Jul 16 12:40:53.051 INFO Fetch successful Jul 16 12:40:53.052884 coreos-metadata[755]: Jul 16 12:40:53.052 INFO wrote hostname srv-78sgy.gb1.brightbox.com to /sysroot/etc/hostname Jul 16 12:40:53.056251 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. Jul 16 12:40:53.056443 systemd[1]: Finished flatcar-openstack-hostname.service. Jul 16 12:40:53.057000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:53.057000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:53.278163 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 16 12:40:53.291678 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/vda6 scanned by mount (814) Jul 16 12:40:53.298657 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Jul 16 12:40:53.298742 kernel: BTRFS info (device vda6): using free space tree Jul 16 12:40:53.298772 kernel: BTRFS info (device vda6): has skinny extents Jul 16 12:40:53.305738 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 16 12:40:53.307481 systemd[1]: Starting ignition-files.service... Jul 16 12:40:53.329685 ignition[834]: INFO : Ignition 2.14.0 Jul 16 12:40:53.329685 ignition[834]: INFO : Stage: files Jul 16 12:40:53.330827 ignition[834]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 16 12:40:53.330827 ignition[834]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Jul 16 12:40:53.332001 ignition[834]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Jul 16 12:40:53.332473 ignition[834]: DEBUG : files: compiled without relabeling support, skipping Jul 16 12:40:53.333002 ignition[834]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Jul 16 12:40:53.333002 ignition[834]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Jul 16 12:40:53.335203 ignition[834]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Jul 16 12:40:53.337370 ignition[834]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Jul 16 12:40:53.338900 ignition[834]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Jul 16 12:40:53.338816 unknown[834]: wrote ssh authorized keys file for user: core Jul 16 12:40:53.341871 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Jul 16 12:40:53.341871 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Jul 16 12:40:53.341871 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Jul 16 12:40:53.341871 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Jul 16 12:40:53.341871 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" Jul 16 12:40:53.341871 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" Jul 16 12:40:53.341871 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" Jul 16 12:40:53.341871 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://extensions.flatcar.org/extensions/kubernetes-v1.31.8-x86-64.raw: attempt #1 Jul 16 12:40:53.707083 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Jul 16 12:40:54.160131 systemd-networkd[712]: eth0: Gained IPv6LL Jul 16 12:40:55.509250 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" Jul 16 12:40:55.509250 ignition[834]: INFO : files: op(7): [started] processing unit "coreos-metadata-sshkeys@.service" Jul 16 12:40:55.509250 ignition[834]: INFO : files: op(7): [finished] processing unit "coreos-metadata-sshkeys@.service" Jul 16 12:40:55.515371 ignition[834]: INFO : files: op(8): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Jul 16 12:40:55.515371 ignition[834]: INFO : files: op(8): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Jul 16 12:40:55.522050 ignition[834]: INFO : files: createResultFile: createFiles: op(9): [started] writing file "/sysroot/etc/.ignition-result.json" Jul 16 12:40:55.522976 ignition[834]: INFO : files: createResultFile: createFiles: op(9): [finished] writing file "/sysroot/etc/.ignition-result.json" Jul 16 12:40:55.522976 ignition[834]: INFO : files: files passed Jul 16 12:40:55.522976 ignition[834]: INFO : Ignition finished successfully Jul 16 12:40:55.535130 kernel: kauditd_printk_skb: 26 callbacks suppressed Jul 16 12:40:55.535178 kernel: audit: type=1130 audit(1752669655.525:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:55.525000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:55.524042 systemd[1]: Finished ignition-files.service. Jul 16 12:40:55.557721 kernel: audit: type=1130 audit(1752669655.535:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:55.557864 kernel: audit: type=1131 audit(1752669655.535:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:55.557905 kernel: audit: type=1130 audit(1752669655.547:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:55.535000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:55.535000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:55.547000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:55.528726 systemd[1]: Starting initrd-setup-root-after-ignition.service... Jul 16 12:40:55.530720 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Jul 16 12:40:55.561747 initrd-setup-root-after-ignition[859]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Jul 16 12:40:55.531669 systemd[1]: Starting ignition-quench.service... Jul 16 12:40:55.535733 systemd[1]: ignition-quench.service: Deactivated successfully. Jul 16 12:40:55.535835 systemd[1]: Finished ignition-quench.service. Jul 16 12:40:55.547088 systemd[1]: Finished initrd-setup-root-after-ignition.service. Jul 16 12:40:55.548505 systemd[1]: Reached target ignition-complete.target. Jul 16 12:40:55.559627 systemd[1]: Starting initrd-parse-etc.service... Jul 16 12:40:55.583838 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jul 16 12:40:55.583963 systemd[1]: Finished initrd-parse-etc.service. Jul 16 12:40:55.592716 kernel: audit: type=1130 audit(1752669655.584:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:55.592765 kernel: audit: type=1131 audit(1752669655.584:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:55.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:55.584000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:55.585271 systemd[1]: Reached target initrd-fs.target. Jul 16 12:40:55.593240 systemd[1]: Reached target initrd.target. Jul 16 12:40:55.594832 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Jul 16 12:40:55.596082 systemd[1]: Starting dracut-pre-pivot.service... Jul 16 12:40:55.616146 systemd[1]: Finished dracut-pre-pivot.service. Jul 16 12:40:55.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:55.618053 systemd[1]: Starting initrd-cleanup.service... Jul 16 12:40:55.621516 kernel: audit: type=1130 audit(1752669655.616:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:55.630009 systemd[1]: Stopped target nss-lookup.target. Jul 16 12:40:55.631090 systemd[1]: Stopped target remote-cryptsetup.target. Jul 16 12:40:55.632076 systemd[1]: Stopped target timers.target. Jul 16 12:40:55.633033 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jul 16 12:40:55.633688 systemd[1]: Stopped dracut-pre-pivot.service. Jul 16 12:40:55.634000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:55.637620 kernel: audit: type=1131 audit(1752669655.634:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:55.637608 systemd[1]: Stopped target initrd.target. Jul 16 12:40:55.638166 systemd[1]: Stopped target basic.target. Jul 16 12:40:55.638851 systemd[1]: Stopped target ignition-complete.target. Jul 16 12:40:55.639509 systemd[1]: Stopped target ignition-diskful.target. Jul 16 12:40:55.640361 systemd[1]: Stopped target initrd-root-device.target. Jul 16 12:40:55.650208 systemd[1]: Stopped target remote-fs.target. Jul 16 12:40:55.650949 systemd[1]: Stopped target remote-fs-pre.target. Jul 16 12:40:55.651694 systemd[1]: Stopped target sysinit.target. Jul 16 12:40:55.652440 systemd[1]: Stopped target local-fs.target. Jul 16 12:40:55.653802 systemd[1]: Stopped target local-fs-pre.target. Jul 16 12:40:55.655024 systemd[1]: Stopped target swap.target. Jul 16 12:40:55.657223 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jul 16 12:40:55.666173 kernel: audit: type=1131 audit(1752669655.658:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:55.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:55.657522 systemd[1]: Stopped dracut-pre-mount.service. Jul 16 12:40:55.659216 systemd[1]: Stopped target cryptsetup.target. Jul 16 12:40:55.674189 kernel: audit: type=1131 audit(1752669655.667:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:55.667000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:55.672000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:55.666584 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jul 16 12:40:55.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:55.666759 systemd[1]: Stopped dracut-initqueue.service. Jul 16 12:40:55.668063 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Jul 16 12:40:55.680285 iscsid[722]: iscsid shutting down. Jul 16 12:40:55.668193 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Jul 16 12:40:55.673365 systemd[1]: ignition-files.service: Deactivated successfully. Jul 16 12:40:55.673483 systemd[1]: Stopped ignition-files.service. Jul 16 12:40:55.691912 ignition[872]: INFO : Ignition 2.14.0 Jul 16 12:40:55.691912 ignition[872]: INFO : Stage: umount Jul 16 12:40:55.691912 ignition[872]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 16 12:40:55.691912 ignition[872]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Jul 16 12:40:55.691912 ignition[872]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Jul 16 12:40:55.691000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:55.694000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:55.696000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:55.697000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:55.698000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:55.698000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:55.698000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:55.699000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:55.673796 systemd-networkd[712]: eth0: Ignoring DHCPv6 address 2a02:1348:17d:19a6:24:19ff:fef4:669a/128 (valid for 59min 59s, preferred for 59min 59s) which conflicts with 2a02:1348:17d:19a6:24:19ff:fef4:669a/64 assigned by NDisc. Jul 16 12:40:55.704000 ignition[872]: INFO : umount: umount passed Jul 16 12:40:55.704000 ignition[872]: INFO : Ignition finished successfully Jul 16 12:40:55.673806 systemd-networkd[712]: eth0: Hint: use IPv6Token= setting to change the address generated by NDisc or set UseAutonomousPrefix=no. Jul 16 12:40:55.675200 systemd[1]: Stopping ignition-mount.service... Jul 16 12:40:55.675979 systemd[1]: Stopping iscsid.service... Jul 16 12:40:55.684239 systemd[1]: Stopping sysroot-boot.service... Jul 16 12:40:55.690791 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jul 16 12:40:55.691034 systemd[1]: Stopped systemd-udev-trigger.service. Jul 16 12:40:55.692401 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jul 16 12:40:55.692537 systemd[1]: Stopped dracut-pre-trigger.service. Jul 16 12:40:55.696503 systemd[1]: iscsid.service: Deactivated successfully. Jul 16 12:40:55.714000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:55.696626 systemd[1]: Stopped iscsid.service. Jul 16 12:40:55.697382 systemd[1]: ignition-mount.service: Deactivated successfully. Jul 16 12:40:55.697468 systemd[1]: Stopped ignition-mount.service. Jul 16 12:40:55.698243 systemd[1]: ignition-disks.service: Deactivated successfully. Jul 16 12:40:55.698340 systemd[1]: Stopped ignition-disks.service. Jul 16 12:40:55.698788 systemd[1]: ignition-kargs.service: Deactivated successfully. Jul 16 12:40:55.698827 systemd[1]: Stopped ignition-kargs.service. Jul 16 12:40:55.699185 systemd[1]: ignition-fetch.service: Deactivated successfully. Jul 16 12:40:55.699221 systemd[1]: Stopped ignition-fetch.service. Jul 16 12:40:55.699650 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Jul 16 12:40:55.699687 systemd[1]: Stopped ignition-fetch-offline.service. Jul 16 12:40:55.700064 systemd[1]: Stopped target paths.target. Jul 16 12:40:55.700397 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jul 16 12:40:55.724000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:55.708588 systemd[1]: Stopped systemd-ask-password-console.path. Jul 16 12:40:55.709187 systemd[1]: Stopped target slices.target. Jul 16 12:40:55.709507 systemd[1]: Stopped target sockets.target. Jul 16 12:40:55.709918 systemd[1]: iscsid.socket: Deactivated successfully. Jul 16 12:40:55.709984 systemd[1]: Closed iscsid.socket. Jul 16 12:40:55.715123 systemd[1]: ignition-setup.service: Deactivated successfully. Jul 16 12:40:55.715190 systemd[1]: Stopped ignition-setup.service. Jul 16 12:40:55.719443 systemd[1]: Stopping iscsiuio.service... Jul 16 12:40:55.722688 systemd[1]: sysroot-boot.mount: Deactivated successfully. Jul 16 12:40:55.723291 systemd[1]: iscsiuio.service: Deactivated successfully. Jul 16 12:40:55.723386 systemd[1]: Stopped iscsiuio.service. Jul 16 12:40:55.732663 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jul 16 12:40:55.732000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:55.732000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:55.734000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:55.732908 systemd[1]: Finished initrd-cleanup.service. Jul 16 12:40:55.735000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:55.734619 systemd[1]: sysroot-boot.service: Deactivated successfully. Jul 16 12:40:55.734713 systemd[1]: Stopped sysroot-boot.service. Jul 16 12:40:55.735152 systemd[1]: Stopped target network.target. Jul 16 12:40:55.735488 systemd[1]: iscsiuio.socket: Deactivated successfully. Jul 16 12:40:55.735525 systemd[1]: Closed iscsiuio.socket. Jul 16 12:40:55.735858 systemd[1]: initrd-setup-root.service: Deactivated successfully. Jul 16 12:40:55.743000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:55.735898 systemd[1]: Stopped initrd-setup-root.service. Jul 16 12:40:55.736473 systemd[1]: Stopping systemd-networkd.service... Jul 16 12:40:55.737437 systemd[1]: Stopping systemd-resolved.service... Jul 16 12:40:55.741195 systemd-networkd[712]: eth0: DHCPv6 lease lost Jul 16 12:40:55.747000 audit: BPF prog-id=9 op=UNLOAD Jul 16 12:40:55.742412 systemd[1]: systemd-networkd.service: Deactivated successfully. Jul 16 12:40:55.742519 systemd[1]: Stopped systemd-networkd.service. Jul 16 12:40:55.744273 systemd[1]: systemd-networkd.socket: Deactivated successfully. Jul 16 12:40:55.744308 systemd[1]: Closed systemd-networkd.socket. Jul 16 12:40:55.748118 systemd[1]: Stopping network-cleanup.service... Jul 16 12:40:55.748541 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Jul 16 12:40:55.748616 systemd[1]: Stopped parse-ip-for-networkd.service. Jul 16 12:40:55.752000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:55.753613 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jul 16 12:40:55.753000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:55.753691 systemd[1]: Stopped systemd-sysctl.service. Jul 16 12:40:55.754000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:55.754468 systemd[1]: systemd-modules-load.service: Deactivated successfully. Jul 16 12:40:55.754522 systemd[1]: Stopped systemd-modules-load.service. Jul 16 12:40:55.757368 systemd[1]: Stopping systemd-udevd.service... Jul 16 12:40:55.760380 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jul 16 12:40:55.762086 systemd[1]: systemd-resolved.service: Deactivated successfully. Jul 16 12:40:55.762000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:55.765000 audit: BPF prog-id=6 op=UNLOAD Jul 16 12:40:55.762562 systemd[1]: Stopped systemd-resolved.service. Jul 16 12:40:55.768035 systemd[1]: network-cleanup.service: Deactivated successfully. Jul 16 12:40:55.768142 systemd[1]: Stopped network-cleanup.service. Jul 16 12:40:55.770000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:55.771095 systemd[1]: systemd-udevd.service: Deactivated successfully. Jul 16 12:40:55.771229 systemd[1]: Stopped systemd-udevd.service. Jul 16 12:40:55.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:55.772900 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jul 16 12:40:55.772941 systemd[1]: Closed systemd-udevd-control.socket. Jul 16 12:40:55.774160 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jul 16 12:40:55.774193 systemd[1]: Closed systemd-udevd-kernel.socket. Jul 16 12:40:55.775000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:55.775135 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jul 16 12:40:55.775000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:55.775181 systemd[1]: Stopped dracut-pre-udev.service. Jul 16 12:40:55.776000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:55.775778 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jul 16 12:40:55.775856 systemd[1]: Stopped dracut-cmdline.service. Jul 16 12:40:55.776525 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jul 16 12:40:55.776580 systemd[1]: Stopped dracut-cmdline-ask.service. Jul 16 12:40:55.778797 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Jul 16 12:40:55.780000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:55.781000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:55.781012 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Jul 16 12:40:55.791000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:55.781075 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Jul 16 12:40:55.781565 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jul 16 12:40:55.781620 systemd[1]: Stopped kmod-static-nodes.service. Jul 16 12:40:55.782010 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jul 16 12:40:55.792000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:55.792000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:55.782048 systemd[1]: Stopped systemd-vconsole-setup.service. Jul 16 12:40:55.792291 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Jul 16 12:40:55.792793 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jul 16 12:40:55.792888 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Jul 16 12:40:55.793711 systemd[1]: Reached target initrd-switch-root.target. Jul 16 12:40:55.795219 systemd[1]: Starting initrd-switch-root.service... Jul 16 12:40:55.808748 systemd[1]: Switching root. Jul 16 12:40:55.827859 systemd-journald[202]: Journal stopped Jul 16 12:40:59.041097 systemd-journald[202]: Received SIGTERM from PID 1 (n/a). Jul 16 12:40:59.041232 kernel: SELinux: Class mctp_socket not defined in policy. Jul 16 12:40:59.041262 kernel: SELinux: Class anon_inode not defined in policy. Jul 16 12:40:59.041278 kernel: SELinux: the above unknown classes and permissions will be allowed Jul 16 12:40:59.041291 kernel: SELinux: policy capability network_peer_controls=1 Jul 16 12:40:59.041304 kernel: SELinux: policy capability open_perms=1 Jul 16 12:40:59.041320 kernel: SELinux: policy capability extended_socket_class=1 Jul 16 12:40:59.041335 kernel: SELinux: policy capability always_check_network=0 Jul 16 12:40:59.041358 kernel: SELinux: policy capability cgroup_seclabel=1 Jul 16 12:40:59.041378 kernel: SELinux: policy capability nnp_nosuid_transition=1 Jul 16 12:40:59.041394 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Jul 16 12:40:59.041407 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Jul 16 12:40:59.041421 systemd[1]: Successfully loaded SELinux policy in 46.926ms. Jul 16 12:40:59.041451 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 9.256ms. Jul 16 12:40:59.041467 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 16 12:40:59.041480 systemd[1]: Detected virtualization kvm. Jul 16 12:40:59.041500 systemd[1]: Detected architecture x86-64. Jul 16 12:40:59.041522 systemd[1]: Detected first boot. Jul 16 12:40:59.041545 systemd[1]: Hostname set to . Jul 16 12:40:59.041560 systemd[1]: Initializing machine ID from VM UUID. Jul 16 12:40:59.041574 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Jul 16 12:40:59.041587 systemd[1]: Populated /etc with preset unit settings. Jul 16 12:40:59.041617 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 16 12:40:59.041639 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 16 12:40:59.041659 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 16 12:40:59.041688 systemd[1]: initrd-switch-root.service: Deactivated successfully. Jul 16 12:40:59.041706 systemd[1]: Stopped initrd-switch-root.service. Jul 16 12:40:59.041721 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jul 16 12:40:59.041736 systemd[1]: Created slice system-addon\x2dconfig.slice. Jul 16 12:40:59.041756 systemd[1]: Created slice system-addon\x2drun.slice. Jul 16 12:40:59.041789 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Jul 16 12:40:59.041803 systemd[1]: Created slice system-getty.slice. Jul 16 12:40:59.041816 systemd[1]: Created slice system-modprobe.slice. Jul 16 12:40:59.041836 systemd[1]: Created slice system-serial\x2dgetty.slice. Jul 16 12:40:59.041850 systemd[1]: Created slice system-system\x2dcloudinit.slice. Jul 16 12:40:59.041865 systemd[1]: Created slice system-systemd\x2dfsck.slice. Jul 16 12:40:59.041879 systemd[1]: Created slice user.slice. Jul 16 12:40:59.041895 systemd[1]: Started systemd-ask-password-console.path. Jul 16 12:40:59.041914 systemd[1]: Started systemd-ask-password-wall.path. Jul 16 12:40:59.041928 systemd[1]: Set up automount boot.automount. Jul 16 12:40:59.041943 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Jul 16 12:40:59.041957 systemd[1]: Stopped target initrd-switch-root.target. Jul 16 12:40:59.041971 systemd[1]: Stopped target initrd-fs.target. Jul 16 12:40:59.041991 systemd[1]: Stopped target initrd-root-fs.target. Jul 16 12:40:59.042007 systemd[1]: Reached target integritysetup.target. Jul 16 12:40:59.042021 systemd[1]: Reached target remote-cryptsetup.target. Jul 16 12:40:59.042037 systemd[1]: Reached target remote-fs.target. Jul 16 12:40:59.042051 systemd[1]: Reached target slices.target. Jul 16 12:40:59.042064 systemd[1]: Reached target swap.target. Jul 16 12:40:59.042077 systemd[1]: Reached target torcx.target. Jul 16 12:40:59.042091 systemd[1]: Reached target veritysetup.target. Jul 16 12:40:59.042112 systemd[1]: Listening on systemd-coredump.socket. Jul 16 12:40:59.042126 systemd[1]: Listening on systemd-initctl.socket. Jul 16 12:40:59.042150 systemd[1]: Listening on systemd-networkd.socket. Jul 16 12:40:59.042164 systemd[1]: Listening on systemd-udevd-control.socket. Jul 16 12:40:59.042177 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 16 12:40:59.042190 systemd[1]: Listening on systemd-userdbd.socket. Jul 16 12:40:59.042204 systemd[1]: Mounting dev-hugepages.mount... Jul 16 12:40:59.042217 systemd[1]: Mounting dev-mqueue.mount... Jul 16 12:40:59.042231 systemd[1]: Mounting media.mount... Jul 16 12:40:59.042245 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 16 12:40:59.042260 systemd[1]: Mounting sys-kernel-debug.mount... Jul 16 12:40:59.042277 systemd[1]: Mounting sys-kernel-tracing.mount... Jul 16 12:40:59.042291 systemd[1]: Mounting tmp.mount... Jul 16 12:40:59.042304 systemd[1]: Starting flatcar-tmpfiles.service... Jul 16 12:40:59.042320 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 16 12:40:59.042333 systemd[1]: Starting kmod-static-nodes.service... Jul 16 12:40:59.042347 systemd[1]: Starting modprobe@configfs.service... Jul 16 12:40:59.042360 systemd[1]: Starting modprobe@dm_mod.service... Jul 16 12:40:59.042374 systemd[1]: Starting modprobe@drm.service... Jul 16 12:40:59.042387 systemd[1]: Starting modprobe@efi_pstore.service... Jul 16 12:40:59.042404 systemd[1]: Starting modprobe@fuse.service... Jul 16 12:40:59.042421 systemd[1]: Starting modprobe@loop.service... Jul 16 12:40:59.042436 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Jul 16 12:40:59.042449 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jul 16 12:40:59.042467 systemd[1]: Stopped systemd-fsck-root.service. Jul 16 12:40:59.042481 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Jul 16 12:40:59.042495 systemd[1]: Stopped systemd-fsck-usr.service. Jul 16 12:40:59.042508 systemd[1]: Stopped systemd-journald.service. Jul 16 12:40:59.042521 systemd[1]: Starting systemd-journald.service... Jul 16 12:40:59.042538 systemd[1]: Starting systemd-modules-load.service... Jul 16 12:40:59.042552 systemd[1]: Starting systemd-network-generator.service... Jul 16 12:40:59.042566 systemd[1]: Starting systemd-remount-fs.service... Jul 16 12:40:59.042584 systemd[1]: Starting systemd-udev-trigger.service... Jul 16 12:40:59.042611 systemd[1]: verity-setup.service: Deactivated successfully. Jul 16 12:40:59.042624 systemd[1]: Stopped verity-setup.service. Jul 16 12:40:59.042639 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 16 12:40:59.042652 systemd[1]: Mounted dev-hugepages.mount. Jul 16 12:40:59.042666 systemd[1]: Mounted dev-mqueue.mount. Jul 16 12:40:59.042683 systemd[1]: Mounted media.mount. Jul 16 12:40:59.042701 systemd[1]: Mounted sys-kernel-debug.mount. Jul 16 12:40:59.042715 systemd[1]: Mounted sys-kernel-tracing.mount. Jul 16 12:40:59.042732 systemd[1]: Mounted tmp.mount. Jul 16 12:40:59.042751 systemd[1]: Finished kmod-static-nodes.service. Jul 16 12:40:59.042767 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jul 16 12:40:59.042781 systemd[1]: Finished modprobe@configfs.service. Jul 16 12:40:59.042796 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 16 12:40:59.042809 systemd[1]: Finished modprobe@dm_mod.service. Jul 16 12:40:59.042830 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 16 12:40:59.042845 kernel: fuse: init (API version 7.34) Jul 16 12:40:59.042858 systemd[1]: Finished modprobe@drm.service. Jul 16 12:40:59.042875 kernel: loop: module loaded Jul 16 12:40:59.042888 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 16 12:40:59.042908 systemd-journald[973]: Journal started Jul 16 12:40:59.042974 systemd-journald[973]: Runtime Journal (/run/log/journal/3703781f6a954fff83f072c708699217) is 4.7M, max 38.1M, 33.3M free. Jul 16 12:40:55.953000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Jul 16 12:40:56.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 16 12:40:56.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 16 12:40:56.005000 audit: BPF prog-id=10 op=LOAD Jul 16 12:40:56.005000 audit: BPF prog-id=10 op=UNLOAD Jul 16 12:40:56.005000 audit: BPF prog-id=11 op=LOAD Jul 16 12:40:56.005000 audit: BPF prog-id=11 op=UNLOAD Jul 16 12:40:56.089000 audit[904]: AVC avc: denied { associate } for pid=904 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Jul 16 12:40:56.089000 audit[904]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a4 a1=c0000cede0 a2=c0000d7040 a3=32 items=0 ppid=887 pid=904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:56.089000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 16 12:40:56.092000 audit[904]: AVC avc: denied { associate } for pid=904 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Jul 16 12:40:56.092000 audit[904]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d979 a2=1ed a3=0 items=2 ppid=887 pid=904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:56.092000 audit: CWD cwd="/" Jul 16 12:40:56.092000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:56.092000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:56.092000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 16 12:40:58.862000 audit: BPF prog-id=12 op=LOAD Jul 16 12:40:58.862000 audit: BPF prog-id=3 op=UNLOAD Jul 16 12:40:58.862000 audit: BPF prog-id=13 op=LOAD Jul 16 12:40:58.862000 audit: BPF prog-id=14 op=LOAD Jul 16 12:40:58.862000 audit: BPF prog-id=4 op=UNLOAD Jul 16 12:40:58.862000 audit: BPF prog-id=5 op=UNLOAD Jul 16 12:40:58.864000 audit: BPF prog-id=15 op=LOAD Jul 16 12:40:58.864000 audit: BPF prog-id=12 op=UNLOAD Jul 16 12:40:58.864000 audit: BPF prog-id=16 op=LOAD Jul 16 12:40:58.864000 audit: BPF prog-id=17 op=LOAD Jul 16 12:40:58.864000 audit: BPF prog-id=13 op=UNLOAD Jul 16 12:40:58.864000 audit: BPF prog-id=14 op=UNLOAD Jul 16 12:40:58.865000 audit: BPF prog-id=18 op=LOAD Jul 16 12:40:58.865000 audit: BPF prog-id=15 op=UNLOAD Jul 16 12:40:58.865000 audit: BPF prog-id=19 op=LOAD Jul 16 12:40:58.865000 audit: BPF prog-id=20 op=LOAD Jul 16 12:40:58.865000 audit: BPF prog-id=16 op=UNLOAD Jul 16 12:40:58.865000 audit: BPF prog-id=17 op=UNLOAD Jul 16 12:40:58.866000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:58.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:58.869000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:58.874000 audit: BPF prog-id=18 op=UNLOAD Jul 16 12:40:58.972000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:58.974000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:58.976000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:58.976000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:58.976000 audit: BPF prog-id=21 op=LOAD Jul 16 12:40:58.977000 audit: BPF prog-id=22 op=LOAD Jul 16 12:40:58.977000 audit: BPF prog-id=23 op=LOAD Jul 16 12:40:58.977000 audit: BPF prog-id=19 op=UNLOAD Jul 16 12:40:58.977000 audit: BPF prog-id=20 op=UNLOAD Jul 16 12:40:59.012000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:59.028000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:59.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:59.032000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:59.034000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jul 16 12:40:59.034000 audit[973]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7ffc1620f880 a2=4000 a3=7ffc1620f91c items=0 ppid=1 pid=973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:59.034000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Jul 16 12:40:59.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:59.035000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:59.041000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:59.041000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:56.087098 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-07-16T12:40:56Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" Jul 16 12:40:58.860538 systemd[1]: Queued start job for default target multi-user.target. Jul 16 12:40:59.053904 systemd[1]: Finished modprobe@efi_pstore.service. Jul 16 12:40:59.053934 systemd[1]: Started systemd-journald.service. Jul 16 12:40:59.048000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:59.048000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:59.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:56.087492 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-07-16T12:40:56Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 16 12:40:58.860555 systemd[1]: Unnecessary job was removed for dev-vda6.device. Jul 16 12:40:56.087513 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-07-16T12:40:56Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 16 12:40:58.866468 systemd[1]: systemd-journald.service: Deactivated successfully. Jul 16 12:40:56.087550 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-07-16T12:40:56Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Jul 16 12:40:59.054156 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jul 16 12:40:56.087560 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-07-16T12:40:56Z" level=debug msg="skipped missing lower profile" missing profile=oem Jul 16 12:40:59.054313 systemd[1]: Finished modprobe@fuse.service. Jul 16 12:40:59.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:59.054000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:56.087594 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-07-16T12:40:56Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Jul 16 12:40:56.087622 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-07-16T12:40:56Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Jul 16 12:40:56.087835 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-07-16T12:40:56Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Jul 16 12:40:59.055067 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 16 12:40:56.087882 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-07-16T12:40:56Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 16 12:40:59.055190 systemd[1]: Finished modprobe@loop.service. Jul 16 12:40:56.087899 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-07-16T12:40:56Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 16 12:40:56.088985 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-07-16T12:40:56Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Jul 16 12:40:56.089023 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-07-16T12:40:56Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Jul 16 12:40:59.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:59.054000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:56.089043 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-07-16T12:40:56Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.100: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.100 Jul 16 12:40:56.089059 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-07-16T12:40:56Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Jul 16 12:40:56.089078 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-07-16T12:40:56Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.100: no such file or directory" path=/var/lib/torcx/store/3510.3.100 Jul 16 12:40:56.089093 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-07-16T12:40:56Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Jul 16 12:40:59.056042 systemd[1]: Finished systemd-modules-load.service. Jul 16 12:40:58.458117 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-07-16T12:40:58Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 16 12:40:58.458784 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-07-16T12:40:58Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 16 12:40:59.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:58.458963 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-07-16T12:40:58Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 16 12:40:58.459227 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-07-16T12:40:58Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 16 12:40:58.459323 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-07-16T12:40:58Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Jul 16 12:40:58.459417 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-07-16T12:40:58Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Jul 16 12:40:59.056000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:59.057050 systemd[1]: Finished systemd-network-generator.service. Jul 16 12:40:59.057000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:59.057681 systemd[1]: Finished systemd-remount-fs.service. Jul 16 12:40:59.058555 systemd[1]: Reached target network-pre.target. Jul 16 12:40:59.060295 systemd[1]: Mounting sys-fs-fuse-connections.mount... Jul 16 12:40:59.062147 systemd[1]: Mounting sys-kernel-config.mount... Jul 16 12:40:59.065813 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Jul 16 12:40:59.069233 systemd[1]: Starting systemd-hwdb-update.service... Jul 16 12:40:59.070957 systemd[1]: Starting systemd-journal-flush.service... Jul 16 12:40:59.071436 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 16 12:40:59.072933 systemd[1]: Starting systemd-random-seed.service... Jul 16 12:40:59.073419 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 16 12:40:59.074923 systemd[1]: Starting systemd-sysctl.service... Jul 16 12:40:59.078563 systemd[1]: Mounted sys-fs-fuse-connections.mount. Jul 16 12:40:59.080800 systemd[1]: Mounted sys-kernel-config.mount. Jul 16 12:40:59.089517 systemd-journald[973]: Time spent on flushing to /var/log/journal/3703781f6a954fff83f072c708699217 is 48.802ms for 1301 entries. Jul 16 12:40:59.089517 systemd-journald[973]: System Journal (/var/log/journal/3703781f6a954fff83f072c708699217) is 8.0M, max 584.8M, 576.8M free. Jul 16 12:40:59.152086 systemd-journald[973]: Received client request to flush runtime journal. Jul 16 12:40:59.091000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:59.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:59.137000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:59.152000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:59.091867 systemd[1]: Finished systemd-random-seed.service. Jul 16 12:40:59.092407 systemd[1]: Reached target first-boot-complete.target. Jul 16 12:40:59.109278 systemd[1]: Finished systemd-sysctl.service. Jul 16 12:40:59.137808 systemd[1]: Finished flatcar-tmpfiles.service. Jul 16 12:40:59.139712 systemd[1]: Starting systemd-sysusers.service... Jul 16 12:40:59.152997 systemd[1]: Finished systemd-journal-flush.service. Jul 16 12:40:59.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:59.162101 systemd[1]: Finished systemd-sysusers.service. Jul 16 12:40:59.163871 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 16 12:40:59.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:59.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:59.192394 systemd[1]: Finished systemd-udev-trigger.service. Jul 16 12:40:59.193157 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 16 12:40:59.194928 systemd[1]: Starting systemd-udev-settle.service... Jul 16 12:40:59.205327 udevadm[1015]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Jul 16 12:40:59.689381 systemd[1]: Finished systemd-hwdb-update.service. Jul 16 12:40:59.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:59.692000 audit: BPF prog-id=24 op=LOAD Jul 16 12:40:59.692000 audit: BPF prog-id=25 op=LOAD Jul 16 12:40:59.692000 audit: BPF prog-id=7 op=UNLOAD Jul 16 12:40:59.692000 audit: BPF prog-id=8 op=UNLOAD Jul 16 12:40:59.694238 systemd[1]: Starting systemd-udevd.service... Jul 16 12:40:59.724203 systemd-udevd[1016]: Using default interface naming scheme 'v252'. Jul 16 12:40:59.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:59.757000 audit: BPF prog-id=26 op=LOAD Jul 16 12:40:59.754241 systemd[1]: Started systemd-udevd.service. Jul 16 12:40:59.762075 systemd[1]: Starting systemd-networkd.service... Jul 16 12:40:59.766000 audit: BPF prog-id=27 op=LOAD Jul 16 12:40:59.766000 audit: BPF prog-id=28 op=LOAD Jul 16 12:40:59.766000 audit: BPF prog-id=29 op=LOAD Jul 16 12:40:59.767977 systemd[1]: Starting systemd-userdbd.service... Jul 16 12:40:59.813714 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Jul 16 12:40:59.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:59.820978 systemd[1]: Started systemd-userdbd.service. Jul 16 12:40:59.866414 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 16 12:40:59.904619 kernel: mousedev: PS/2 mouse device common for all mice Jul 16 12:40:59.905077 systemd-networkd[1029]: lo: Link UP Jul 16 12:40:59.905085 systemd-networkd[1029]: lo: Gained carrier Jul 16 12:40:59.905673 systemd-networkd[1029]: Enumeration completed Jul 16 12:40:59.905000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:40:59.905769 systemd[1]: Started systemd-networkd.service. Jul 16 12:40:59.905786 systemd-networkd[1029]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 16 12:40:59.907403 systemd-networkd[1029]: eth0: Link UP Jul 16 12:40:59.907412 systemd-networkd[1029]: eth0: Gained carrier Jul 16 12:40:59.914616 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Jul 16 12:40:59.918615 kernel: ACPI: button: Power Button [PWRF] Jul 16 12:40:59.923781 systemd-networkd[1029]: eth0: DHCPv4 address 10.244.102.154/30, gateway 10.244.102.153 acquired from 10.244.102.153 Jul 16 12:40:59.960000 audit[1019]: AVC avc: denied { confidentiality } for pid=1019 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Jul 16 12:40:59.960000 audit[1019]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=559adadb0560 a1=338ac a2=7f65e6c2fbc5 a3=5 items=110 ppid=1016 pid=1019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:40:59.960000 audit: CWD cwd="/" Jul 16 12:40:59.960000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=1 name=(null) inode=15489 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=2 name=(null) inode=15489 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=3 name=(null) inode=15490 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=4 name=(null) inode=15489 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=5 name=(null) inode=15491 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=6 name=(null) inode=15489 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=7 name=(null) inode=15492 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=8 name=(null) inode=15492 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=9 name=(null) inode=15493 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=10 name=(null) inode=15492 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=11 name=(null) inode=15494 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=12 name=(null) inode=15492 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=13 name=(null) inode=15495 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=14 name=(null) inode=15492 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=15 name=(null) inode=15496 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=16 name=(null) inode=15492 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=17 name=(null) inode=15497 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=18 name=(null) inode=15489 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=19 name=(null) inode=15498 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=20 name=(null) inode=15498 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=21 name=(null) inode=15499 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=22 name=(null) inode=15498 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=23 name=(null) inode=15500 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=24 name=(null) inode=15498 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=25 name=(null) inode=15501 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=26 name=(null) inode=15498 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=27 name=(null) inode=15502 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=28 name=(null) inode=15498 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=29 name=(null) inode=15503 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=30 name=(null) inode=15489 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=31 name=(null) inode=15504 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=32 name=(null) inode=15504 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=33 name=(null) inode=15505 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=34 name=(null) inode=15504 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=35 name=(null) inode=15506 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=36 name=(null) inode=15504 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=37 name=(null) inode=15507 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=38 name=(null) inode=15504 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=39 name=(null) inode=15508 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=40 name=(null) inode=15504 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=41 name=(null) inode=15509 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=42 name=(null) inode=15489 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=43 name=(null) inode=15510 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=44 name=(null) inode=15510 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=45 name=(null) inode=15511 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=46 name=(null) inode=15510 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=47 name=(null) inode=15512 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=48 name=(null) inode=15510 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=49 name=(null) inode=15513 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=50 name=(null) inode=15510 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=51 name=(null) inode=15514 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=52 name=(null) inode=15510 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=53 name=(null) inode=15515 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=55 name=(null) inode=15516 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=56 name=(null) inode=15516 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=57 name=(null) inode=15517 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=58 name=(null) inode=15516 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=59 name=(null) inode=15518 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=60 name=(null) inode=15516 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=61 name=(null) inode=15519 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=62 name=(null) inode=15519 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=63 name=(null) inode=15520 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=64 name=(null) inode=15519 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=65 name=(null) inode=15521 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=66 name=(null) inode=15519 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=67 name=(null) inode=15522 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=68 name=(null) inode=15519 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=69 name=(null) inode=15523 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=70 name=(null) inode=15519 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=71 name=(null) inode=15524 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=72 name=(null) inode=15516 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=73 name=(null) inode=15525 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=74 name=(null) inode=15525 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=75 name=(null) inode=15526 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=76 name=(null) inode=15525 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=77 name=(null) inode=15527 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=78 name=(null) inode=15525 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=79 name=(null) inode=15528 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=80 name=(null) inode=15525 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=81 name=(null) inode=15529 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=82 name=(null) inode=15525 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=83 name=(null) inode=15530 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=84 name=(null) inode=15516 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=85 name=(null) inode=15531 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=86 name=(null) inode=15531 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=87 name=(null) inode=15532 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=88 name=(null) inode=15531 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=89 name=(null) inode=15533 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=90 name=(null) inode=15531 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=91 name=(null) inode=15534 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=92 name=(null) inode=15531 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=93 name=(null) inode=15535 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=94 name=(null) inode=15531 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=95 name=(null) inode=15536 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=96 name=(null) inode=15516 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=97 name=(null) inode=15537 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=98 name=(null) inode=15537 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=99 name=(null) inode=15538 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=100 name=(null) inode=15537 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=101 name=(null) inode=15539 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=102 name=(null) inode=15537 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=103 name=(null) inode=15540 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=104 name=(null) inode=15537 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=105 name=(null) inode=15541 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=106 name=(null) inode=15537 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=107 name=(null) inode=15542 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PATH item=109 name=(null) inode=15543 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:40:59.960000 audit: PROCTITLE proctitle="(udev-worker)" Jul 16 12:41:00.002620 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Jul 16 12:41:00.007330 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Jul 16 12:41:00.007509 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Jul 16 12:41:00.007662 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4 Jul 16 12:41:00.170139 systemd[1]: Finished systemd-udev-settle.service. Jul 16 12:41:00.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:00.172248 systemd[1]: Starting lvm2-activation-early.service... Jul 16 12:41:00.201089 lvm[1045]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 16 12:41:00.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:00.229221 systemd[1]: Finished lvm2-activation-early.service. Jul 16 12:41:00.229975 systemd[1]: Reached target cryptsetup.target. Jul 16 12:41:00.232094 systemd[1]: Starting lvm2-activation.service... Jul 16 12:41:00.241065 lvm[1046]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 16 12:41:00.265201 systemd[1]: Finished lvm2-activation.service. Jul 16 12:41:00.265000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:00.266564 systemd[1]: Reached target local-fs-pre.target. Jul 16 12:41:00.267666 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Jul 16 12:41:00.267741 systemd[1]: Reached target local-fs.target. Jul 16 12:41:00.268864 systemd[1]: Reached target machines.target. Jul 16 12:41:00.272704 systemd[1]: Starting ldconfig.service... Jul 16 12:41:00.274429 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 16 12:41:00.274557 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 16 12:41:00.277542 systemd[1]: Starting systemd-boot-update.service... Jul 16 12:41:00.280700 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Jul 16 12:41:00.286821 systemd[1]: Starting systemd-machine-id-commit.service... Jul 16 12:41:00.288701 systemd[1]: Starting systemd-sysext.service... Jul 16 12:41:00.290640 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1048 (bootctl) Jul 16 12:41:00.291749 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Jul 16 12:41:00.303838 systemd[1]: Unmounting usr-share-oem.mount... Jul 16 12:41:00.310329 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 16 12:41:00.310525 systemd[1]: Unmounted usr-share-oem.mount. Jul 16 12:41:00.318460 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Jul 16 12:41:00.318000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:00.331870 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Jul 16 12:41:00.334341 systemd[1]: Finished systemd-machine-id-commit.service. Jul 16 12:41:00.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:00.337615 kernel: loop0: detected capacity change from 0 to 221472 Jul 16 12:41:00.368624 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Jul 16 12:41:00.391627 kernel: loop1: detected capacity change from 0 to 221472 Jul 16 12:41:00.402937 (sd-sysext)[1060]: Using extensions 'kubernetes'. Jul 16 12:41:00.404421 (sd-sysext)[1060]: Merged extensions into '/usr'. Jul 16 12:41:00.426790 systemd-fsck[1057]: fsck.fat 4.2 (2021-01-31) Jul 16 12:41:00.426790 systemd-fsck[1057]: /dev/vda1: 790 files, 120725/258078 clusters Jul 16 12:41:00.429845 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 16 12:41:00.431868 systemd[1]: Mounting usr-share-oem.mount... Jul 16 12:41:00.434879 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 16 12:41:00.437955 systemd[1]: Starting modprobe@dm_mod.service... Jul 16 12:41:00.439652 systemd[1]: Starting modprobe@efi_pstore.service... Jul 16 12:41:00.441969 systemd[1]: Starting modprobe@loop.service... Jul 16 12:41:00.444125 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 16 12:41:00.444292 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 16 12:41:00.444448 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 16 12:41:00.447310 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Jul 16 12:41:00.448000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:00.450159 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 16 12:41:00.450290 systemd[1]: Finished modprobe@dm_mod.service. Jul 16 12:41:00.450000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:00.450000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:00.451332 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 16 12:41:00.451717 systemd[1]: Finished modprobe@efi_pstore.service. Jul 16 12:41:00.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:00.451000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:00.452375 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 16 12:41:00.452471 systemd[1]: Finished modprobe@loop.service. Jul 16 12:41:00.452000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:00.452000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:00.453298 systemd[1]: Mounted usr-share-oem.mount. Jul 16 12:41:00.460000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:00.459720 systemd[1]: Mounting boot.mount... Jul 16 12:41:00.460102 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 16 12:41:00.460158 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 16 12:41:00.460569 systemd[1]: Finished systemd-sysext.service. Jul 16 12:41:00.462829 systemd[1]: Starting ensure-sysext.service... Jul 16 12:41:00.464804 systemd[1]: Starting systemd-tmpfiles-setup.service... Jul 16 12:41:00.477834 systemd[1]: Mounted boot.mount. Jul 16 12:41:00.478952 systemd[1]: Reloading. Jul 16 12:41:00.489570 systemd-tmpfiles[1068]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Jul 16 12:41:00.492571 systemd-tmpfiles[1068]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Jul 16 12:41:00.496595 systemd-tmpfiles[1068]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Jul 16 12:41:00.585961 ldconfig[1047]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Jul 16 12:41:00.604053 /usr/lib/systemd/system-generators/torcx-generator[1087]: time="2025-07-16T12:41:00Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" Jul 16 12:41:00.604083 /usr/lib/systemd/system-generators/torcx-generator[1087]: time="2025-07-16T12:41:00Z" level=info msg="torcx already run" Jul 16 12:41:00.710621 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 16 12:41:00.710638 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 16 12:41:00.730155 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 16 12:41:00.792283 kernel: kauditd_printk_skb: 247 callbacks suppressed Jul 16 12:41:00.792492 kernel: audit: type=1334 audit(1752669660.786:172): prog-id=30 op=LOAD Jul 16 12:41:00.786000 audit: BPF prog-id=30 op=LOAD Jul 16 12:41:00.786000 audit: BPF prog-id=31 op=LOAD Jul 16 12:41:00.794663 kernel: audit: type=1334 audit(1752669660.786:173): prog-id=31 op=LOAD Jul 16 12:41:00.786000 audit: BPF prog-id=24 op=UNLOAD Jul 16 12:41:00.797987 kernel: audit: type=1334 audit(1752669660.786:174): prog-id=24 op=UNLOAD Jul 16 12:41:00.798046 kernel: audit: type=1334 audit(1752669660.786:175): prog-id=25 op=UNLOAD Jul 16 12:41:00.786000 audit: BPF prog-id=25 op=UNLOAD Jul 16 12:41:00.799690 kernel: audit: type=1334 audit(1752669660.788:176): prog-id=32 op=LOAD Jul 16 12:41:00.788000 audit: BPF prog-id=32 op=LOAD Jul 16 12:41:00.803426 kernel: audit: type=1334 audit(1752669660.788:177): prog-id=21 op=UNLOAD Jul 16 12:41:00.788000 audit: BPF prog-id=21 op=UNLOAD Jul 16 12:41:00.806946 kernel: audit: type=1334 audit(1752669660.791:178): prog-id=33 op=LOAD Jul 16 12:41:00.791000 audit: BPF prog-id=33 op=LOAD Jul 16 12:41:00.806323 systemd[1]: Finished ldconfig.service. Jul 16 12:41:00.807118 systemd[1]: Finished systemd-boot-update.service. Jul 16 12:41:00.791000 audit: BPF prog-id=34 op=LOAD Jul 16 12:41:00.808323 kernel: audit: type=1334 audit(1752669660.791:179): prog-id=34 op=LOAD Jul 16 12:41:00.808407 kernel: audit: type=1334 audit(1752669660.791:180): prog-id=22 op=UNLOAD Jul 16 12:41:00.791000 audit: BPF prog-id=22 op=UNLOAD Jul 16 12:41:00.791000 audit: BPF prog-id=23 op=UNLOAD Jul 16 12:41:00.794000 audit: BPF prog-id=35 op=LOAD Jul 16 12:41:00.794000 audit: BPF prog-id=27 op=UNLOAD Jul 16 12:41:00.795000 audit: BPF prog-id=36 op=LOAD Jul 16 12:41:00.795000 audit: BPF prog-id=37 op=LOAD Jul 16 12:41:00.795000 audit: BPF prog-id=28 op=UNLOAD Jul 16 12:41:00.795000 audit: BPF prog-id=29 op=UNLOAD Jul 16 12:41:00.802000 audit: BPF prog-id=38 op=LOAD Jul 16 12:41:00.809621 kernel: audit: type=1334 audit(1752669660.791:181): prog-id=23 op=UNLOAD Jul 16 12:41:00.802000 audit: BPF prog-id=26 op=UNLOAD Jul 16 12:41:00.806000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:00.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:00.812764 systemd[1]: Finished systemd-tmpfiles-setup.service. Jul 16 12:41:00.812000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:00.817137 systemd[1]: Starting audit-rules.service... Jul 16 12:41:00.819514 systemd[1]: Starting clean-ca-certificates.service... Jul 16 12:41:00.827000 audit: BPF prog-id=39 op=LOAD Jul 16 12:41:00.830000 audit: BPF prog-id=40 op=LOAD Jul 16 12:41:00.824162 systemd[1]: Starting systemd-journal-catalog-update.service... Jul 16 12:41:00.829803 systemd[1]: Starting systemd-resolved.service... Jul 16 12:41:00.832792 systemd[1]: Starting systemd-timesyncd.service... Jul 16 12:41:00.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:00.835040 systemd[1]: Starting systemd-update-utmp.service... Jul 16 12:41:00.836672 systemd[1]: Finished clean-ca-certificates.service. Jul 16 12:41:00.837804 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 16 12:41:00.845000 audit[1140]: SYSTEM_BOOT pid=1140 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jul 16 12:41:00.847000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:00.847537 systemd[1]: Finished systemd-update-utmp.service. Jul 16 12:41:00.862285 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 16 12:41:00.863897 systemd[1]: Starting modprobe@dm_mod.service... Jul 16 12:41:00.865631 systemd[1]: Starting modprobe@efi_pstore.service... Jul 16 12:41:00.868279 systemd[1]: Starting modprobe@loop.service... Jul 16 12:41:00.868778 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 16 12:41:00.868948 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 16 12:41:00.869374 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 16 12:41:00.871000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:00.871000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:00.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:00.872000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:00.873000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:00.873000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:00.871330 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 16 12:41:00.871486 systemd[1]: Finished modprobe@dm_mod.service. Jul 16 12:41:00.872264 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 16 12:41:00.872437 systemd[1]: Finished modprobe@efi_pstore.service. Jul 16 12:41:00.873192 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 16 12:41:00.873299 systemd[1]: Finished modprobe@loop.service. Jul 16 12:41:00.874655 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 16 12:41:00.874763 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 16 12:41:00.878024 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 16 12:41:00.880043 systemd[1]: Starting modprobe@dm_mod.service... Jul 16 12:41:00.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:00.888000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:00.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:00.889000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:00.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:00.890000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:00.882962 systemd[1]: Starting modprobe@efi_pstore.service... Jul 16 12:41:00.885008 systemd[1]: Starting modprobe@loop.service... Jul 16 12:41:00.886017 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 16 12:41:00.886198 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 16 12:41:00.886352 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 16 12:41:00.888713 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 16 12:41:00.888850 systemd[1]: Finished modprobe@dm_mod.service. Jul 16 12:41:00.889709 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 16 12:41:00.889826 systemd[1]: Finished modprobe@efi_pstore.service. Jul 16 12:41:00.890564 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 16 12:41:00.890702 systemd[1]: Finished modprobe@loop.service. Jul 16 12:41:00.891458 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 16 12:41:00.891565 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 16 12:41:00.896426 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 16 12:41:00.898038 systemd[1]: Starting modprobe@dm_mod.service... Jul 16 12:41:00.900842 systemd[1]: Starting modprobe@drm.service... Jul 16 12:41:00.904143 systemd[1]: Starting modprobe@efi_pstore.service... Jul 16 12:41:00.905917 systemd[1]: Starting modprobe@loop.service... Jul 16 12:41:00.906749 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 16 12:41:00.906872 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 16 12:41:00.909159 systemd[1]: Starting systemd-networkd-wait-online.service... Jul 16 12:41:00.909764 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 16 12:41:00.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:00.912000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:00.912000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:00.913000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:00.913000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:00.912076 systemd[1]: Finished systemd-journal-catalog-update.service. Jul 16 12:41:00.912896 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 16 12:41:00.913021 systemd[1]: Finished modprobe@dm_mod.service. Jul 16 12:41:00.913792 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 16 12:41:00.913907 systemd[1]: Finished modprobe@drm.service. Jul 16 12:41:00.914701 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 16 12:41:00.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:00.915000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:00.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:00.916000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:00.915890 systemd[1]: Finished modprobe@efi_pstore.service. Jul 16 12:41:00.916902 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 16 12:41:00.917029 systemd[1]: Finished modprobe@loop.service. Jul 16 12:41:00.918009 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 16 12:41:00.918110 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 16 12:41:00.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:00.920842 systemd[1]: Starting systemd-update-done.service... Jul 16 12:41:00.921971 systemd[1]: Finished ensure-sysext.service. Jul 16 12:41:00.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:00.933796 systemd[1]: Finished systemd-update-done.service. Jul 16 12:41:00.951000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jul 16 12:41:00.951000 audit[1167]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe8c846610 a2=420 a3=0 items=0 ppid=1135 pid=1167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:00.951000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Jul 16 12:41:00.952486 augenrules[1167]: No rules Jul 16 12:41:00.952895 systemd[1]: Finished audit-rules.service. Jul 16 12:41:00.960803 systemd[1]: Started systemd-timesyncd.service. Jul 16 12:41:00.961336 systemd[1]: Reached target time-set.target. Jul 16 12:41:00.969238 systemd-resolved[1138]: Positive Trust Anchors: Jul 16 12:41:00.969552 systemd-resolved[1138]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 16 12:41:00.969675 systemd-resolved[1138]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 16 12:41:00.976418 systemd-resolved[1138]: Using system hostname 'srv-78sgy.gb1.brightbox.com'. Jul 16 12:41:00.978566 systemd[1]: Started systemd-resolved.service. Jul 16 12:41:00.979836 systemd[1]: Reached target network.target. Jul 16 12:41:00.980792 systemd[1]: Reached target nss-lookup.target. Jul 16 12:41:00.981778 systemd[1]: Reached target sysinit.target. Jul 16 12:41:00.982884 systemd[1]: Started motdgen.path. Jul 16 12:41:00.983852 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Jul 16 12:41:00.985093 systemd[1]: Started logrotate.timer. Jul 16 12:41:00.985736 systemd[1]: Started mdadm.timer. Jul 16 12:41:00.986188 systemd[1]: Started systemd-tmpfiles-clean.timer. Jul 16 12:41:00.986696 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 16 12:41:00.986740 systemd[1]: Reached target paths.target. Jul 16 12:41:00.987188 systemd[1]: Reached target timers.target. Jul 16 12:41:00.988065 systemd[1]: Listening on dbus.socket. Jul 16 12:41:00.990309 systemd[1]: Starting docker.socket... Jul 16 12:41:00.995103 systemd[1]: Listening on sshd.socket. Jul 16 12:41:00.995652 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 16 12:41:00.996195 systemd[1]: Listening on docker.socket. Jul 16 12:41:01.005311 systemd[1]: Reached target sockets.target. Jul 16 12:41:01.005704 systemd[1]: Reached target basic.target. Jul 16 12:41:01.006104 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 16 12:41:01.006137 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 16 12:41:01.007511 systemd[1]: Starting containerd.service... Jul 16 12:41:01.010276 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Jul 16 12:41:01.012485 systemd[1]: Starting dbus.service... Jul 16 12:41:01.015419 systemd[1]: Starting enable-oem-cloudinit.service... Jul 16 12:41:01.020739 systemd[1]: Starting extend-filesystems.service... Jul 16 12:41:01.021155 jq[1178]: false Jul 16 12:41:01.021441 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Jul 16 12:41:01.024882 systemd[1]: Starting motdgen.service... Jul 16 12:41:01.026837 systemd[1]: Starting ssh-key-proc-cmdline.service... Jul 16 12:41:01.030705 systemd[1]: Starting sshd-keygen.service... Jul 16 12:41:01.036188 systemd[1]: Starting systemd-logind.service... Jul 16 12:41:01.036695 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 16 12:41:01.036824 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Jul 16 12:41:01.039772 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Jul 16 12:41:01.040822 systemd[1]: Starting update-engine.service... Jul 16 12:41:01.043385 systemd[1]: Starting update-ssh-keys-after-ignition.service... Jul 16 12:41:01.048101 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 16 12:41:01.054532 jq[1189]: true Jul 16 12:41:01.048465 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Jul 16 12:41:01.071410 dbus-daemon[1177]: [system] SELinux support is enabled Jul 16 12:41:01.071623 systemd[1]: Started dbus.service. Jul 16 12:41:01.074259 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Jul 16 12:41:01.074299 systemd[1]: Reached target system-config.target. Jul 16 12:41:01.074729 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Jul 16 12:41:01.074764 systemd[1]: Reached target user-config.target. Jul 16 12:41:01.078054 dbus-daemon[1177]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.3' (uid=244 pid=1029 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Jul 16 12:41:01.089459 systemd[1]: Starting systemd-hostnamed.service... Jul 16 12:41:01.092125 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 16 12:41:01.092342 systemd[1]: Finished ssh-key-proc-cmdline.service. Jul 16 12:41:01.095154 jq[1192]: true Jul 16 12:41:01.104096 extend-filesystems[1180]: Found loop1 Jul 16 12:41:01.108360 extend-filesystems[1180]: Found vda Jul 16 12:41:01.108958 extend-filesystems[1180]: Found vda1 Jul 16 12:41:01.109805 extend-filesystems[1180]: Found vda2 Jul 16 12:41:01.110402 extend-filesystems[1180]: Found vda3 Jul 16 12:41:01.110929 extend-filesystems[1180]: Found usr Jul 16 12:41:01.111760 extend-filesystems[1180]: Found vda4 Jul 16 12:41:01.111760 extend-filesystems[1180]: Found vda6 Jul 16 12:41:01.111760 extend-filesystems[1180]: Found vda7 Jul 16 12:41:01.111760 extend-filesystems[1180]: Found vda9 Jul 16 12:41:01.111760 extend-filesystems[1180]: Checking size of /dev/vda9 Jul 16 12:41:01.136009 systemd-networkd[1029]: eth0: Gained IPv6LL Jul 16 12:41:01.140206 systemd[1]: Finished systemd-networkd-wait-online.service. Jul 16 12:41:01.140855 systemd[1]: Reached target network-online.target. Jul 16 12:41:01.143960 systemd[1]: Starting kubelet.service... Jul 16 12:41:01.147619 update_engine[1187]: I0716 12:41:01.147179 1187 main.cc:92] Flatcar Update Engine starting Jul 16 12:41:01.152234 systemd[1]: Started update-engine.service. Jul 16 12:41:01.152547 update_engine[1187]: I0716 12:41:01.152308 1187 update_check_scheduler.cc:74] Next update check in 3m45s Jul 16 12:41:01.154417 systemd[1]: Started locksmithd.service. Jul 16 12:41:01.156081 extend-filesystems[1180]: Resized partition /dev/vda9 Jul 16 12:41:01.168984 extend-filesystems[1221]: resize2fs 1.46.5 (30-Dec-2021) Jul 16 12:41:01.174626 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 15121403 blocks Jul 16 12:41:01.185312 systemd[1]: motdgen.service: Deactivated successfully. Jul 16 12:41:01.185493 systemd[1]: Finished motdgen.service. Jul 16 12:41:01.219732 bash[1232]: Updated "/home/core/.ssh/authorized_keys" Jul 16 12:41:01.220100 systemd[1]: Finished update-ssh-keys-after-ignition.service. Jul 16 12:41:01.242188 systemd-logind[1186]: Watching system buttons on /dev/input/event2 (Power Button) Jul 16 12:41:01.242701 systemd-logind[1186]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Jul 16 12:41:01.243744 systemd-logind[1186]: New seat seat0. Jul 16 12:41:01.245635 kernel: EXT4-fs (vda9): resized filesystem to 15121403 Jul 16 12:41:01.255614 systemd[1]: Started systemd-logind.service. Jul 16 12:41:01.258328 extend-filesystems[1221]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Jul 16 12:41:01.258328 extend-filesystems[1221]: old_desc_blocks = 1, new_desc_blocks = 8 Jul 16 12:41:01.258328 extend-filesystems[1221]: The filesystem on /dev/vda9 is now 15121403 (4k) blocks long. Jul 16 12:41:01.261247 extend-filesystems[1180]: Resized filesystem in /dev/vda9 Jul 16 12:41:01.258651 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 16 12:41:01.258812 systemd[1]: Finished extend-filesystems.service. Jul 16 12:41:01.279387 dbus-daemon[1177]: [system] Successfully activated service 'org.freedesktop.hostname1' Jul 16 12:41:01.280946 dbus-daemon[1177]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1198 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Jul 16 12:41:01.283127 systemd[1]: Started systemd-hostnamed.service. Jul 16 12:41:01.288341 systemd[1]: Starting polkit.service... Jul 16 12:41:01.291011 env[1191]: time="2025-07-16T12:41:01.290950161Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Jul 16 12:41:01.306273 polkitd[1236]: Started polkitd version 121 Jul 16 12:41:01.309651 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 16 12:41:01.309788 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 16 12:41:01.319892 polkitd[1236]: Loading rules from directory /etc/polkit-1/rules.d Jul 16 12:41:01.320531 polkitd[1236]: Loading rules from directory /usr/share/polkit-1/rules.d Jul 16 12:41:01.323121 polkitd[1236]: Finished loading, compiling and executing 2 rules Jul 16 12:41:01.323673 dbus-daemon[1177]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Jul 16 12:41:01.324188 systemd[1]: Started polkit.service. Jul 16 12:41:01.324536 polkitd[1236]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Jul 16 12:41:01.339312 systemd-hostnamed[1198]: Hostname set to (static) Jul 16 12:41:01.382325 env[1191]: time="2025-07-16T12:41:01.382276044Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Jul 16 12:41:01.386043 env[1191]: time="2025-07-16T12:41:01.385779083Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Jul 16 12:41:01.391084 env[1191]: time="2025-07-16T12:41:01.391038022Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.188-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Jul 16 12:41:01.391084 env[1191]: time="2025-07-16T12:41:01.391074912Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Jul 16 12:41:01.391338 env[1191]: time="2025-07-16T12:41:01.391318042Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 16 12:41:01.391378 env[1191]: time="2025-07-16T12:41:01.391340481Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Jul 16 12:41:01.391378 env[1191]: time="2025-07-16T12:41:01.391355381Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Jul 16 12:41:01.391378 env[1191]: time="2025-07-16T12:41:01.391365307Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Jul 16 12:41:01.391502 env[1191]: time="2025-07-16T12:41:01.391444995Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Jul 16 12:41:01.391715 env[1191]: time="2025-07-16T12:41:01.391697852Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Jul 16 12:41:01.391875 env[1191]: time="2025-07-16T12:41:01.391855815Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 16 12:41:01.391913 env[1191]: time="2025-07-16T12:41:01.391875802Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Jul 16 12:41:01.391940 env[1191]: time="2025-07-16T12:41:01.391925925Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Jul 16 12:41:01.391977 env[1191]: time="2025-07-16T12:41:01.391939385Z" level=info msg="metadata content store policy set" policy=shared Jul 16 12:41:01.397307 env[1191]: time="2025-07-16T12:41:01.397275226Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Jul 16 12:41:01.397635 env[1191]: time="2025-07-16T12:41:01.397313993Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Jul 16 12:41:01.397635 env[1191]: time="2025-07-16T12:41:01.397346324Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Jul 16 12:41:01.397635 env[1191]: time="2025-07-16T12:41:01.397399186Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Jul 16 12:41:01.397635 env[1191]: time="2025-07-16T12:41:01.397468624Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Jul 16 12:41:01.397635 env[1191]: time="2025-07-16T12:41:01.397492454Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Jul 16 12:41:01.397635 env[1191]: time="2025-07-16T12:41:01.397506010Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Jul 16 12:41:01.397635 env[1191]: time="2025-07-16T12:41:01.397519499Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Jul 16 12:41:01.397635 env[1191]: time="2025-07-16T12:41:01.397533526Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Jul 16 12:41:01.397635 env[1191]: time="2025-07-16T12:41:01.397546983Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Jul 16 12:41:01.397635 env[1191]: time="2025-07-16T12:41:01.397568079Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Jul 16 12:41:01.397635 env[1191]: time="2025-07-16T12:41:01.397585741Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Jul 16 12:41:01.397907 env[1191]: time="2025-07-16T12:41:01.397719113Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Jul 16 12:41:01.397907 env[1191]: time="2025-07-16T12:41:01.397804722Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Jul 16 12:41:01.398152 env[1191]: time="2025-07-16T12:41:01.398121933Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Jul 16 12:41:01.398195 env[1191]: time="2025-07-16T12:41:01.398178602Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Jul 16 12:41:01.398230 env[1191]: time="2025-07-16T12:41:01.398200517Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Jul 16 12:41:01.398345 env[1191]: time="2025-07-16T12:41:01.398276997Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Jul 16 12:41:01.398380 env[1191]: time="2025-07-16T12:41:01.398349610Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Jul 16 12:41:01.398380 env[1191]: time="2025-07-16T12:41:01.398372547Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Jul 16 12:41:01.398444 env[1191]: time="2025-07-16T12:41:01.398384532Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Jul 16 12:41:01.398444 env[1191]: time="2025-07-16T12:41:01.398396952Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Jul 16 12:41:01.398444 env[1191]: time="2025-07-16T12:41:01.398410046Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Jul 16 12:41:01.398444 env[1191]: time="2025-07-16T12:41:01.398422020Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Jul 16 12:41:01.398543 env[1191]: time="2025-07-16T12:41:01.398451520Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Jul 16 12:41:01.398543 env[1191]: time="2025-07-16T12:41:01.398466329Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Jul 16 12:41:01.398629 env[1191]: time="2025-07-16T12:41:01.398615557Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Jul 16 12:41:01.398671 env[1191]: time="2025-07-16T12:41:01.398633414Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Jul 16 12:41:01.398671 env[1191]: time="2025-07-16T12:41:01.398646067Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Jul 16 12:41:01.399624 env[1191]: time="2025-07-16T12:41:01.398658089Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Jul 16 12:41:01.399675 env[1191]: time="2025-07-16T12:41:01.399625167Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Jul 16 12:41:01.399675 env[1191]: time="2025-07-16T12:41:01.399639978Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Jul 16 12:41:01.399729 env[1191]: time="2025-07-16T12:41:01.399671525Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Jul 16 12:41:01.399759 env[1191]: time="2025-07-16T12:41:01.399727491Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Jul 16 12:41:01.400075 env[1191]: time="2025-07-16T12:41:01.399974439Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Jul 16 12:41:01.401640 env[1191]: time="2025-07-16T12:41:01.400098255Z" level=info msg="Connect containerd service" Jul 16 12:41:01.401640 env[1191]: time="2025-07-16T12:41:01.400154480Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Jul 16 12:41:01.403556 env[1191]: time="2025-07-16T12:41:01.403519729Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 16 12:41:01.403658 env[1191]: time="2025-07-16T12:41:01.403630296Z" level=info msg="Start subscribing containerd event" Jul 16 12:41:01.409484 env[1191]: time="2025-07-16T12:41:01.409449311Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Jul 16 12:41:01.409655 env[1191]: time="2025-07-16T12:41:01.409638831Z" level=info msg=serving... address=/run/containerd/containerd.sock Jul 16 12:41:01.409795 env[1191]: time="2025-07-16T12:41:01.409777607Z" level=info msg="containerd successfully booted in 0.133857s" Jul 16 12:41:01.409884 systemd[1]: Started containerd.service. Jul 16 12:41:01.417938 env[1191]: time="2025-07-16T12:41:01.417877468Z" level=info msg="Start recovering state" Jul 16 12:41:01.418097 env[1191]: time="2025-07-16T12:41:01.418028455Z" level=info msg="Start event monitor" Jul 16 12:41:01.418097 env[1191]: time="2025-07-16T12:41:01.418054190Z" level=info msg="Start snapshots syncer" Jul 16 12:41:01.418097 env[1191]: time="2025-07-16T12:41:01.418064919Z" level=info msg="Start cni network conf syncer for default" Jul 16 12:41:01.418097 env[1191]: time="2025-07-16T12:41:01.418084855Z" level=info msg="Start streaming server" Jul 16 12:41:01.453877 systemd-timesyncd[1139]: Contacted time server 85.199.214.100:123 (0.flatcar.pool.ntp.org). Jul 16 12:41:01.453962 systemd-timesyncd[1139]: Initial clock synchronization to Wed 2025-07-16 12:41:01.633588 UTC. Jul 16 12:41:01.545268 locksmithd[1218]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Jul 16 12:41:01.930732 systemd-networkd[1029]: eth0: Ignoring DHCPv6 address 2a02:1348:17d:19a6:24:19ff:fef4:669a/128 (valid for 59min 59s, preferred for 59min 59s) which conflicts with 2a02:1348:17d:19a6:24:19ff:fef4:669a/64 assigned by NDisc. Jul 16 12:41:01.930741 systemd-networkd[1029]: eth0: Hint: use IPv6Token= setting to change the address generated by NDisc or set UseAutonomousPrefix=no. Jul 16 12:41:02.043768 sshd_keygen[1211]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Jul 16 12:41:02.079701 systemd[1]: Finished sshd-keygen.service. Jul 16 12:41:02.082597 systemd[1]: Starting issuegen.service... Jul 16 12:41:02.088899 systemd[1]: issuegen.service: Deactivated successfully. Jul 16 12:41:02.089058 systemd[1]: Finished issuegen.service. Jul 16 12:41:02.091211 systemd[1]: Starting systemd-user-sessions.service... Jul 16 12:41:02.105255 systemd[1]: Finished systemd-user-sessions.service. Jul 16 12:41:02.110582 systemd[1]: Started getty@tty1.service. Jul 16 12:41:02.114408 systemd[1]: Started serial-getty@ttyS0.service. Jul 16 12:41:02.115397 systemd[1]: Reached target getty.target. Jul 16 12:41:02.266447 systemd[1]: Started kubelet.service. Jul 16 12:41:02.958117 kubelet[1267]: E0716 12:41:02.958063 1267 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 16 12:41:02.960825 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 16 12:41:02.961034 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 16 12:41:02.961656 systemd[1]: kubelet.service: Consumed 1.358s CPU time. Jul 16 12:41:02.993613 systemd[1]: Created slice system-sshd.slice. Jul 16 12:41:02.997593 systemd[1]: Started sshd@0-10.244.102.154:22-147.75.109.163:45250.service. Jul 16 12:41:03.933900 sshd[1274]: Accepted publickey for core from 147.75.109.163 port 45250 ssh2: RSA SHA256:Ivm2+8c70H684DujjfFb+2an2jxY3RhHoDsFm0/t2Rg Jul 16 12:41:03.938890 sshd[1274]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 16 12:41:03.959598 systemd[1]: Created slice user-500.slice. Jul 16 12:41:03.964344 systemd[1]: Starting user-runtime-dir@500.service... Jul 16 12:41:03.972818 systemd-logind[1186]: New session 1 of user core. Jul 16 12:41:03.989446 systemd[1]: Finished user-runtime-dir@500.service. Jul 16 12:41:03.992358 systemd[1]: Starting user@500.service... Jul 16 12:41:03.997233 (systemd)[1277]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Jul 16 12:41:04.088787 systemd[1277]: Queued start job for default target default.target. Jul 16 12:41:04.090778 systemd[1277]: Reached target paths.target. Jul 16 12:41:04.091180 systemd[1277]: Reached target sockets.target. Jul 16 12:41:04.091455 systemd[1277]: Reached target timers.target. Jul 16 12:41:04.091885 systemd[1277]: Reached target basic.target. Jul 16 12:41:04.092283 systemd[1277]: Reached target default.target. Jul 16 12:41:04.092547 systemd[1]: Started user@500.service. Jul 16 12:41:04.092825 systemd[1277]: Startup finished in 87ms. Jul 16 12:41:04.100089 systemd[1]: Started session-1.scope. Jul 16 12:41:04.750869 systemd[1]: Started sshd@1-10.244.102.154:22-147.75.109.163:45264.service. Jul 16 12:41:05.667632 sshd[1287]: Accepted publickey for core from 147.75.109.163 port 45264 ssh2: RSA SHA256:Ivm2+8c70H684DujjfFb+2an2jxY3RhHoDsFm0/t2Rg Jul 16 12:41:05.672548 sshd[1287]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 16 12:41:05.679967 systemd[1]: Started session-2.scope. Jul 16 12:41:05.681790 systemd-logind[1186]: New session 2 of user core. Jul 16 12:41:06.300757 sshd[1287]: pam_unix(sshd:session): session closed for user core Jul 16 12:41:06.307356 systemd[1]: sshd@1-10.244.102.154:22-147.75.109.163:45264.service: Deactivated successfully. Jul 16 12:41:06.308131 systemd[1]: session-2.scope: Deactivated successfully. Jul 16 12:41:06.310028 systemd-logind[1186]: Session 2 logged out. Waiting for processes to exit. Jul 16 12:41:06.311695 systemd-logind[1186]: Removed session 2. Jul 16 12:41:06.451789 systemd[1]: Started sshd@2-10.244.102.154:22-147.75.109.163:45270.service. Jul 16 12:41:07.355409 sshd[1293]: Accepted publickey for core from 147.75.109.163 port 45270 ssh2: RSA SHA256:Ivm2+8c70H684DujjfFb+2an2jxY3RhHoDsFm0/t2Rg Jul 16 12:41:07.357315 sshd[1293]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 16 12:41:07.364093 systemd-logind[1186]: New session 3 of user core. Jul 16 12:41:07.366515 systemd[1]: Started session-3.scope. Jul 16 12:41:07.988383 sshd[1293]: pam_unix(sshd:session): session closed for user core Jul 16 12:41:07.994891 systemd-logind[1186]: Session 3 logged out. Waiting for processes to exit. Jul 16 12:41:07.995428 systemd[1]: sshd@2-10.244.102.154:22-147.75.109.163:45270.service: Deactivated successfully. Jul 16 12:41:07.996984 systemd[1]: session-3.scope: Deactivated successfully. Jul 16 12:41:07.998738 systemd-logind[1186]: Removed session 3. Jul 16 12:41:08.171827 coreos-metadata[1176]: Jul 16 12:41:08.171 WARN failed to locate config-drive, using the metadata service API instead Jul 16 12:41:08.217554 coreos-metadata[1176]: Jul 16 12:41:08.217 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 Jul 16 12:41:08.244438 coreos-metadata[1176]: Jul 16 12:41:08.243 INFO Fetch successful Jul 16 12:41:08.244835 coreos-metadata[1176]: Jul 16 12:41:08.244 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 Jul 16 12:41:08.270664 coreos-metadata[1176]: Jul 16 12:41:08.270 INFO Fetch successful Jul 16 12:41:08.272598 unknown[1176]: wrote ssh authorized keys file for user: core Jul 16 12:41:08.288089 update-ssh-keys[1300]: Updated "/home/core/.ssh/authorized_keys" Jul 16 12:41:08.289394 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Jul 16 12:41:08.290417 systemd[1]: Reached target multi-user.target. Jul 16 12:41:08.294221 systemd[1]: Starting systemd-update-utmp-runlevel.service... Jul 16 12:41:08.304332 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 16 12:41:08.304596 systemd[1]: Finished systemd-update-utmp-runlevel.service. Jul 16 12:41:08.307793 systemd[1]: Startup finished in 925ms (kernel) + 6.222s (initrd) + 12.407s (userspace) = 19.556s. Jul 16 12:41:13.213491 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Jul 16 12:41:13.215033 systemd[1]: Stopped kubelet.service. Jul 16 12:41:13.215149 systemd[1]: kubelet.service: Consumed 1.358s CPU time. Jul 16 12:41:13.219112 systemd[1]: Starting kubelet.service... Jul 16 12:41:13.350976 systemd[1]: Started kubelet.service. Jul 16 12:41:13.421822 kubelet[1306]: E0716 12:41:13.421733 1306 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 16 12:41:13.428055 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 16 12:41:13.428284 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 16 12:41:18.199940 systemd[1]: Started sshd@3-10.244.102.154:22-147.75.109.163:52438.service. Jul 16 12:41:19.110888 sshd[1312]: Accepted publickey for core from 147.75.109.163 port 52438 ssh2: RSA SHA256:Ivm2+8c70H684DujjfFb+2an2jxY3RhHoDsFm0/t2Rg Jul 16 12:41:19.115231 sshd[1312]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 16 12:41:19.123254 systemd[1]: Started session-4.scope. Jul 16 12:41:19.124791 systemd-logind[1186]: New session 4 of user core. Jul 16 12:41:19.735151 sshd[1312]: pam_unix(sshd:session): session closed for user core Jul 16 12:41:19.739097 systemd[1]: sshd@3-10.244.102.154:22-147.75.109.163:52438.service: Deactivated successfully. Jul 16 12:41:19.740116 systemd[1]: session-4.scope: Deactivated successfully. Jul 16 12:41:19.741999 systemd-logind[1186]: Session 4 logged out. Waiting for processes to exit. Jul 16 12:41:19.743747 systemd-logind[1186]: Removed session 4. Jul 16 12:41:19.882305 systemd[1]: Started sshd@4-10.244.102.154:22-147.75.109.163:52442.service. Jul 16 12:41:20.781204 sshd[1318]: Accepted publickey for core from 147.75.109.163 port 52442 ssh2: RSA SHA256:Ivm2+8c70H684DujjfFb+2an2jxY3RhHoDsFm0/t2Rg Jul 16 12:41:20.784755 sshd[1318]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 16 12:41:20.794418 systemd[1]: Started session-5.scope. Jul 16 12:41:20.795117 systemd-logind[1186]: New session 5 of user core. Jul 16 12:41:21.400397 sshd[1318]: pam_unix(sshd:session): session closed for user core Jul 16 12:41:21.408778 systemd[1]: sshd@4-10.244.102.154:22-147.75.109.163:52442.service: Deactivated successfully. Jul 16 12:41:21.409022 systemd-logind[1186]: Session 5 logged out. Waiting for processes to exit. Jul 16 12:41:21.409714 systemd[1]: session-5.scope: Deactivated successfully. Jul 16 12:41:21.411426 systemd-logind[1186]: Removed session 5. Jul 16 12:41:21.617743 systemd[1]: Started sshd@5-10.244.102.154:22-147.75.109.163:52456.service. Jul 16 12:41:22.522931 sshd[1324]: Accepted publickey for core from 147.75.109.163 port 52456 ssh2: RSA SHA256:Ivm2+8c70H684DujjfFb+2an2jxY3RhHoDsFm0/t2Rg Jul 16 12:41:22.525445 sshd[1324]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 16 12:41:22.536265 systemd-logind[1186]: New session 6 of user core. Jul 16 12:41:22.536825 systemd[1]: Started session-6.scope. Jul 16 12:41:23.145412 sshd[1324]: pam_unix(sshd:session): session closed for user core Jul 16 12:41:23.151363 systemd[1]: sshd@5-10.244.102.154:22-147.75.109.163:52456.service: Deactivated successfully. Jul 16 12:41:23.152291 systemd[1]: session-6.scope: Deactivated successfully. Jul 16 12:41:23.153300 systemd-logind[1186]: Session 6 logged out. Waiting for processes to exit. Jul 16 12:41:23.154524 systemd-logind[1186]: Removed session 6. Jul 16 12:41:23.292292 systemd[1]: Started sshd@6-10.244.102.154:22-147.75.109.163:52462.service. Jul 16 12:41:23.497739 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Jul 16 12:41:23.497957 systemd[1]: Stopped kubelet.service. Jul 16 12:41:23.499939 systemd[1]: Starting kubelet.service... Jul 16 12:41:23.631745 systemd[1]: Started kubelet.service. Jul 16 12:41:23.690794 kubelet[1336]: E0716 12:41:23.690747 1336 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 16 12:41:23.695080 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 16 12:41:23.695401 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 16 12:41:24.188894 sshd[1330]: Accepted publickey for core from 147.75.109.163 port 52462 ssh2: RSA SHA256:Ivm2+8c70H684DujjfFb+2an2jxY3RhHoDsFm0/t2Rg Jul 16 12:41:24.193686 sshd[1330]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 16 12:41:24.204727 systemd[1]: Started session-7.scope. Jul 16 12:41:24.205681 systemd-logind[1186]: New session 7 of user core. Jul 16 12:41:24.679833 sudo[1343]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Jul 16 12:41:24.680157 sudo[1343]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 16 12:41:24.688108 dbus-daemon[1177]: Э\xb7\xa8\x84U: received setenforce notice (enforcing=1625847232) Jul 16 12:41:24.690289 sudo[1343]: pam_unix(sudo:session): session closed for user root Jul 16 12:41:24.837391 sshd[1330]: pam_unix(sshd:session): session closed for user core Jul 16 12:41:24.845353 systemd-logind[1186]: Session 7 logged out. Waiting for processes to exit. Jul 16 12:41:24.845568 systemd[1]: sshd@6-10.244.102.154:22-147.75.109.163:52462.service: Deactivated successfully. Jul 16 12:41:24.846853 systemd[1]: session-7.scope: Deactivated successfully. Jul 16 12:41:24.849670 systemd-logind[1186]: Removed session 7. Jul 16 12:41:24.990619 systemd[1]: Started sshd@7-10.244.102.154:22-147.75.109.163:52468.service. Jul 16 12:41:25.900593 sshd[1347]: Accepted publickey for core from 147.75.109.163 port 52468 ssh2: RSA SHA256:Ivm2+8c70H684DujjfFb+2an2jxY3RhHoDsFm0/t2Rg Jul 16 12:41:25.905143 sshd[1347]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 16 12:41:25.915627 systemd-logind[1186]: New session 8 of user core. Jul 16 12:41:25.917002 systemd[1]: Started session-8.scope. Jul 16 12:41:26.383120 sudo[1351]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Jul 16 12:41:26.383979 sudo[1351]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 16 12:41:26.388710 sudo[1351]: pam_unix(sudo:session): session closed for user root Jul 16 12:41:26.395688 sudo[1350]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Jul 16 12:41:26.395942 sudo[1350]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 16 12:41:26.412051 systemd[1]: Stopping audit-rules.service... Jul 16 12:41:26.412000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 16 12:41:26.416661 auditctl[1354]: No rules Jul 16 12:41:26.417121 kernel: kauditd_printk_skb: 42 callbacks suppressed Jul 16 12:41:26.417213 kernel: audit: type=1305 audit(1752669686.412:222): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 16 12:41:26.419761 kernel: audit: type=1300 audit(1752669686.412:222): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdf37df890 a2=420 a3=0 items=0 ppid=1 pid=1354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:26.412000 audit[1354]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdf37df890 a2=420 a3=0 items=0 ppid=1 pid=1354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:26.417752 systemd[1]: audit-rules.service: Deactivated successfully. Jul 16 12:41:26.417993 systemd[1]: Stopped audit-rules.service. Jul 16 12:41:26.426335 kernel: audit: type=1327 audit(1752669686.412:222): proctitle=2F7362696E2F617564697463746C002D44 Jul 16 12:41:26.426430 kernel: audit: type=1131 audit(1752669686.417:223): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:26.412000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Jul 16 12:41:26.417000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:26.423793 systemd[1]: Starting audit-rules.service... Jul 16 12:41:26.445531 augenrules[1371]: No rules Jul 16 12:41:26.447018 systemd[1]: Finished audit-rules.service. Jul 16 12:41:26.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:26.450645 kernel: audit: type=1130 audit(1752669686.446:224): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:26.450754 sudo[1350]: pam_unix(sudo:session): session closed for user root Jul 16 12:41:26.450000 audit[1350]: USER_END pid=1350 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 16 12:41:26.450000 audit[1350]: CRED_DISP pid=1350 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 16 12:41:26.458269 kernel: audit: type=1106 audit(1752669686.450:225): pid=1350 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 16 12:41:26.458361 kernel: audit: type=1104 audit(1752669686.450:226): pid=1350 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 16 12:41:26.596050 sshd[1347]: pam_unix(sshd:session): session closed for user core Jul 16 12:41:26.597000 audit[1347]: USER_END pid=1347 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:26.605343 systemd[1]: sshd@7-10.244.102.154:22-147.75.109.163:52468.service: Deactivated successfully. Jul 16 12:41:26.605645 kernel: audit: type=1106 audit(1752669686.597:227): pid=1347 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:26.597000 audit[1347]: CRED_DISP pid=1347 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:26.606141 systemd[1]: session-8.scope: Deactivated successfully. Jul 16 12:41:26.610415 systemd-logind[1186]: Session 8 logged out. Waiting for processes to exit. Jul 16 12:41:26.611672 kernel: audit: type=1104 audit(1752669686.597:228): pid=1347 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:26.611749 kernel: audit: type=1131 audit(1752669686.604:229): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.244.102.154:22-147.75.109.163:52468 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:26.604000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.244.102.154:22-147.75.109.163:52468 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:26.614367 systemd-logind[1186]: Removed session 8. Jul 16 12:41:26.749969 systemd[1]: Started sshd@8-10.244.102.154:22-147.75.109.163:52480.service. Jul 16 12:41:26.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.244.102.154:22-147.75.109.163:52480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:27.655000 audit[1377]: USER_ACCT pid=1377 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:27.657058 sshd[1377]: Accepted publickey for core from 147.75.109.163 port 52480 ssh2: RSA SHA256:Ivm2+8c70H684DujjfFb+2an2jxY3RhHoDsFm0/t2Rg Jul 16 12:41:27.657000 audit[1377]: CRED_ACQ pid=1377 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:27.658000 audit[1377]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6cee3f50 a2=3 a3=0 items=0 ppid=1 pid=1377 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:27.658000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 16 12:41:27.660292 sshd[1377]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 16 12:41:27.671121 systemd[1]: Started session-9.scope. Jul 16 12:41:27.672199 systemd-logind[1186]: New session 9 of user core. Jul 16 12:41:27.679000 audit[1377]: USER_START pid=1377 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:27.681000 audit[1379]: CRED_ACQ pid=1379 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:28.139000 audit[1380]: USER_ACCT pid=1380 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 16 12:41:28.139000 audit[1380]: CRED_REFR pid=1380 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 16 12:41:28.140153 sudo[1380]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Jul 16 12:41:28.140631 sudo[1380]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 16 12:41:28.143000 audit[1380]: USER_START pid=1380 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 16 12:41:28.166235 systemd[1]: Starting coreos-metadata.service... Jul 16 12:41:31.957095 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Jul 16 12:41:31.965859 kernel: kauditd_printk_skb: 11 callbacks suppressed Jul 16 12:41:31.966013 kernel: audit: type=1131 audit(1752669691.956:239): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:31.956000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:31.975000 audit: BPF prog-id=46 op=UNLOAD Jul 16 12:41:31.975000 audit: BPF prog-id=45 op=UNLOAD Jul 16 12:41:31.982676 kernel: audit: type=1334 audit(1752669691.975:240): prog-id=46 op=UNLOAD Jul 16 12:41:31.982840 kernel: audit: type=1334 audit(1752669691.975:241): prog-id=45 op=UNLOAD Jul 16 12:41:31.982912 kernel: audit: type=1334 audit(1752669691.975:242): prog-id=44 op=UNLOAD Jul 16 12:41:31.975000 audit: BPF prog-id=44 op=UNLOAD Jul 16 12:41:33.747951 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Jul 16 12:41:33.748466 systemd[1]: Stopped kubelet.service. Jul 16 12:41:33.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:33.757782 kernel: audit: type=1130 audit(1752669693.747:243): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:33.754336 systemd[1]: Starting kubelet.service... Jul 16 12:41:33.747000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:33.763628 kernel: audit: type=1131 audit(1752669693.747:244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:33.877000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:33.877801 systemd[1]: Started kubelet.service. Jul 16 12:41:33.883659 kernel: audit: type=1130 audit(1752669693.877:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:33.931189 kubelet[1395]: E0716 12:41:33.931067 1395 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 16 12:41:33.934251 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 16 12:41:33.934525 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 16 12:41:33.934000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 16 12:41:33.938726 kernel: audit: type=1131 audit(1752669693.934:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 16 12:41:35.236110 coreos-metadata[1384]: Jul 16 12:41:35.235 WARN failed to locate config-drive, using the metadata service API instead Jul 16 12:41:35.286823 coreos-metadata[1384]: Jul 16 12:41:35.286 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Jul 16 12:41:35.288542 coreos-metadata[1384]: Jul 16 12:41:35.288 INFO Fetch successful Jul 16 12:41:35.289029 coreos-metadata[1384]: Jul 16 12:41:35.288 INFO Fetching http://169.254.169.254/latest/meta-data/instance-id: Attempt #1 Jul 16 12:41:35.301736 coreos-metadata[1384]: Jul 16 12:41:35.301 INFO Fetch successful Jul 16 12:41:35.302207 coreos-metadata[1384]: Jul 16 12:41:35.301 INFO Fetching http://169.254.169.254/latest/meta-data/instance-type: Attempt #1 Jul 16 12:41:35.324030 coreos-metadata[1384]: Jul 16 12:41:35.323 INFO Fetch successful Jul 16 12:41:35.324514 coreos-metadata[1384]: Jul 16 12:41:35.324 INFO Fetching http://169.254.169.254/latest/meta-data/local-ipv4: Attempt #1 Jul 16 12:41:35.342333 coreos-metadata[1384]: Jul 16 12:41:35.341 INFO Fetch successful Jul 16 12:41:35.342916 coreos-metadata[1384]: Jul 16 12:41:35.342 INFO Fetching http://169.254.169.254/latest/meta-data/public-ipv4: Attempt #1 Jul 16 12:41:35.364508 coreos-metadata[1384]: Jul 16 12:41:35.364 INFO Fetch successful Jul 16 12:41:35.377184 systemd[1]: Finished coreos-metadata.service. Jul 16 12:41:35.378000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:35.385296 kernel: audit: type=1130 audit(1752669695.378:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:36.133000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:36.133871 systemd[1]: Stopped kubelet.service. Jul 16 12:41:36.135000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:36.137710 kernel: audit: type=1130 audit(1752669696.133:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:36.141496 systemd[1]: Starting kubelet.service... Jul 16 12:41:36.171147 systemd[1]: Reloading. Jul 16 12:41:36.283876 /usr/lib/systemd/system-generators/torcx-generator[1451]: time="2025-07-16T12:41:36Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" Jul 16 12:41:36.283905 /usr/lib/systemd/system-generators/torcx-generator[1451]: time="2025-07-16T12:41:36Z" level=info msg="torcx already run" Jul 16 12:41:36.382488 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 16 12:41:36.382515 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 16 12:41:36.402161 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 16 12:41:36.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.466000 audit: BPF prog-id=49 op=LOAD Jul 16 12:41:36.466000 audit: BPF prog-id=41 op=UNLOAD Jul 16 12:41:36.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.466000 audit: BPF prog-id=50 op=LOAD Jul 16 12:41:36.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.467000 audit: BPF prog-id=51 op=LOAD Jul 16 12:41:36.467000 audit: BPF prog-id=42 op=UNLOAD Jul 16 12:41:36.467000 audit: BPF prog-id=43 op=UNLOAD Jul 16 12:41:36.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.467000 audit: BPF prog-id=52 op=LOAD Jul 16 12:41:36.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.467000 audit: BPF prog-id=53 op=LOAD Jul 16 12:41:36.467000 audit: BPF prog-id=30 op=UNLOAD Jul 16 12:41:36.467000 audit: BPF prog-id=31 op=UNLOAD Jul 16 12:41:36.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.469000 audit: BPF prog-id=54 op=LOAD Jul 16 12:41:36.469000 audit: BPF prog-id=47 op=UNLOAD Jul 16 12:41:36.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.471000 audit: BPF prog-id=55 op=LOAD Jul 16 12:41:36.471000 audit: BPF prog-id=39 op=UNLOAD Jul 16 12:41:36.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.473000 audit: BPF prog-id=56 op=LOAD Jul 16 12:41:36.473000 audit: BPF prog-id=32 op=UNLOAD Jul 16 12:41:36.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.473000 audit: BPF prog-id=57 op=LOAD Jul 16 12:41:36.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.473000 audit: BPF prog-id=58 op=LOAD Jul 16 12:41:36.473000 audit: BPF prog-id=33 op=UNLOAD Jul 16 12:41:36.473000 audit: BPF prog-id=34 op=UNLOAD Jul 16 12:41:36.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.474000 audit: BPF prog-id=59 op=LOAD Jul 16 12:41:36.474000 audit: BPF prog-id=35 op=UNLOAD Jul 16 12:41:36.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.475000 audit: BPF prog-id=60 op=LOAD Jul 16 12:41:36.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.475000 audit: BPF prog-id=61 op=LOAD Jul 16 12:41:36.475000 audit: BPF prog-id=36 op=UNLOAD Jul 16 12:41:36.475000 audit: BPF prog-id=37 op=UNLOAD Jul 16 12:41:36.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.476000 audit: BPF prog-id=62 op=LOAD Jul 16 12:41:36.476000 audit: BPF prog-id=40 op=UNLOAD Jul 16 12:41:36.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:36.479000 audit: BPF prog-id=63 op=LOAD Jul 16 12:41:36.479000 audit: BPF prog-id=38 op=UNLOAD Jul 16 12:41:36.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:36.497080 systemd[1]: Started kubelet.service. Jul 16 12:41:36.501699 systemd[1]: Stopping kubelet.service... Jul 16 12:41:36.502340 systemd[1]: kubelet.service: Deactivated successfully. Jul 16 12:41:36.502514 systemd[1]: Stopped kubelet.service. Jul 16 12:41:36.500000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:36.504392 systemd[1]: Starting kubelet.service... Jul 16 12:41:36.621147 systemd[1]: Started kubelet.service. Jul 16 12:41:36.620000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:36.665918 kubelet[1510]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 16 12:41:36.665918 kubelet[1510]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Jul 16 12:41:36.665918 kubelet[1510]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 16 12:41:36.665918 kubelet[1510]: I0716 12:41:36.665794 1510 server.go:211] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 16 12:41:37.007054 kubelet[1510]: I0716 12:41:37.007002 1510 server.go:491] "Kubelet version" kubeletVersion="v1.31.8" Jul 16 12:41:37.007322 kubelet[1510]: I0716 12:41:37.007306 1510 server.go:493] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 16 12:41:37.007791 kubelet[1510]: I0716 12:41:37.007769 1510 server.go:934] "Client rotation is on, will bootstrap in background" Jul 16 12:41:37.079829 kubelet[1510]: I0716 12:41:37.079786 1510 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 16 12:41:37.089937 kubelet[1510]: E0716 12:41:37.089880 1510 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Jul 16 12:41:37.089937 kubelet[1510]: I0716 12:41:37.089936 1510 server.go:1408] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Jul 16 12:41:37.098952 kubelet[1510]: I0716 12:41:37.098918 1510 server.go:749] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 16 12:41:37.099749 kubelet[1510]: I0716 12:41:37.099729 1510 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Jul 16 12:41:37.099984 kubelet[1510]: I0716 12:41:37.099942 1510 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 16 12:41:37.100240 kubelet[1510]: I0716 12:41:37.099984 1510 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.244.102.154","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Jul 16 12:41:37.100447 kubelet[1510]: I0716 12:41:37.100272 1510 topology_manager.go:138] "Creating topology manager with none policy" Jul 16 12:41:37.100447 kubelet[1510]: I0716 12:41:37.100284 1510 container_manager_linux.go:300] "Creating device plugin manager" Jul 16 12:41:37.100447 kubelet[1510]: I0716 12:41:37.100415 1510 state_mem.go:36] "Initialized new in-memory state store" Jul 16 12:41:37.106262 kubelet[1510]: I0716 12:41:37.106215 1510 kubelet.go:408] "Attempting to sync node with API server" Jul 16 12:41:37.106262 kubelet[1510]: I0716 12:41:37.106265 1510 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 16 12:41:37.106396 kubelet[1510]: I0716 12:41:37.106315 1510 kubelet.go:314] "Adding apiserver pod source" Jul 16 12:41:37.106396 kubelet[1510]: I0716 12:41:37.106347 1510 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 16 12:41:37.110176 kubelet[1510]: E0716 12:41:37.109740 1510 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:41:37.110176 kubelet[1510]: E0716 12:41:37.109795 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:41:37.110701 kubelet[1510]: I0716 12:41:37.110683 1510 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 16 12:41:37.111290 kubelet[1510]: I0716 12:41:37.111269 1510 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Jul 16 12:41:37.111364 kubelet[1510]: W0716 12:41:37.111345 1510 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Jul 16 12:41:37.113979 kubelet[1510]: I0716 12:41:37.113959 1510 server.go:1274] "Started kubelet" Jul 16 12:41:37.125000 audit[1510]: AVC avc: denied { mac_admin } for pid=1510 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:37.131526 kernel: kauditd_printk_skb: 176 callbacks suppressed Jul 16 12:41:37.131729 kernel: audit: type=1400 audit(1752669697.125:425): avc: denied { mac_admin } for pid=1510 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:37.131852 kubelet[1510]: I0716 12:41:37.127101 1510 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Jul 16 12:41:37.131852 kubelet[1510]: I0716 12:41:37.127159 1510 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Jul 16 12:41:37.131852 kubelet[1510]: I0716 12:41:37.127245 1510 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 16 12:41:37.135815 kernel: audit: type=1401 audit(1752669697.125:425): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 16 12:41:37.135924 kernel: audit: type=1300 audit(1752669697.125:425): arch=c000003e syscall=188 success=no exit=-22 a0=c000780c60 a1=c0002ded80 a2=c000780c30 a3=25 items=0 ppid=1 pid=1510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:37.125000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 16 12:41:37.125000 audit[1510]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000780c60 a1=c0002ded80 a2=c000780c30 a3=25 items=0 ppid=1 pid=1510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:37.141229 kubelet[1510]: I0716 12:41:37.141161 1510 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Jul 16 12:41:37.125000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 16 12:41:37.142686 kubelet[1510]: I0716 12:41:37.142663 1510 server.go:449] "Adding debug handlers to kubelet server" Jul 16 12:41:37.144016 kubelet[1510]: I0716 12:41:37.143982 1510 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Jul 16 12:41:37.144320 kubelet[1510]: I0716 12:41:37.144305 1510 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 16 12:41:37.144681 kubelet[1510]: I0716 12:41:37.144664 1510 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Jul 16 12:41:37.145687 kernel: audit: type=1327 audit(1752669697.125:425): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 16 12:41:37.145778 kernel: audit: type=1400 audit(1752669697.125:426): avc: denied { mac_admin } for pid=1510 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:37.125000 audit[1510]: AVC avc: denied { mac_admin } for pid=1510 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:37.146065 kubelet[1510]: I0716 12:41:37.146048 1510 volume_manager.go:289] "Starting Kubelet Volume Manager" Jul 16 12:41:37.147822 kubelet[1510]: E0716 12:41:37.147801 1510 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.244.102.154\" not found" Jul 16 12:41:37.148189 kubelet[1510]: I0716 12:41:37.148174 1510 desired_state_of_world_populator.go:147] "Desired state populator starts to run" Jul 16 12:41:37.148330 kubelet[1510]: I0716 12:41:37.148319 1510 reconciler.go:26] "Reconciler: start to sync state" Jul 16 12:41:37.152451 kubelet[1510]: E0716 12:41:37.152434 1510 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Jul 16 12:41:37.125000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 16 12:41:37.153104 kubelet[1510]: I0716 12:41:37.153089 1510 factory.go:221] Registration of the containerd container factory successfully Jul 16 12:41:37.153174 kubelet[1510]: I0716 12:41:37.153164 1510 factory.go:221] Registration of the systemd container factory successfully Jul 16 12:41:37.153322 kubelet[1510]: I0716 12:41:37.153307 1510 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Jul 16 12:41:37.125000 audit[1510]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000386aa0 a1=c0002ded98 a2=c000780cf0 a3=25 items=0 ppid=1 pid=1510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:37.158674 kernel: audit: type=1401 audit(1752669697.125:426): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 16 12:41:37.158735 kernel: audit: type=1300 audit(1752669697.125:426): arch=c000003e syscall=188 success=no exit=-22 a0=c000386aa0 a1=c0002ded98 a2=c000780cf0 a3=25 items=0 ppid=1 pid=1510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:37.158773 kernel: audit: type=1327 audit(1752669697.125:426): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 16 12:41:37.125000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 16 12:41:37.167416 kubelet[1510]: I0716 12:41:37.167392 1510 cpu_manager.go:214] "Starting CPU manager" policy="none" Jul 16 12:41:37.167416 kubelet[1510]: I0716 12:41:37.167412 1510 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Jul 16 12:41:37.167584 kubelet[1510]: I0716 12:41:37.167434 1510 state_mem.go:36] "Initialized new in-memory state store" Jul 16 12:41:37.169381 kubelet[1510]: I0716 12:41:37.169277 1510 policy_none.go:49] "None policy: Start" Jul 16 12:41:37.171893 kubelet[1510]: I0716 12:41:37.171456 1510 memory_manager.go:170] "Starting memorymanager" policy="None" Jul 16 12:41:37.171893 kubelet[1510]: I0716 12:41:37.171495 1510 state_mem.go:35] "Initializing new in-memory state store" Jul 16 12:41:37.173541 kubelet[1510]: W0716 12:41:37.173517 1510 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Jul 16 12:41:37.173739 kubelet[1510]: E0716 12:41:37.173719 1510 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User \"system:anonymous\" cannot list resource \"csidrivers\" in API group \"storage.k8s.io\" at the cluster scope" logger="UnhandledError" Jul 16 12:41:37.173923 kubelet[1510]: W0716 12:41:37.173910 1510 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "10.244.102.154" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Jul 16 12:41:37.174033 kubelet[1510]: E0716 12:41:37.174020 1510 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes \"10.244.102.154\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" Jul 16 12:41:37.174475 kubelet[1510]: W0716 12:41:37.174452 1510 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Jul 16 12:41:37.174577 kubelet[1510]: E0716 12:41:37.174560 1510 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" Jul 16 12:41:37.180958 kubelet[1510]: E0716 12:41:37.174821 1510 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.244.102.154.1852bbcdb1111bcf default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.244.102.154,UID:10.244.102.154,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:10.244.102.154,},FirstTimestamp:2025-07-16 12:41:37.113922511 +0000 UTC m=+0.484806342,LastTimestamp:2025-07-16 12:41:37.113922511 +0000 UTC m=+0.484806342,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.244.102.154,}" Jul 16 12:41:37.181355 kubelet[1510]: E0716 12:41:37.181329 1510 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.244.102.154\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Jul 16 12:41:37.187481 systemd[1]: Created slice kubepods.slice. Jul 16 12:41:37.191050 kubelet[1510]: E0716 12:41:37.190974 1510 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.244.102.154.1852bbcdb35c915d default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.244.102.154,UID:10.244.102.154,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:10.244.102.154,},FirstTimestamp:2025-07-16 12:41:37.152422237 +0000 UTC m=+0.523306067,LastTimestamp:2025-07-16 12:41:37.152422237 +0000 UTC m=+0.523306067,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.244.102.154,}" Jul 16 12:41:37.194661 systemd[1]: Created slice kubepods-burstable.slice. Jul 16 12:41:37.198146 systemd[1]: Created slice kubepods-besteffort.slice. Jul 16 12:41:37.201745 kubelet[1510]: E0716 12:41:37.201667 1510 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.244.102.154.1852bbcdb42a9265 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.244.102.154,UID:10.244.102.154,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientMemory,Message:Node 10.244.102.154 status is now: NodeHasSufficientMemory,Source:EventSource{Component:kubelet,Host:10.244.102.154,},FirstTimestamp:2025-07-16 12:41:37.165922917 +0000 UTC m=+0.536806747,LastTimestamp:2025-07-16 12:41:37.165922917 +0000 UTC m=+0.536806747,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.244.102.154,}" Jul 16 12:41:37.207190 kubelet[1510]: I0716 12:41:37.207163 1510 manager.go:513] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Jul 16 12:41:37.206000 audit[1510]: AVC avc: denied { mac_admin } for pid=1510 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:37.211420 kubelet[1510]: I0716 12:41:37.211382 1510 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Jul 16 12:41:37.211613 kernel: audit: type=1400 audit(1752669697.206:427): avc: denied { mac_admin } for pid=1510 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:37.211855 kubelet[1510]: I0716 12:41:37.211839 1510 eviction_manager.go:189] "Eviction manager: starting control loop" Jul 16 12:41:37.212057 kubelet[1510]: I0716 12:41:37.212002 1510 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Jul 16 12:41:37.212670 kubelet[1510]: I0716 12:41:37.212646 1510 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 16 12:41:37.216453 kernel: audit: type=1401 audit(1752669697.206:427): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 16 12:41:37.206000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 16 12:41:37.216670 kubelet[1510]: E0716 12:41:37.216134 1510 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.244.102.154.1852bbcdb42ac0a1 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.244.102.154,UID:10.244.102.154,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasNoDiskPressure,Message:Node 10.244.102.154 status is now: NodeHasNoDiskPressure,Source:EventSource{Component:kubelet,Host:10.244.102.154,},FirstTimestamp:2025-07-16 12:41:37.165934753 +0000 UTC m=+0.536818582,LastTimestamp:2025-07-16 12:41:37.165934753 +0000 UTC m=+0.536818582,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.244.102.154,}" Jul 16 12:41:37.206000 audit[1510]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e1a870 a1=c000d71518 a2=c000e1a840 a3=25 items=0 ppid=1 pid=1510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:37.206000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 16 12:41:37.222117 kubelet[1510]: E0716 12:41:37.222098 1510 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.244.102.154\" not found" Jul 16 12:41:37.225016 kubelet[1510]: E0716 12:41:37.224921 1510 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.244.102.154.1852bbcdb42acc73 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.244.102.154,UID:10.244.102.154,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientPID,Message:Node 10.244.102.154 status is now: NodeHasSufficientPID,Source:EventSource{Component:kubelet,Host:10.244.102.154,},FirstTimestamp:2025-07-16 12:41:37.165937779 +0000 UTC m=+0.536821608,LastTimestamp:2025-07-16 12:41:37.165937779 +0000 UTC m=+0.536821608,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.244.102.154,}" Jul 16 12:41:37.231000 audit[1528]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1528 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:41:37.231000 audit[1528]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd8d7f5310 a2=0 a3=7ffd8d7f52fc items=0 ppid=1510 pid=1528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:37.231000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 16 12:41:37.233228 kubelet[1510]: E0716 12:41:37.233147 1510 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.244.102.154.1852bbcdb7471d40 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.244.102.154,UID:10.244.102.154,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeAllocatableEnforced,Message:Updated Node Allocatable limit across pods,Source:EventSource{Component:kubelet,Host:10.244.102.154,},FirstTimestamp:2025-07-16 12:41:37.21812512 +0000 UTC m=+0.589008950,LastTimestamp:2025-07-16 12:41:37.21812512 +0000 UTC m=+0.589008950,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.244.102.154,}" Jul 16 12:41:37.233000 audit[1530]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1530 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:41:37.233000 audit[1530]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffd2b0636b0 a2=0 a3=7ffd2b06369c items=0 ppid=1510 pid=1530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:37.233000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 16 12:41:37.235000 audit[1532]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1532 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:41:37.235000 audit[1532]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc86973a60 a2=0 a3=7ffc86973a4c items=0 ppid=1510 pid=1532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:37.235000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 16 12:41:37.256000 audit[1537]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1537 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:41:37.256000 audit[1537]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffd70fc5f0 a2=0 a3=7fffd70fc5dc items=0 ppid=1510 pid=1537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:37.256000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 16 12:41:37.319944 kubelet[1510]: I0716 12:41:37.319884 1510 kubelet_node_status.go:72] "Attempting to register node" node="10.244.102.154" Jul 16 12:41:37.328000 audit[1542]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1542 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:41:37.328000 audit[1542]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffd2892eee0 a2=0 a3=7ffd2892eecc items=0 ppid=1510 pid=1542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:37.328000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Jul 16 12:41:37.329980 kubelet[1510]: I0716 12:41:37.329918 1510 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Jul 16 12:41:37.331000 audit[1544]: NETFILTER_CFG table=mangle:7 family=2 entries=1 op=nft_register_chain pid=1544 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:41:37.331000 audit[1544]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcbffd3050 a2=0 a3=7ffcbffd303c items=0 ppid=1510 pid=1544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:37.331000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 16 12:41:37.332000 audit[1543]: NETFILTER_CFG table=mangle:8 family=10 entries=2 op=nft_register_chain pid=1543 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:41:37.332000 audit[1543]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc4ed1a740 a2=0 a3=7ffc4ed1a72c items=0 ppid=1510 pid=1543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:37.332000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 16 12:41:37.333161 kubelet[1510]: I0716 12:41:37.333143 1510 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Jul 16 12:41:37.333275 kubelet[1510]: I0716 12:41:37.333266 1510 status_manager.go:217] "Starting to sync pod status with apiserver" Jul 16 12:41:37.333479 kubelet[1510]: I0716 12:41:37.333468 1510 kubelet.go:2321] "Starting kubelet main sync loop" Jul 16 12:41:37.333715 kubelet[1510]: E0716 12:41:37.333685 1510 kubelet.go:2345] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Jul 16 12:41:37.334000 audit[1545]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=1545 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:41:37.334000 audit[1545]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc6cca3d00 a2=0 a3=7ffc6cca3cec items=0 ppid=1510 pid=1545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:37.334000 audit[1546]: NETFILTER_CFG table=mangle:10 family=10 entries=1 op=nft_register_chain pid=1546 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:41:37.334000 audit[1546]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdc8fad3c0 a2=0 a3=7ffdc8fad3ac items=0 ppid=1510 pid=1546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:37.334000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 16 12:41:37.334000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 16 12:41:37.335000 audit[1547]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1547 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:41:37.335000 audit[1547]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd6ab775a0 a2=0 a3=7ffd6ab7758c items=0 ppid=1510 pid=1547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:37.335000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 16 12:41:37.336000 audit[1548]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1548 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:41:37.336000 audit[1548]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe83ccb7d0 a2=0 a3=7ffe83ccb7bc items=0 ppid=1510 pid=1548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:37.336000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 16 12:41:37.336000 audit[1549]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1549 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:41:37.336000 audit[1549]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdc8ad1a00 a2=0 a3=7ffdc8ad19ec items=0 ppid=1510 pid=1549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:37.336000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 16 12:41:37.348018 kubelet[1510]: I0716 12:41:37.347974 1510 kubelet_node_status.go:75] "Successfully registered node" node="10.244.102.154" Jul 16 12:41:37.348018 kubelet[1510]: E0716 12:41:37.348024 1510 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"10.244.102.154\": node \"10.244.102.154\" not found" Jul 16 12:41:37.381299 kubelet[1510]: E0716 12:41:37.381194 1510 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.244.102.154\" not found" Jul 16 12:41:37.482658 kubelet[1510]: E0716 12:41:37.482560 1510 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.244.102.154\" not found" Jul 16 12:41:37.584230 kubelet[1510]: E0716 12:41:37.584081 1510 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.244.102.154\" not found" Jul 16 12:41:37.670512 sudo[1380]: pam_unix(sudo:session): session closed for user root Jul 16 12:41:37.671000 audit[1380]: USER_END pid=1380 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 16 12:41:37.671000 audit[1380]: CRED_DISP pid=1380 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 16 12:41:37.684774 kubelet[1510]: E0716 12:41:37.684723 1510 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.244.102.154\" not found" Jul 16 12:41:37.786367 kubelet[1510]: E0716 12:41:37.786293 1510 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.244.102.154\" not found" Jul 16 12:41:37.818023 sshd[1377]: pam_unix(sshd:session): session closed for user core Jul 16 12:41:37.821000 audit[1377]: USER_END pid=1377 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:37.821000 audit[1377]: CRED_DISP pid=1377 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Jul 16 12:41:37.825654 systemd[1]: sshd@8-10.244.102.154:22-147.75.109.163:52480.service: Deactivated successfully. Jul 16 12:41:37.827040 systemd[1]: session-9.scope: Deactivated successfully. Jul 16 12:41:37.825000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.244.102.154:22-147.75.109.163:52480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 16 12:41:37.828671 systemd-logind[1186]: Session 9 logged out. Waiting for processes to exit. Jul 16 12:41:37.830313 systemd-logind[1186]: Removed session 9. Jul 16 12:41:37.887455 kubelet[1510]: E0716 12:41:37.887265 1510 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.244.102.154\" not found" Jul 16 12:41:37.989382 kubelet[1510]: E0716 12:41:37.989217 1510 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.244.102.154\" not found" Jul 16 12:41:38.010885 kubelet[1510]: I0716 12:41:38.010780 1510 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Jul 16 12:41:38.011433 kubelet[1510]: W0716 12:41:38.011346 1510 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Jul 16 12:41:38.090160 kubelet[1510]: E0716 12:41:38.090064 1510 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.244.102.154\" not found" Jul 16 12:41:38.110738 kubelet[1510]: E0716 12:41:38.110654 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:41:38.190914 kubelet[1510]: E0716 12:41:38.190167 1510 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.244.102.154\" not found" Jul 16 12:41:38.291484 kubelet[1510]: E0716 12:41:38.291400 1510 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.244.102.154\" not found" Jul 16 12:41:38.393849 kubelet[1510]: I0716 12:41:38.393807 1510 kuberuntime_manager.go:1635] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Jul 16 12:41:38.395030 env[1191]: time="2025-07-16T12:41:38.394833328Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Jul 16 12:41:38.395699 kubelet[1510]: I0716 12:41:38.395306 1510 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Jul 16 12:41:39.111758 kubelet[1510]: E0716 12:41:39.111692 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:41:39.112883 kubelet[1510]: I0716 12:41:39.112817 1510 apiserver.go:52] "Watching apiserver" Jul 16 12:41:39.122364 kubelet[1510]: E0716 12:41:39.122279 1510 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-shkf4" podUID="2fcf4458-9494-4dc8-b20e-0300cabbff4b" Jul 16 12:41:39.129661 systemd[1]: Created slice kubepods-besteffort-pod1b0e5705_0bcc_443c_8671_9e8712eea782.slice. Jul 16 12:41:39.142845 systemd[1]: Created slice kubepods-besteffort-podb2130e0f_8a49_4082_b5ea_1701db9e40f6.slice. Jul 16 12:41:39.148753 kubelet[1510]: I0716 12:41:39.148720 1510 desired_state_of_world_populator.go:155] "Finished populating initial desired state of world" Jul 16 12:41:39.159822 kubelet[1510]: I0716 12:41:39.159775 1510 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/b2130e0f-8a49-4082-b5ea-1701db9e40f6-policysync\") pod \"calico-node-jhd9s\" (UID: \"b2130e0f-8a49-4082-b5ea-1701db9e40f6\") " pod="calico-system/calico-node-jhd9s" Jul 16 12:41:39.160070 kubelet[1510]: I0716 12:41:39.160050 1510 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mrfzs\" (UniqueName: \"kubernetes.io/projected/1b0e5705-0bcc-443c-8671-9e8712eea782-kube-api-access-mrfzs\") pod \"kube-proxy-rmr8w\" (UID: \"1b0e5705-0bcc-443c-8671-9e8712eea782\") " pod="kube-system/kube-proxy-rmr8w" Jul 16 12:41:39.160227 kubelet[1510]: I0716 12:41:39.160208 1510 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/2fcf4458-9494-4dc8-b20e-0300cabbff4b-kubelet-dir\") pod \"csi-node-driver-shkf4\" (UID: \"2fcf4458-9494-4dc8-b20e-0300cabbff4b\") " pod="calico-system/csi-node-driver-shkf4" Jul 16 12:41:39.160349 kubelet[1510]: I0716 12:41:39.160331 1510 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/2fcf4458-9494-4dc8-b20e-0300cabbff4b-registration-dir\") pod \"csi-node-driver-shkf4\" (UID: \"2fcf4458-9494-4dc8-b20e-0300cabbff4b\") " pod="calico-system/csi-node-driver-shkf4" Jul 16 12:41:39.160471 kubelet[1510]: I0716 12:41:39.160451 1510 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/2fcf4458-9494-4dc8-b20e-0300cabbff4b-socket-dir\") pod \"csi-node-driver-shkf4\" (UID: \"2fcf4458-9494-4dc8-b20e-0300cabbff4b\") " pod="calico-system/csi-node-driver-shkf4" Jul 16 12:41:39.161457 kubelet[1510]: I0716 12:41:39.160584 1510 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/b2130e0f-8a49-4082-b5ea-1701db9e40f6-cni-bin-dir\") pod \"calico-node-jhd9s\" (UID: \"b2130e0f-8a49-4082-b5ea-1701db9e40f6\") " pod="calico-system/calico-node-jhd9s" Jul 16 12:41:39.161675 kubelet[1510]: I0716 12:41:39.161643 1510 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/b2130e0f-8a49-4082-b5ea-1701db9e40f6-node-certs\") pod \"calico-node-jhd9s\" (UID: \"b2130e0f-8a49-4082-b5ea-1701db9e40f6\") " pod="calico-system/calico-node-jhd9s" Jul 16 12:41:39.161808 kubelet[1510]: I0716 12:41:39.161791 1510 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b2130e0f-8a49-4082-b5ea-1701db9e40f6-tigera-ca-bundle\") pod \"calico-node-jhd9s\" (UID: \"b2130e0f-8a49-4082-b5ea-1701db9e40f6\") " pod="calico-system/calico-node-jhd9s" Jul 16 12:41:39.161928 kubelet[1510]: I0716 12:41:39.161912 1510 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/b2130e0f-8a49-4082-b5ea-1701db9e40f6-var-lib-calico\") pod \"calico-node-jhd9s\" (UID: \"b2130e0f-8a49-4082-b5ea-1701db9e40f6\") " pod="calico-system/calico-node-jhd9s" Jul 16 12:41:39.162040 kubelet[1510]: I0716 12:41:39.162025 1510 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/b2130e0f-8a49-4082-b5ea-1701db9e40f6-xtables-lock\") pod \"calico-node-jhd9s\" (UID: \"b2130e0f-8a49-4082-b5ea-1701db9e40f6\") " pod="calico-system/calico-node-jhd9s" Jul 16 12:41:39.162337 kubelet[1510]: I0716 12:41:39.162158 1510 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/2fcf4458-9494-4dc8-b20e-0300cabbff4b-varrun\") pod \"csi-node-driver-shkf4\" (UID: \"2fcf4458-9494-4dc8-b20e-0300cabbff4b\") " pod="calico-system/csi-node-driver-shkf4" Jul 16 12:41:39.162470 kubelet[1510]: I0716 12:41:39.162454 1510 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/1b0e5705-0bcc-443c-8671-9e8712eea782-kube-proxy\") pod \"kube-proxy-rmr8w\" (UID: \"1b0e5705-0bcc-443c-8671-9e8712eea782\") " pod="kube-system/kube-proxy-rmr8w" Jul 16 12:41:39.162585 kubelet[1510]: I0716 12:41:39.162568 1510 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/1b0e5705-0bcc-443c-8671-9e8712eea782-xtables-lock\") pod \"kube-proxy-rmr8w\" (UID: \"1b0e5705-0bcc-443c-8671-9e8712eea782\") " pod="kube-system/kube-proxy-rmr8w" Jul 16 12:41:39.162713 kubelet[1510]: I0716 12:41:39.162699 1510 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/1b0e5705-0bcc-443c-8671-9e8712eea782-lib-modules\") pod \"kube-proxy-rmr8w\" (UID: \"1b0e5705-0bcc-443c-8671-9e8712eea782\") " pod="kube-system/kube-proxy-rmr8w" Jul 16 12:41:39.162906 kubelet[1510]: I0716 12:41:39.162890 1510 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/b2130e0f-8a49-4082-b5ea-1701db9e40f6-cni-log-dir\") pod \"calico-node-jhd9s\" (UID: \"b2130e0f-8a49-4082-b5ea-1701db9e40f6\") " pod="calico-system/calico-node-jhd9s" Jul 16 12:41:39.163078 kubelet[1510]: I0716 12:41:39.163062 1510 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/b2130e0f-8a49-4082-b5ea-1701db9e40f6-flexvol-driver-host\") pod \"calico-node-jhd9s\" (UID: \"b2130e0f-8a49-4082-b5ea-1701db9e40f6\") " pod="calico-system/calico-node-jhd9s" Jul 16 12:41:39.163223 kubelet[1510]: I0716 12:41:39.163207 1510 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/b2130e0f-8a49-4082-b5ea-1701db9e40f6-lib-modules\") pod \"calico-node-jhd9s\" (UID: \"b2130e0f-8a49-4082-b5ea-1701db9e40f6\") " pod="calico-system/calico-node-jhd9s" Jul 16 12:41:39.163335 kubelet[1510]: I0716 12:41:39.163320 1510 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7gjp9\" (UniqueName: \"kubernetes.io/projected/b2130e0f-8a49-4082-b5ea-1701db9e40f6-kube-api-access-7gjp9\") pod \"calico-node-jhd9s\" (UID: \"b2130e0f-8a49-4082-b5ea-1701db9e40f6\") " pod="calico-system/calico-node-jhd9s" Jul 16 12:41:39.163453 kubelet[1510]: I0716 12:41:39.163438 1510 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-crhbz\" (UniqueName: \"kubernetes.io/projected/2fcf4458-9494-4dc8-b20e-0300cabbff4b-kube-api-access-crhbz\") pod \"csi-node-driver-shkf4\" (UID: \"2fcf4458-9494-4dc8-b20e-0300cabbff4b\") " pod="calico-system/csi-node-driver-shkf4" Jul 16 12:41:39.163694 kubelet[1510]: I0716 12:41:39.163647 1510 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/b2130e0f-8a49-4082-b5ea-1701db9e40f6-cni-net-dir\") pod \"calico-node-jhd9s\" (UID: \"b2130e0f-8a49-4082-b5ea-1701db9e40f6\") " pod="calico-system/calico-node-jhd9s" Jul 16 12:41:39.164395 kubelet[1510]: I0716 12:41:39.164361 1510 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/b2130e0f-8a49-4082-b5ea-1701db9e40f6-var-run-calico\") pod \"calico-node-jhd9s\" (UID: \"b2130e0f-8a49-4082-b5ea-1701db9e40f6\") " pod="calico-system/calico-node-jhd9s" Jul 16 12:41:39.267990 kubelet[1510]: I0716 12:41:39.267928 1510 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Jul 16 12:41:39.269060 kubelet[1510]: E0716 12:41:39.269012 1510 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:41:39.269060 kubelet[1510]: W0716 12:41:39.269048 1510 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:41:39.269368 kubelet[1510]: E0716 12:41:39.269096 1510 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:41:39.283348 kubelet[1510]: E0716 12:41:39.283319 1510 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:41:39.283506 kubelet[1510]: W0716 12:41:39.283488 1510 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:41:39.283621 kubelet[1510]: E0716 12:41:39.283592 1510 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:41:39.294443 kubelet[1510]: E0716 12:41:39.294401 1510 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:41:39.294443 kubelet[1510]: W0716 12:41:39.294430 1510 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:41:39.294686 kubelet[1510]: E0716 12:41:39.294460 1510 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:41:39.294908 kubelet[1510]: E0716 12:41:39.294893 1510 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:41:39.294957 kubelet[1510]: W0716 12:41:39.294911 1510 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:41:39.294957 kubelet[1510]: E0716 12:41:39.294923 1510 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:41:39.299511 kubelet[1510]: E0716 12:41:39.299486 1510 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 16 12:41:39.299511 kubelet[1510]: W0716 12:41:39.299508 1510 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 16 12:41:39.299705 kubelet[1510]: E0716 12:41:39.299525 1510 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 16 12:41:39.448318 env[1191]: time="2025-07-16T12:41:39.443203082Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-rmr8w,Uid:1b0e5705-0bcc-443c-8671-9e8712eea782,Namespace:kube-system,Attempt:0,}" Jul 16 12:41:39.448318 env[1191]: time="2025-07-16T12:41:39.447177547Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-jhd9s,Uid:b2130e0f-8a49-4082-b5ea-1701db9e40f6,Namespace:calico-system,Attempt:0,}" Jul 16 12:41:40.112094 kubelet[1510]: E0716 12:41:40.111959 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:41:40.223380 env[1191]: time="2025-07-16T12:41:40.223256874Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:40.225142 env[1191]: time="2025-07-16T12:41:40.225094909Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:40.227286 env[1191]: time="2025-07-16T12:41:40.227258662Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:40.231047 env[1191]: time="2025-07-16T12:41:40.231022725Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:40.234051 env[1191]: time="2025-07-16T12:41:40.234021449Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:40.235282 env[1191]: time="2025-07-16T12:41:40.235253205Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:40.236504 env[1191]: time="2025-07-16T12:41:40.236448149Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:40.237304 env[1191]: time="2025-07-16T12:41:40.237272796Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:40.257466 env[1191]: time="2025-07-16T12:41:40.257249546Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 16 12:41:40.257466 env[1191]: time="2025-07-16T12:41:40.257299127Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 16 12:41:40.257466 env[1191]: time="2025-07-16T12:41:40.257311959Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 16 12:41:40.257697 env[1191]: time="2025-07-16T12:41:40.257499235Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f2f35bb5243b0d97c9e6e6721b05bf26a48a13b6dd5a4dd16cef346237a64faa pid=1577 runtime=io.containerd.runc.v2 Jul 16 12:41:40.259643 env[1191]: time="2025-07-16T12:41:40.259563281Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 16 12:41:40.259643 env[1191]: time="2025-07-16T12:41:40.259596265Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 16 12:41:40.259643 env[1191]: time="2025-07-16T12:41:40.259621370Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 16 12:41:40.259962 env[1191]: time="2025-07-16T12:41:40.259928035Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/040cf61017f0af510b34d46bebfeae76c7974896e1c161e2f47ac66609d44c55 pid=1575 runtime=io.containerd.runc.v2 Jul 16 12:41:40.274633 systemd[1]: Started cri-containerd-f2f35bb5243b0d97c9e6e6721b05bf26a48a13b6dd5a4dd16cef346237a64faa.scope. Jul 16 12:41:40.284510 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount188923365.mount: Deactivated successfully. Jul 16 12:41:40.296929 systemd[1]: Started cri-containerd-040cf61017f0af510b34d46bebfeae76c7974896e1c161e2f47ac66609d44c55.scope. Jul 16 12:41:40.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.305000 audit: BPF prog-id=64 op=LOAD Jul 16 12:41:40.306000 audit[1592]: AVC avc: denied { bpf } for pid=1592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.306000 audit[1592]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=1577 pid=1592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:40.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632663335626235323433623064393763396536653637323162303562 Jul 16 12:41:40.306000 audit[1592]: AVC avc: denied { perfmon } for pid=1592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.306000 audit[1592]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=1577 pid=1592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:40.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632663335626235323433623064393763396536653637323162303562 Jul 16 12:41:40.306000 audit[1592]: AVC avc: denied { bpf } for pid=1592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.306000 audit[1592]: AVC avc: denied { bpf } for pid=1592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.306000 audit[1592]: AVC avc: denied { bpf } for pid=1592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.306000 audit[1592]: AVC avc: denied { perfmon } for pid=1592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.306000 audit[1592]: AVC avc: denied { perfmon } for pid=1592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.306000 audit[1592]: AVC avc: denied { perfmon } for pid=1592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.306000 audit[1592]: AVC avc: denied { perfmon } for pid=1592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.306000 audit[1592]: AVC avc: denied { perfmon } for pid=1592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.306000 audit[1592]: AVC avc: denied { bpf } for pid=1592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.306000 audit[1592]: AVC avc: denied { bpf } for pid=1592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.306000 audit: BPF prog-id=65 op=LOAD Jul 16 12:41:40.306000 audit[1592]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0003a2ec0 items=0 ppid=1577 pid=1592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:40.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632663335626235323433623064393763396536653637323162303562 Jul 16 12:41:40.306000 audit[1592]: AVC avc: denied { bpf } for pid=1592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.306000 audit[1592]: AVC avc: denied { bpf } for pid=1592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.306000 audit[1592]: AVC avc: denied { perfmon } for pid=1592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.306000 audit[1592]: AVC avc: denied { perfmon } for pid=1592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.306000 audit[1592]: AVC avc: denied { perfmon } for pid=1592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.306000 audit[1592]: AVC avc: denied { perfmon } for pid=1592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.306000 audit[1592]: AVC avc: denied { perfmon } for pid=1592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.306000 audit[1592]: AVC avc: denied { bpf } for pid=1592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.306000 audit[1592]: AVC avc: denied { bpf } for pid=1592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.306000 audit: BPF prog-id=66 op=LOAD Jul 16 12:41:40.306000 audit[1592]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0003a2f08 items=0 ppid=1577 pid=1592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:40.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632663335626235323433623064393763396536653637323162303562 Jul 16 12:41:40.306000 audit: BPF prog-id=66 op=UNLOAD Jul 16 12:41:40.306000 audit: BPF prog-id=65 op=UNLOAD Jul 16 12:41:40.306000 audit[1592]: AVC avc: denied { bpf } for pid=1592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.306000 audit[1592]: AVC avc: denied { bpf } for pid=1592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.306000 audit[1592]: AVC avc: denied { bpf } for pid=1592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.306000 audit[1592]: AVC avc: denied { perfmon } for pid=1592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.306000 audit[1592]: AVC avc: denied { perfmon } for pid=1592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.306000 audit[1592]: AVC avc: denied { perfmon } for pid=1592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.306000 audit[1592]: AVC avc: denied { perfmon } for pid=1592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.306000 audit[1592]: AVC avc: denied { perfmon } for pid=1592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.306000 audit[1592]: AVC avc: denied { bpf } for pid=1592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.306000 audit[1592]: AVC avc: denied { bpf } for pid=1592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.306000 audit: BPF prog-id=67 op=LOAD Jul 16 12:41:40.306000 audit[1592]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003a3318 items=0 ppid=1577 pid=1592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:40.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632663335626235323433623064393763396536653637323162303562 Jul 16 12:41:40.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.329000 audit: BPF prog-id=68 op=LOAD Jul 16 12:41:40.330872 env[1191]: time="2025-07-16T12:41:40.330775038Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-jhd9s,Uid:b2130e0f-8a49-4082-b5ea-1701db9e40f6,Namespace:calico-system,Attempt:0,} returns sandbox id \"f2f35bb5243b0d97c9e6e6721b05bf26a48a13b6dd5a4dd16cef346237a64faa\"" Jul 16 12:41:40.333951 env[1191]: time="2025-07-16T12:41:40.333761335Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2\"" Jul 16 12:41:40.334090 kubelet[1510]: E0716 12:41:40.333903 1510 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-shkf4" podUID="2fcf4458-9494-4dc8-b20e-0300cabbff4b" Jul 16 12:41:40.333000 audit[1602]: AVC avc: denied { bpf } for pid=1602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.333000 audit[1602]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=1575 pid=1602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:40.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034306366363130313766306166353130623334643436626562666561 Jul 16 12:41:40.333000 audit[1602]: AVC avc: denied { perfmon } for pid=1602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.333000 audit[1602]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=1575 pid=1602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:40.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034306366363130313766306166353130623334643436626562666561 Jul 16 12:41:40.334000 audit[1602]: AVC avc: denied { bpf } for pid=1602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.334000 audit[1602]: AVC avc: denied { bpf } for pid=1602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.334000 audit[1602]: AVC avc: denied { bpf } for pid=1602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.334000 audit[1602]: AVC avc: denied { perfmon } for pid=1602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.334000 audit[1602]: AVC avc: denied { perfmon } for pid=1602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.334000 audit[1602]: AVC avc: denied { perfmon } for pid=1602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.334000 audit[1602]: AVC avc: denied { perfmon } for pid=1602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.334000 audit[1602]: AVC avc: denied { perfmon } for pid=1602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.334000 audit[1602]: AVC avc: denied { bpf } for pid=1602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.334000 audit[1602]: AVC avc: denied { bpf } for pid=1602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.334000 audit: BPF prog-id=69 op=LOAD Jul 16 12:41:40.334000 audit[1602]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000380e90 items=0 ppid=1575 pid=1602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:40.334000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034306366363130313766306166353130623334643436626562666561 Jul 16 12:41:40.335000 audit[1602]: AVC avc: denied { bpf } for pid=1602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.335000 audit[1602]: AVC avc: denied { bpf } for pid=1602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.335000 audit[1602]: AVC avc: denied { perfmon } for pid=1602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.335000 audit[1602]: AVC avc: denied { perfmon } for pid=1602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.335000 audit[1602]: AVC avc: denied { perfmon } for pid=1602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.335000 audit[1602]: AVC avc: denied { perfmon } for pid=1602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.335000 audit[1602]: AVC avc: denied { perfmon } for pid=1602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.335000 audit[1602]: AVC avc: denied { bpf } for pid=1602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.335000 audit[1602]: AVC avc: denied { bpf } for pid=1602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.335000 audit: BPF prog-id=70 op=LOAD Jul 16 12:41:40.335000 audit[1602]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000380ed8 items=0 ppid=1575 pid=1602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:40.335000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034306366363130313766306166353130623334643436626562666561 Jul 16 12:41:40.335000 audit: BPF prog-id=70 op=UNLOAD Jul 16 12:41:40.335000 audit: BPF prog-id=69 op=UNLOAD Jul 16 12:41:40.335000 audit[1602]: AVC avc: denied { bpf } for pid=1602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.335000 audit[1602]: AVC avc: denied { bpf } for pid=1602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.335000 audit[1602]: AVC avc: denied { bpf } for pid=1602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.335000 audit[1602]: AVC avc: denied { perfmon } for pid=1602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.335000 audit[1602]: AVC avc: denied { perfmon } for pid=1602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.335000 audit[1602]: AVC avc: denied { perfmon } for pid=1602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.335000 audit[1602]: AVC avc: denied { perfmon } for pid=1602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.335000 audit[1602]: AVC avc: denied { perfmon } for pid=1602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.335000 audit[1602]: AVC avc: denied { bpf } for pid=1602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.335000 audit[1602]: AVC avc: denied { bpf } for pid=1602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:40.335000 audit: BPF prog-id=71 op=LOAD Jul 16 12:41:40.335000 audit[1602]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0003812e8 items=0 ppid=1575 pid=1602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:40.335000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034306366363130313766306166353130623334643436626562666561 Jul 16 12:41:40.355656 env[1191]: time="2025-07-16T12:41:40.355416580Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-rmr8w,Uid:1b0e5705-0bcc-443c-8671-9e8712eea782,Namespace:kube-system,Attempt:0,} returns sandbox id \"040cf61017f0af510b34d46bebfeae76c7974896e1c161e2f47ac66609d44c55\"" Jul 16 12:41:41.112921 kubelet[1510]: E0716 12:41:41.112769 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:41:41.605326 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount522387316.mount: Deactivated successfully. Jul 16 12:41:41.730734 env[1191]: time="2025-07-16T12:41:41.730555568Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:41.732239 env[1191]: time="2025-07-16T12:41:41.732180498Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:639615519fa6f7bc4b4756066ba9780068fd291eacc36c120f6c555e62f2b00e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:41.734281 env[1191]: time="2025-07-16T12:41:41.734250241Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:41.736566 env[1191]: time="2025-07-16T12:41:41.736539918Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:972be127eaecd7d1a2d5393b8d14f1ae8f88550bee83e0519e9590c7e15eb41b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:41.737648 env[1191]: time="2025-07-16T12:41:41.737619073Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2\" returns image reference \"sha256:639615519fa6f7bc4b4756066ba9780068fd291eacc36c120f6c555e62f2b00e\"" Jul 16 12:41:41.740717 env[1191]: time="2025-07-16T12:41:41.740688541Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.11\"" Jul 16 12:41:41.743793 env[1191]: time="2025-07-16T12:41:41.743713566Z" level=info msg="CreateContainer within sandbox \"f2f35bb5243b0d97c9e6e6721b05bf26a48a13b6dd5a4dd16cef346237a64faa\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Jul 16 12:41:41.754314 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2515975158.mount: Deactivated successfully. Jul 16 12:41:41.759804 env[1191]: time="2025-07-16T12:41:41.759768845Z" level=info msg="CreateContainer within sandbox \"f2f35bb5243b0d97c9e6e6721b05bf26a48a13b6dd5a4dd16cef346237a64faa\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"fb38722c449a795fcaeb713c0ba7f9a4dd093171bed99c7caf0cb223598177d8\"" Jul 16 12:41:41.760993 env[1191]: time="2025-07-16T12:41:41.760967907Z" level=info msg="StartContainer for \"fb38722c449a795fcaeb713c0ba7f9a4dd093171bed99c7caf0cb223598177d8\"" Jul 16 12:41:41.783470 systemd[1]: Started cri-containerd-fb38722c449a795fcaeb713c0ba7f9a4dd093171bed99c7caf0cb223598177d8.scope. Jul 16 12:41:41.800000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:41.800000 audit[1652]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fda1e4b4858 items=0 ppid=1577 pid=1652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:41.800000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662333837323263343439613739356663616562373133633062613766 Jul 16 12:41:41.800000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:41.800000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:41.800000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:41.800000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:41.800000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:41.800000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:41.800000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:41.800000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:41.800000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:41.800000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:41.800000 audit: BPF prog-id=72 op=LOAD Jul 16 12:41:41.800000 audit[1652]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c00032dbd8 items=0 ppid=1577 pid=1652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:41.800000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662333837323263343439613739356663616562373133633062613766 Jul 16 12:41:41.801000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:41.801000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:41.801000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:41.801000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:41.801000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:41.801000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:41.801000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:41.801000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:41.801000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:41.801000 audit: BPF prog-id=73 op=LOAD Jul 16 12:41:41.801000 audit[1652]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c00032dc28 items=0 ppid=1577 pid=1652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:41.801000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662333837323263343439613739356663616562373133633062613766 Jul 16 12:41:41.802000 audit: BPF prog-id=73 op=UNLOAD Jul 16 12:41:41.802000 audit: BPF prog-id=72 op=UNLOAD Jul 16 12:41:41.802000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:41.802000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:41.802000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:41.802000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:41.802000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:41.802000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:41.802000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:41.802000 audit[1652]: AVC avc: denied { perfmon } for pid=1652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:41.802000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:41.802000 audit[1652]: AVC avc: denied { bpf } for pid=1652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:41.802000 audit: BPF prog-id=74 op=LOAD Jul 16 12:41:41.802000 audit[1652]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c00032dcb8 items=0 ppid=1577 pid=1652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:41.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662333837323263343439613739356663616562373133633062613766 Jul 16 12:41:41.824504 env[1191]: time="2025-07-16T12:41:41.824451268Z" level=info msg="StartContainer for \"fb38722c449a795fcaeb713c0ba7f9a4dd093171bed99c7caf0cb223598177d8\" returns successfully" Jul 16 12:41:41.833233 systemd[1]: cri-containerd-fb38722c449a795fcaeb713c0ba7f9a4dd093171bed99c7caf0cb223598177d8.scope: Deactivated successfully. Jul 16 12:41:41.836000 audit: BPF prog-id=74 op=UNLOAD Jul 16 12:41:41.880580 env[1191]: time="2025-07-16T12:41:41.877502338Z" level=info msg="shim disconnected" id=fb38722c449a795fcaeb713c0ba7f9a4dd093171bed99c7caf0cb223598177d8 Jul 16 12:41:41.880953 env[1191]: time="2025-07-16T12:41:41.880907213Z" level=warning msg="cleaning up after shim disconnected" id=fb38722c449a795fcaeb713c0ba7f9a4dd093171bed99c7caf0cb223598177d8 namespace=k8s.io Jul 16 12:41:41.881069 env[1191]: time="2025-07-16T12:41:41.881048603Z" level=info msg="cleaning up dead shim" Jul 16 12:41:41.892475 env[1191]: time="2025-07-16T12:41:41.892413958Z" level=warning msg="cleanup warnings time=\"2025-07-16T12:41:41Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1691 runtime=io.containerd.runc.v2\n" Jul 16 12:41:42.113686 kubelet[1510]: E0716 12:41:42.113628 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:41:42.334743 kubelet[1510]: E0716 12:41:42.334407 1510 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-shkf4" podUID="2fcf4458-9494-4dc8-b20e-0300cabbff4b" Jul 16 12:41:42.550129 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-fb38722c449a795fcaeb713c0ba7f9a4dd093171bed99c7caf0cb223598177d8-rootfs.mount: Deactivated successfully. Jul 16 12:41:43.114261 kubelet[1510]: E0716 12:41:43.114208 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:41:43.714134 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2590788958.mount: Deactivated successfully. Jul 16 12:41:44.115354 kubelet[1510]: E0716 12:41:44.115213 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:41:44.335502 kubelet[1510]: E0716 12:41:44.334531 1510 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-shkf4" podUID="2fcf4458-9494-4dc8-b20e-0300cabbff4b" Jul 16 12:41:44.461466 env[1191]: time="2025-07-16T12:41:44.461056246Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:44.464913 env[1191]: time="2025-07-16T12:41:44.464818481Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0cec28fd5c3c446ec52e2886ddea38bf7f7e17755aa5d0095d50d3df5914a8fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:44.466827 env[1191]: time="2025-07-16T12:41:44.466774276Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:44.468967 env[1191]: time="2025-07-16T12:41:44.468858311Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.11\" returns image reference \"sha256:0cec28fd5c3c446ec52e2886ddea38bf7f7e17755aa5d0095d50d3df5914a8fd\"" Jul 16 12:41:44.469767 env[1191]: time="2025-07-16T12:41:44.469733537Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:a31da847792c5e7e92e91b78da1ad21d693e4b2b48d0e9f4610c8764dc2a5d79,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:44.475060 env[1191]: time="2025-07-16T12:41:44.475014533Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.2\"" Jul 16 12:41:44.476180 env[1191]: time="2025-07-16T12:41:44.476151014Z" level=info msg="CreateContainer within sandbox \"040cf61017f0af510b34d46bebfeae76c7974896e1c161e2f47ac66609d44c55\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Jul 16 12:41:44.490332 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1386277545.mount: Deactivated successfully. Jul 16 12:41:44.495841 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1171382551.mount: Deactivated successfully. Jul 16 12:41:44.499515 env[1191]: time="2025-07-16T12:41:44.499471064Z" level=info msg="CreateContainer within sandbox \"040cf61017f0af510b34d46bebfeae76c7974896e1c161e2f47ac66609d44c55\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"9d415a464993ff50d3d10089cb04c5246802bd311931363a9ecfd70a5ec488f9\"" Jul 16 12:41:44.500328 env[1191]: time="2025-07-16T12:41:44.500299458Z" level=info msg="StartContainer for \"9d415a464993ff50d3d10089cb04c5246802bd311931363a9ecfd70a5ec488f9\"" Jul 16 12:41:44.524107 systemd[1]: Started cri-containerd-9d415a464993ff50d3d10089cb04c5246802bd311931363a9ecfd70a5ec488f9.scope. Jul 16 12:41:44.547000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:44.550548 kernel: kauditd_printk_skb: 201 callbacks suppressed Jul 16 12:41:44.550668 kernel: audit: type=1400 audit(1752669704.547:488): avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:44.547000 audit[1716]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=7f46f8629ae8 items=0 ppid=1575 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:44.557562 kernel: audit: type=1300 audit(1752669704.547:488): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=7f46f8629ae8 items=0 ppid=1575 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:44.557663 kernel: audit: type=1327 audit(1752669704.547:488): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964343135613436343939336666353064336431303038396362303463 Jul 16 12:41:44.547000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964343135613436343939336666353064336431303038396362303463 Jul 16 12:41:44.561483 kernel: audit: type=1400 audit(1752669704.549:489): avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:44.549000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:44.564209 kernel: audit: type=1400 audit(1752669704.549:489): avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:44.549000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:44.569732 kernel: audit: type=1400 audit(1752669704.549:489): avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:44.569800 kernel: audit: type=1400 audit(1752669704.549:489): avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:44.549000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:44.549000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:44.575327 kernel: audit: type=1400 audit(1752669704.549:489): avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:44.575400 kernel: audit: type=1400 audit(1752669704.549:489): avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:44.549000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:44.549000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:44.549000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:44.581711 kernel: audit: type=1400 audit(1752669704.549:489): avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:44.549000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:44.549000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:44.549000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:44.549000 audit: BPF prog-id=75 op=LOAD Jul 16 12:41:44.549000 audit[1716]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c59d8 a2=78 a3=c000356078 items=0 ppid=1575 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:44.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964343135613436343939336666353064336431303038396362303463 Jul 16 12:41:44.552000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:44.552000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:44.552000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:44.552000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:44.552000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:44.552000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:44.552000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:44.552000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:44.552000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:44.552000 audit: BPF prog-id=76 op=LOAD Jul 16 12:41:44.552000 audit[1716]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001c5770 a2=78 a3=c0003560c8 items=0 ppid=1575 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:44.552000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964343135613436343939336666353064336431303038396362303463 Jul 16 12:41:44.563000 audit: BPF prog-id=76 op=UNLOAD Jul 16 12:41:44.563000 audit: BPF prog-id=75 op=UNLOAD Jul 16 12:41:44.563000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:44.563000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:44.563000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:44.563000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:44.563000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:44.563000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:44.563000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:44.563000 audit[1716]: AVC avc: denied { perfmon } for pid=1716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:44.563000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:44.563000 audit[1716]: AVC avc: denied { bpf } for pid=1716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:44.563000 audit: BPF prog-id=77 op=LOAD Jul 16 12:41:44.563000 audit[1716]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c5c30 a2=78 a3=c000356158 items=0 ppid=1575 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:44.563000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964343135613436343939336666353064336431303038396362303463 Jul 16 12:41:44.599649 env[1191]: time="2025-07-16T12:41:44.599463211Z" level=info msg="StartContainer for \"9d415a464993ff50d3d10089cb04c5246802bd311931363a9ecfd70a5ec488f9\" returns successfully" Jul 16 12:41:44.748000 audit[1775]: NETFILTER_CFG table=mangle:14 family=10 entries=1 op=nft_register_chain pid=1775 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:41:44.748000 audit[1775]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcff586a30 a2=0 a3=7ffcff586a1c items=0 ppid=1725 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:44.748000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 16 12:41:44.750000 audit[1776]: NETFILTER_CFG table=mangle:15 family=2 entries=1 op=nft_register_chain pid=1776 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:41:44.750000 audit[1776]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc60e3e870 a2=0 a3=7ffc60e3e85c items=0 ppid=1725 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:44.750000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 16 12:41:44.752000 audit[1778]: NETFILTER_CFG table=nat:16 family=10 entries=1 op=nft_register_chain pid=1778 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:41:44.752000 audit[1778]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdd3ccb430 a2=0 a3=7ffdd3ccb41c items=0 ppid=1725 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:44.752000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 16 12:41:44.753000 audit[1779]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_chain pid=1779 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:41:44.753000 audit[1779]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdc91c4520 a2=0 a3=7ffdc91c450c items=0 ppid=1725 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:44.753000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 16 12:41:44.754000 audit[1780]: NETFILTER_CFG table=filter:18 family=10 entries=1 op=nft_register_chain pid=1780 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:41:44.754000 audit[1780]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe6f9b29a0 a2=0 a3=7ffe6f9b298c items=0 ppid=1725 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:44.754000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 16 12:41:44.758000 audit[1781]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=1781 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:41:44.758000 audit[1781]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffff9724150 a2=0 a3=7ffff972413c items=0 ppid=1725 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:44.758000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 16 12:41:44.853000 audit[1782]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1782 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:41:44.853000 audit[1782]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff5fa1b670 a2=0 a3=7fff5fa1b65c items=0 ppid=1725 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:44.853000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 16 12:41:44.859000 audit[1784]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1784 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:41:44.859000 audit[1784]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff05710aa0 a2=0 a3=7fff05710a8c items=0 ppid=1725 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:44.859000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Jul 16 12:41:44.863000 audit[1787]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1787 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:41:44.863000 audit[1787]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd0af61e80 a2=0 a3=7ffd0af61e6c items=0 ppid=1725 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:44.863000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Jul 16 12:41:44.864000 audit[1788]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1788 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:41:44.864000 audit[1788]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff1ea70700 a2=0 a3=7fff1ea706ec items=0 ppid=1725 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:44.864000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 16 12:41:44.867000 audit[1790]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1790 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:41:44.867000 audit[1790]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffbc176220 a2=0 a3=7fffbc17620c items=0 ppid=1725 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:44.867000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 16 12:41:44.869000 audit[1791]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1791 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:41:44.869000 audit[1791]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff1b053870 a2=0 a3=7fff1b05385c items=0 ppid=1725 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:44.869000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 16 12:41:44.872000 audit[1793]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1793 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:41:44.872000 audit[1793]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd61d428e0 a2=0 a3=7ffd61d428cc items=0 ppid=1725 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:44.872000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 16 12:41:44.877000 audit[1796]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1796 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:41:44.877000 audit[1796]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffca8488020 a2=0 a3=7ffca848800c items=0 ppid=1725 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:44.877000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Jul 16 12:41:44.879000 audit[1797]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1797 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:41:44.879000 audit[1797]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc9f15efc0 a2=0 a3=7ffc9f15efac items=0 ppid=1725 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:44.879000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 16 12:41:44.882000 audit[1799]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1799 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:41:44.882000 audit[1799]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff9b9dc7d0 a2=0 a3=7fff9b9dc7bc items=0 ppid=1725 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:44.882000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 16 12:41:44.884000 audit[1800]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1800 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:41:44.884000 audit[1800]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdcc414d30 a2=0 a3=7ffdcc414d1c items=0 ppid=1725 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:44.884000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 16 12:41:44.887000 audit[1802]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1802 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:41:44.887000 audit[1802]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd2eeb9940 a2=0 a3=7ffd2eeb992c items=0 ppid=1725 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:44.887000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 16 12:41:44.892000 audit[1805]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1805 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:41:44.892000 audit[1805]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd00f10cf0 a2=0 a3=7ffd00f10cdc items=0 ppid=1725 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:44.892000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 16 12:41:44.897000 audit[1808]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1808 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:41:44.897000 audit[1808]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe44a9bc50 a2=0 a3=7ffe44a9bc3c items=0 ppid=1725 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:44.897000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 16 12:41:44.898000 audit[1809]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1809 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:41:44.898000 audit[1809]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc896394c0 a2=0 a3=7ffc896394ac items=0 ppid=1725 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:44.898000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 16 12:41:44.901000 audit[1811]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1811 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:41:44.901000 audit[1811]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffeb8a44a50 a2=0 a3=7ffeb8a44a3c items=0 ppid=1725 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:44.901000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 16 12:41:44.944000 audit[1815]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1815 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:41:44.944000 audit[1815]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffddfc15420 a2=0 a3=7ffddfc1540c items=0 ppid=1725 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:44.944000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 16 12:41:44.946000 audit[1816]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1816 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:41:44.946000 audit[1816]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe9ea66ac0 a2=0 a3=7ffe9ea66aac items=0 ppid=1725 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:44.946000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 16 12:41:44.950000 audit[1818]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1818 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 16 12:41:44.950000 audit[1818]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd4c8c8f20 a2=0 a3=7ffd4c8c8f0c items=0 ppid=1725 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:44.950000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 16 12:41:44.993000 audit[1824]: NETFILTER_CFG table=filter:39 family=2 entries=6 op=nft_register_rule pid=1824 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:41:44.993000 audit[1824]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffcbb4421f0 a2=0 a3=7ffcbb4421dc items=0 ppid=1725 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:44.993000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:41:45.028000 audit[1824]: NETFILTER_CFG table=nat:40 family=2 entries=72 op=nft_register_chain pid=1824 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:41:45.028000 audit[1824]: SYSCALL arch=c000003e syscall=46 success=yes exit=34516 a0=3 a1=7ffcbb4421f0 a2=0 a3=7ffcbb4421dc items=0 ppid=1725 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:45.028000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:41:45.043000 audit[1834]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1834 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:41:45.043000 audit[1834]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc42a98a00 a2=0 a3=7ffc42a989ec items=0 ppid=1725 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:45.043000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 16 12:41:45.046000 audit[1836]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1836 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:41:45.046000 audit[1836]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffe09b0020 a2=0 a3=7fffe09b000c items=0 ppid=1725 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:45.046000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Jul 16 12:41:45.051000 audit[1839]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1839 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:41:45.051000 audit[1839]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc28f00e40 a2=0 a3=7ffc28f00e2c items=0 ppid=1725 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:45.051000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Jul 16 12:41:45.053000 audit[1840]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1840 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:41:45.053000 audit[1840]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcd1a77ea0 a2=0 a3=7ffcd1a77e8c items=0 ppid=1725 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:45.053000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 16 12:41:45.058000 audit[1842]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1842 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:41:45.058000 audit[1842]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdc62101a0 a2=0 a3=7ffdc621018c items=0 ppid=1725 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:45.058000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 16 12:41:45.062000 audit[1843]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1843 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:41:45.062000 audit[1843]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd4ceb6010 a2=0 a3=7ffd4ceb5ffc items=0 ppid=1725 pid=1843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:45.062000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 16 12:41:45.067000 audit[1845]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1845 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:41:45.067000 audit[1845]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc339369d0 a2=0 a3=7ffc339369bc items=0 ppid=1725 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:45.067000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Jul 16 12:41:45.073000 audit[1848]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1848 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:41:45.073000 audit[1848]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffe128421f0 a2=0 a3=7ffe128421dc items=0 ppid=1725 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:45.073000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 16 12:41:45.075000 audit[1849]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1849 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:41:45.075000 audit[1849]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe2a9dc740 a2=0 a3=7ffe2a9dc72c items=0 ppid=1725 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:45.075000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 16 12:41:45.078000 audit[1851]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1851 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:41:45.078000 audit[1851]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffff3bdfb70 a2=0 a3=7ffff3bdfb5c items=0 ppid=1725 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:45.078000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 16 12:41:45.079000 audit[1852]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1852 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:41:45.079000 audit[1852]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff88b01a20 a2=0 a3=7fff88b01a0c items=0 ppid=1725 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:45.079000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 16 12:41:45.082000 audit[1854]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1854 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:41:45.082000 audit[1854]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdcdf0d7a0 a2=0 a3=7ffdcdf0d78c items=0 ppid=1725 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:45.082000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 16 12:41:45.086000 audit[1857]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1857 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:41:45.086000 audit[1857]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff7a491dd0 a2=0 a3=7fff7a491dbc items=0 ppid=1725 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:45.086000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 16 12:41:45.090000 audit[1860]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1860 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:41:45.090000 audit[1860]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffecf4a0760 a2=0 a3=7ffecf4a074c items=0 ppid=1725 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:45.090000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Jul 16 12:41:45.092000 audit[1861]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1861 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:41:45.092000 audit[1861]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe2762dac0 a2=0 a3=7ffe2762daac items=0 ppid=1725 pid=1861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:45.092000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 16 12:41:45.096000 audit[1863]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1863 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:41:45.096000 audit[1863]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc1f6fc3c0 a2=0 a3=7ffc1f6fc3ac items=0 ppid=1725 pid=1863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:45.096000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 16 12:41:45.100000 audit[1866]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1866 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:41:45.100000 audit[1866]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fffea631cc0 a2=0 a3=7fffea631cac items=0 ppid=1725 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:45.100000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 16 12:41:45.101000 audit[1867]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1867 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:41:45.101000 audit[1867]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe14766980 a2=0 a3=7ffe1476696c items=0 ppid=1725 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:45.101000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 16 12:41:45.104000 audit[1869]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1869 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:41:45.104000 audit[1869]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe2a581750 a2=0 a3=7ffe2a58173c items=0 ppid=1725 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:45.104000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 16 12:41:45.106000 audit[1870]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1870 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:41:45.106000 audit[1870]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe47750060 a2=0 a3=7ffe4775004c items=0 ppid=1725 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:45.106000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 16 12:41:45.109000 audit[1872]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1872 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:41:45.109000 audit[1872]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffbc799440 a2=0 a3=7fffbc79942c items=0 ppid=1725 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:45.109000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 16 12:41:45.116022 kubelet[1510]: E0716 12:41:45.115837 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:41:45.120000 audit[1875]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1875 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 16 12:41:45.120000 audit[1875]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc78592a20 a2=0 a3=7ffc78592a0c items=0 ppid=1725 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:45.120000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 16 12:41:45.128000 audit[1877]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1877 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 16 12:41:45.128000 audit[1877]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffe4321b520 a2=0 a3=7ffe4321b50c items=0 ppid=1725 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:45.128000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:41:45.130000 audit[1877]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1877 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 16 12:41:45.130000 audit[1877]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffe4321b520 a2=0 a3=7ffe4321b50c items=0 ppid=1725 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:45.130000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:41:45.394676 kubelet[1510]: I0716 12:41:45.392756 1510 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-rmr8w" podStartSLOduration=4.276240829 podStartE2EDuration="8.39272725s" podCreationTimestamp="2025-07-16 12:41:37 +0000 UTC" firstStartedPulling="2025-07-16 12:41:40.35795358 +0000 UTC m=+3.728837462" lastFinishedPulling="2025-07-16 12:41:44.474440036 +0000 UTC m=+7.845323883" observedRunningTime="2025-07-16 12:41:45.392009567 +0000 UTC m=+8.762893425" watchObservedRunningTime="2025-07-16 12:41:45.39272725 +0000 UTC m=+8.763611104" Jul 16 12:41:46.117012 kubelet[1510]: E0716 12:41:46.116893 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:41:46.334524 kubelet[1510]: E0716 12:41:46.334390 1510 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-shkf4" podUID="2fcf4458-9494-4dc8-b20e-0300cabbff4b" Jul 16 12:41:46.753821 update_engine[1187]: I0716 12:41:46.753734 1187 update_attempter.cc:509] Updating boot flags... Jul 16 12:41:47.118562 kubelet[1510]: E0716 12:41:47.117981 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:41:48.118683 kubelet[1510]: E0716 12:41:48.118493 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:41:48.231142 env[1191]: time="2025-07-16T12:41:48.231053473Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:48.232324 env[1191]: time="2025-07-16T12:41:48.232291205Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:77a357d0d33e3016e61153f7d2b7de72371579c4aaeb767fb7ef0af606fe1630,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:48.233696 env[1191]: time="2025-07-16T12:41:48.233664169Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:48.235038 env[1191]: time="2025-07-16T12:41:48.235008104Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:50686775cc60acb78bd92a66fa2d84e1700b2d8e43a718fbadbf35e59baefb4d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:48.235715 env[1191]: time="2025-07-16T12:41:48.235684931Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.2\" returns image reference \"sha256:77a357d0d33e3016e61153f7d2b7de72371579c4aaeb767fb7ef0af606fe1630\"" Jul 16 12:41:48.239826 env[1191]: time="2025-07-16T12:41:48.239801015Z" level=info msg="CreateContainer within sandbox \"f2f35bb5243b0d97c9e6e6721b05bf26a48a13b6dd5a4dd16cef346237a64faa\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Jul 16 12:41:48.250983 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3313126895.mount: Deactivated successfully. Jul 16 12:41:48.257246 env[1191]: time="2025-07-16T12:41:48.256697700Z" level=info msg="CreateContainer within sandbox \"f2f35bb5243b0d97c9e6e6721b05bf26a48a13b6dd5a4dd16cef346237a64faa\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"17407c4d81614d0e707ecad28d74b400a86cc02f5069619d4642bbdd1ec219f7\"" Jul 16 12:41:48.257841 env[1191]: time="2025-07-16T12:41:48.257809328Z" level=info msg="StartContainer for \"17407c4d81614d0e707ecad28d74b400a86cc02f5069619d4642bbdd1ec219f7\"" Jul 16 12:41:48.293170 systemd[1]: Started cri-containerd-17407c4d81614d0e707ecad28d74b400a86cc02f5069619d4642bbdd1ec219f7.scope. Jul 16 12:41:48.327000 audit[1900]: AVC avc: denied { perfmon } for pid=1900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:48.327000 audit[1900]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f4db4633718 items=0 ppid=1577 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:48.327000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137343037633464383136313464306537303765636164323864373462 Jul 16 12:41:48.327000 audit[1900]: AVC avc: denied { bpf } for pid=1900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:48.327000 audit[1900]: AVC avc: denied { bpf } for pid=1900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:48.327000 audit[1900]: AVC avc: denied { bpf } for pid=1900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:48.327000 audit[1900]: AVC avc: denied { perfmon } for pid=1900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:48.327000 audit[1900]: AVC avc: denied { perfmon } for pid=1900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:48.327000 audit[1900]: AVC avc: denied { perfmon } for pid=1900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:48.327000 audit[1900]: AVC avc: denied { perfmon } for pid=1900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:48.327000 audit[1900]: AVC avc: denied { perfmon } for pid=1900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:48.327000 audit[1900]: AVC avc: denied { bpf } for pid=1900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:48.327000 audit[1900]: AVC avc: denied { bpf } for pid=1900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:48.327000 audit: BPF prog-id=78 op=LOAD Jul 16 12:41:48.327000 audit[1900]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c00020acc8 items=0 ppid=1577 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:48.327000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137343037633464383136313464306537303765636164323864373462 Jul 16 12:41:48.327000 audit[1900]: AVC avc: denied { bpf } for pid=1900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:48.327000 audit[1900]: AVC avc: denied { bpf } for pid=1900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:48.327000 audit[1900]: AVC avc: denied { perfmon } for pid=1900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:48.327000 audit[1900]: AVC avc: denied { perfmon } for pid=1900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:48.327000 audit[1900]: AVC avc: denied { perfmon } for pid=1900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:48.327000 audit[1900]: AVC avc: denied { perfmon } for pid=1900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:48.327000 audit[1900]: AVC avc: denied { perfmon } for pid=1900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:48.327000 audit[1900]: AVC avc: denied { bpf } for pid=1900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:48.327000 audit[1900]: AVC avc: denied { bpf } for pid=1900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:48.327000 audit: BPF prog-id=79 op=LOAD Jul 16 12:41:48.327000 audit[1900]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c00020ad18 items=0 ppid=1577 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:48.327000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137343037633464383136313464306537303765636164323864373462 Jul 16 12:41:48.327000 audit: BPF prog-id=79 op=UNLOAD Jul 16 12:41:48.327000 audit: BPF prog-id=78 op=UNLOAD Jul 16 12:41:48.327000 audit[1900]: AVC avc: denied { bpf } for pid=1900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:48.327000 audit[1900]: AVC avc: denied { bpf } for pid=1900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:48.327000 audit[1900]: AVC avc: denied { bpf } for pid=1900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:48.327000 audit[1900]: AVC avc: denied { perfmon } for pid=1900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:48.327000 audit[1900]: AVC avc: denied { perfmon } for pid=1900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:48.327000 audit[1900]: AVC avc: denied { perfmon } for pid=1900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:48.327000 audit[1900]: AVC avc: denied { perfmon } for pid=1900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:48.327000 audit[1900]: AVC avc: denied { perfmon } for pid=1900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:48.327000 audit[1900]: AVC avc: denied { bpf } for pid=1900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:48.327000 audit[1900]: AVC avc: denied { bpf } for pid=1900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:48.327000 audit: BPF prog-id=80 op=LOAD Jul 16 12:41:48.327000 audit[1900]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c00020ada8 items=0 ppid=1577 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:48.327000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137343037633464383136313464306537303765636164323864373462 Jul 16 12:41:48.334928 kubelet[1510]: E0716 12:41:48.334426 1510 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-shkf4" podUID="2fcf4458-9494-4dc8-b20e-0300cabbff4b" Jul 16 12:41:48.347269 env[1191]: time="2025-07-16T12:41:48.347224208Z" level=info msg="StartContainer for \"17407c4d81614d0e707ecad28d74b400a86cc02f5069619d4642bbdd1ec219f7\" returns successfully" Jul 16 12:41:48.894078 env[1191]: time="2025-07-16T12:41:48.893959257Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 16 12:41:48.899016 systemd[1]: cri-containerd-17407c4d81614d0e707ecad28d74b400a86cc02f5069619d4642bbdd1ec219f7.scope: Deactivated successfully. Jul 16 12:41:48.902000 audit: BPF prog-id=80 op=UNLOAD Jul 16 12:41:48.923055 kubelet[1510]: I0716 12:41:48.922061 1510 kubelet_node_status.go:488] "Fast updating node status as it just became ready" Jul 16 12:41:48.966040 env[1191]: time="2025-07-16T12:41:48.965981517Z" level=info msg="shim disconnected" id=17407c4d81614d0e707ecad28d74b400a86cc02f5069619d4642bbdd1ec219f7 Jul 16 12:41:48.966040 env[1191]: time="2025-07-16T12:41:48.966040304Z" level=warning msg="cleaning up after shim disconnected" id=17407c4d81614d0e707ecad28d74b400a86cc02f5069619d4642bbdd1ec219f7 namespace=k8s.io Jul 16 12:41:48.966040 env[1191]: time="2025-07-16T12:41:48.966052482Z" level=info msg="cleaning up dead shim" Jul 16 12:41:48.975226 env[1191]: time="2025-07-16T12:41:48.975175162Z" level=warning msg="cleanup warnings time=\"2025-07-16T12:41:48Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1939 runtime=io.containerd.runc.v2\n" Jul 16 12:41:49.119280 kubelet[1510]: E0716 12:41:49.119167 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:41:49.249389 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-17407c4d81614d0e707ecad28d74b400a86cc02f5069619d4642bbdd1ec219f7-rootfs.mount: Deactivated successfully. Jul 16 12:41:49.393424 env[1191]: time="2025-07-16T12:41:49.393335557Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.2\"" Jul 16 12:41:50.120022 kubelet[1510]: E0716 12:41:50.119899 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:41:50.342377 systemd[1]: Created slice kubepods-besteffort-pod2fcf4458_9494_4dc8_b20e_0300cabbff4b.slice. Jul 16 12:41:50.348023 env[1191]: time="2025-07-16T12:41:50.347949457Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-shkf4,Uid:2fcf4458-9494-4dc8-b20e-0300cabbff4b,Namespace:calico-system,Attempt:0,}" Jul 16 12:41:50.421017 env[1191]: time="2025-07-16T12:41:50.418730910Z" level=error msg="Failed to destroy network for sandbox \"ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 16 12:41:50.420395 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de-shm.mount: Deactivated successfully. Jul 16 12:41:50.421525 env[1191]: time="2025-07-16T12:41:50.421486986Z" level=error msg="encountered an error cleaning up failed sandbox \"ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 16 12:41:50.421578 env[1191]: time="2025-07-16T12:41:50.421548275Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-shkf4,Uid:2fcf4458-9494-4dc8-b20e-0300cabbff4b,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 16 12:41:50.422169 kubelet[1510]: E0716 12:41:50.421795 1510 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 16 12:41:50.422169 kubelet[1510]: E0716 12:41:50.421865 1510 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-shkf4" Jul 16 12:41:50.422169 kubelet[1510]: E0716 12:41:50.421903 1510 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-shkf4" Jul 16 12:41:50.422345 kubelet[1510]: E0716 12:41:50.421965 1510 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-shkf4_calico-system(2fcf4458-9494-4dc8-b20e-0300cabbff4b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-shkf4_calico-system(2fcf4458-9494-4dc8-b20e-0300cabbff4b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-shkf4" podUID="2fcf4458-9494-4dc8-b20e-0300cabbff4b" Jul 16 12:41:51.121222 kubelet[1510]: E0716 12:41:51.121147 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:41:51.395785 kubelet[1510]: I0716 12:41:51.395617 1510 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de" Jul 16 12:41:51.397333 env[1191]: time="2025-07-16T12:41:51.397283298Z" level=info msg="StopPodSandbox for \"ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de\"" Jul 16 12:41:51.433387 env[1191]: time="2025-07-16T12:41:51.433313052Z" level=error msg="StopPodSandbox for \"ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de\" failed" error="failed to destroy network for sandbox \"ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 16 12:41:51.434142 kubelet[1510]: E0716 12:41:51.434089 1510 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de" Jul 16 12:41:51.434244 kubelet[1510]: E0716 12:41:51.434171 1510 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de"} Jul 16 12:41:51.434312 kubelet[1510]: E0716 12:41:51.434245 1510 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2fcf4458-9494-4dc8-b20e-0300cabbff4b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 16 12:41:51.434400 kubelet[1510]: E0716 12:41:51.434326 1510 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2fcf4458-9494-4dc8-b20e-0300cabbff4b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-shkf4" podUID="2fcf4458-9494-4dc8-b20e-0300cabbff4b" Jul 16 12:41:51.879415 kernel: kauditd_printk_skb: 230 callbacks suppressed Jul 16 12:41:51.879823 kernel: audit: type=1325 audit(1752669711.875:552): table=filter:65 family=2 entries=9 op=nft_register_rule pid=1994 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:41:51.875000 audit[1994]: NETFILTER_CFG table=filter:65 family=2 entries=9 op=nft_register_rule pid=1994 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:41:51.875000 audit[1994]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffc99f56520 a2=0 a3=7ffc99f5650c items=0 ppid=1725 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:51.875000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:41:51.887199 kernel: audit: type=1300 audit(1752669711.875:552): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffc99f56520 a2=0 a3=7ffc99f5650c items=0 ppid=1725 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:51.887280 kernel: audit: type=1327 audit(1752669711.875:552): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:41:51.887307 kernel: audit: type=1325 audit(1752669711.884:553): table=nat:66 family=2 entries=31 op=nft_register_chain pid=1994 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:41:51.884000 audit[1994]: NETFILTER_CFG table=nat:66 family=2 entries=31 op=nft_register_chain pid=1994 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:41:51.884000 audit[1994]: SYSCALL arch=c000003e syscall=46 success=yes exit=10884 a0=3 a1=7ffc99f56520 a2=0 a3=7ffc99f5650c items=0 ppid=1725 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:51.893924 kernel: audit: type=1300 audit(1752669711.884:553): arch=c000003e syscall=46 success=yes exit=10884 a0=3 a1=7ffc99f56520 a2=0 a3=7ffc99f5650c items=0 ppid=1725 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:51.894213 kernel: audit: type=1327 audit(1752669711.884:553): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:41:51.884000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:41:52.122487 kubelet[1510]: E0716 12:41:52.122393 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:41:53.123409 kubelet[1510]: E0716 12:41:53.123197 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:41:54.123811 kubelet[1510]: E0716 12:41:54.123758 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:41:55.123922 kubelet[1510]: E0716 12:41:55.123866 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:41:56.124039 kubelet[1510]: E0716 12:41:56.123977 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:41:57.009194 systemd[1]: Created slice kubepods-besteffort-podd11b2cf0_12d8_4209_875b_8be7e9c082b5.slice. Jul 16 12:41:57.106813 kubelet[1510]: E0716 12:41:57.106734 1510 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:41:57.113490 kubelet[1510]: I0716 12:41:57.113411 1510 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6mr78\" (UniqueName: \"kubernetes.io/projected/d11b2cf0-12d8-4209-875b-8be7e9c082b5-kube-api-access-6mr78\") pod \"nginx-deployment-8587fbcb89-t7rxk\" (UID: \"d11b2cf0-12d8-4209-875b-8be7e9c082b5\") " pod="default/nginx-deployment-8587fbcb89-t7rxk" Jul 16 12:41:57.124414 kubelet[1510]: E0716 12:41:57.124348 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:41:57.314809 env[1191]: time="2025-07-16T12:41:57.314298242Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-t7rxk,Uid:d11b2cf0-12d8-4209-875b-8be7e9c082b5,Namespace:default,Attempt:0,}" Jul 16 12:41:57.423479 env[1191]: time="2025-07-16T12:41:57.423414602Z" level=error msg="Failed to destroy network for sandbox \"7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 16 12:41:57.425436 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89-shm.mount: Deactivated successfully. Jul 16 12:41:57.426501 env[1191]: time="2025-07-16T12:41:57.426459871Z" level=error msg="encountered an error cleaning up failed sandbox \"7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 16 12:41:57.426685 env[1191]: time="2025-07-16T12:41:57.426656662Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-t7rxk,Uid:d11b2cf0-12d8-4209-875b-8be7e9c082b5,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 16 12:41:57.427136 kubelet[1510]: E0716 12:41:57.427084 1510 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 16 12:41:57.427214 kubelet[1510]: E0716 12:41:57.427162 1510 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-t7rxk" Jul 16 12:41:57.427214 kubelet[1510]: E0716 12:41:57.427192 1510 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-t7rxk" Jul 16 12:41:57.427288 kubelet[1510]: E0716 12:41:57.427258 1510 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-8587fbcb89-t7rxk_default(d11b2cf0-12d8-4209-875b-8be7e9c082b5)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-8587fbcb89-t7rxk_default(d11b2cf0-12d8-4209-875b-8be7e9c082b5)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-t7rxk" podUID="d11b2cf0-12d8-4209-875b-8be7e9c082b5" Jul 16 12:41:57.814858 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount103407075.mount: Deactivated successfully. Jul 16 12:41:57.838126 env[1191]: time="2025-07-16T12:41:57.838054524Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:57.839055 env[1191]: time="2025-07-16T12:41:57.839015393Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cc52550d767f73458fee2ee68db9db5de30d175e8fa4569ebdb43610127b6d20,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:57.840987 env[1191]: time="2025-07-16T12:41:57.840960691Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:57.842123 env[1191]: time="2025-07-16T12:41:57.842100117Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e94d49349cc361ef2216d27dda4a097278984d778279f66e79b0616c827c6760,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:41:57.842765 env[1191]: time="2025-07-16T12:41:57.842739631Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.2\" returns image reference \"sha256:cc52550d767f73458fee2ee68db9db5de30d175e8fa4569ebdb43610127b6d20\"" Jul 16 12:41:57.851956 env[1191]: time="2025-07-16T12:41:57.851924055Z" level=info msg="CreateContainer within sandbox \"f2f35bb5243b0d97c9e6e6721b05bf26a48a13b6dd5a4dd16cef346237a64faa\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Jul 16 12:41:57.874444 env[1191]: time="2025-07-16T12:41:57.874359817Z" level=info msg="CreateContainer within sandbox \"f2f35bb5243b0d97c9e6e6721b05bf26a48a13b6dd5a4dd16cef346237a64faa\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"0bc1ed93adc8c95eb29914ba58de86eb3149df1f73e451a46684bf0a815ef2e2\"" Jul 16 12:41:57.876156 env[1191]: time="2025-07-16T12:41:57.876110443Z" level=info msg="StartContainer for \"0bc1ed93adc8c95eb29914ba58de86eb3149df1f73e451a46684bf0a815ef2e2\"" Jul 16 12:41:57.904501 systemd[1]: Started cri-containerd-0bc1ed93adc8c95eb29914ba58de86eb3149df1f73e451a46684bf0a815ef2e2.scope. Jul 16 12:41:57.939000 audit[2033]: AVC avc: denied { perfmon } for pid=2033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:57.939000 audit[2033]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7faeb9c9af08 items=0 ppid=1577 pid=2033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:57.949405 kernel: audit: type=1400 audit(1752669717.939:554): avc: denied { perfmon } for pid=2033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:57.949515 kernel: audit: type=1300 audit(1752669717.939:554): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7faeb9c9af08 items=0 ppid=1577 pid=2033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:57.949556 kernel: audit: type=1327 audit(1752669717.939:554): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062633165643933616463386339356562323939313462613538646538 Jul 16 12:41:57.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062633165643933616463386339356562323939313462613538646538 Jul 16 12:41:57.942000 audit[2033]: AVC avc: denied { bpf } for pid=2033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:57.955648 kernel: audit: type=1400 audit(1752669717.942:555): avc: denied { bpf } for pid=2033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:57.955713 kernel: audit: type=1400 audit(1752669717.942:555): avc: denied { bpf } for pid=2033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:57.942000 audit[2033]: AVC avc: denied { bpf } for pid=2033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:57.942000 audit[2033]: AVC avc: denied { bpf } for pid=2033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:57.961256 kernel: audit: type=1400 audit(1752669717.942:555): avc: denied { bpf } for pid=2033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:57.961308 kernel: audit: type=1400 audit(1752669717.942:555): avc: denied { perfmon } for pid=2033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:57.942000 audit[2033]: AVC avc: denied { perfmon } for pid=2033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:57.942000 audit[2033]: AVC avc: denied { perfmon } for pid=2033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:57.966538 kernel: audit: type=1400 audit(1752669717.942:555): avc: denied { perfmon } for pid=2033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:57.942000 audit[2033]: AVC avc: denied { perfmon } for pid=2033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:57.970654 kernel: audit: type=1400 audit(1752669717.942:555): avc: denied { perfmon } for pid=2033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:57.942000 audit[2033]: AVC avc: denied { perfmon } for pid=2033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:57.942000 audit[2033]: AVC avc: denied { perfmon } for pid=2033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:57.942000 audit[2033]: AVC avc: denied { bpf } for pid=2033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:57.974641 kernel: audit: type=1400 audit(1752669717.942:555): avc: denied { perfmon } for pid=2033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:57.942000 audit[2033]: AVC avc: denied { bpf } for pid=2033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:57.942000 audit: BPF prog-id=81 op=LOAD Jul 16 12:41:57.942000 audit[2033]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002e7c58 items=0 ppid=1577 pid=2033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:57.942000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062633165643933616463386339356562323939313462613538646538 Jul 16 12:41:57.944000 audit[2033]: AVC avc: denied { bpf } for pid=2033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:57.944000 audit[2033]: AVC avc: denied { bpf } for pid=2033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:57.944000 audit[2033]: AVC avc: denied { perfmon } for pid=2033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:57.944000 audit[2033]: AVC avc: denied { perfmon } for pid=2033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:57.944000 audit[2033]: AVC avc: denied { perfmon } for pid=2033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:57.944000 audit[2033]: AVC avc: denied { perfmon } for pid=2033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:57.944000 audit[2033]: AVC avc: denied { perfmon } for pid=2033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:57.944000 audit[2033]: AVC avc: denied { bpf } for pid=2033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:57.944000 audit[2033]: AVC avc: denied { bpf } for pid=2033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:57.944000 audit: BPF prog-id=82 op=LOAD Jul 16 12:41:57.944000 audit[2033]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002e7ca8 items=0 ppid=1577 pid=2033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:57.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062633165643933616463386339356562323939313462613538646538 Jul 16 12:41:57.952000 audit: BPF prog-id=82 op=UNLOAD Jul 16 12:41:57.952000 audit: BPF prog-id=81 op=UNLOAD Jul 16 12:41:57.952000 audit[2033]: AVC avc: denied { bpf } for pid=2033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:57.952000 audit[2033]: AVC avc: denied { bpf } for pid=2033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:57.952000 audit[2033]: AVC avc: denied { bpf } for pid=2033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:57.952000 audit[2033]: AVC avc: denied { perfmon } for pid=2033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:57.952000 audit[2033]: AVC avc: denied { perfmon } for pid=2033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:57.952000 audit[2033]: AVC avc: denied { perfmon } for pid=2033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:57.952000 audit[2033]: AVC avc: denied { perfmon } for pid=2033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:57.952000 audit[2033]: AVC avc: denied { perfmon } for pid=2033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:57.952000 audit[2033]: AVC avc: denied { bpf } for pid=2033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:57.952000 audit[2033]: AVC avc: denied { bpf } for pid=2033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:57.952000 audit: BPF prog-id=83 op=LOAD Jul 16 12:41:57.952000 audit[2033]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002e7d38 items=0 ppid=1577 pid=2033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:57.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062633165643933616463386339356562323939313462613538646538 Jul 16 12:41:57.983323 env[1191]: time="2025-07-16T12:41:57.983276776Z" level=info msg="StartContainer for \"0bc1ed93adc8c95eb29914ba58de86eb3149df1f73e451a46684bf0a815ef2e2\" returns successfully" Jul 16 12:41:58.126833 kubelet[1510]: E0716 12:41:58.124944 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:41:58.127681 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Jul 16 12:41:58.127815 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Jul 16 12:41:58.418441 kubelet[1510]: I0716 12:41:58.418290 1510 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89" Jul 16 12:41:58.420009 env[1191]: time="2025-07-16T12:41:58.419924042Z" level=info msg="StopPodSandbox for \"7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89\"" Jul 16 12:41:58.452007 kubelet[1510]: I0716 12:41:58.451656 1510 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-jhd9s" podStartSLOduration=3.940430662 podStartE2EDuration="21.451573162s" podCreationTimestamp="2025-07-16 12:41:37 +0000 UTC" firstStartedPulling="2025-07-16 12:41:40.333011229 +0000 UTC m=+3.703895059" lastFinishedPulling="2025-07-16 12:41:57.844153723 +0000 UTC m=+21.215037559" observedRunningTime="2025-07-16 12:41:58.450732749 +0000 UTC m=+21.821616581" watchObservedRunningTime="2025-07-16 12:41:58.451573162 +0000 UTC m=+21.822457015" Jul 16 12:41:58.616120 env[1191]: 2025-07-16 12:41:58.534 [INFO][2097] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89" Jul 16 12:41:58.616120 env[1191]: 2025-07-16 12:41:58.536 [INFO][2097] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89" iface="eth0" netns="/var/run/netns/cni-2b062f05-a8f9-4607-a938-a9c6c2f16378" Jul 16 12:41:58.616120 env[1191]: 2025-07-16 12:41:58.536 [INFO][2097] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89" iface="eth0" netns="/var/run/netns/cni-2b062f05-a8f9-4607-a938-a9c6c2f16378" Jul 16 12:41:58.616120 env[1191]: 2025-07-16 12:41:58.537 [INFO][2097] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89" iface="eth0" netns="/var/run/netns/cni-2b062f05-a8f9-4607-a938-a9c6c2f16378" Jul 16 12:41:58.616120 env[1191]: 2025-07-16 12:41:58.537 [INFO][2097] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89" Jul 16 12:41:58.616120 env[1191]: 2025-07-16 12:41:58.538 [INFO][2097] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89" Jul 16 12:41:58.616120 env[1191]: 2025-07-16 12:41:58.592 [INFO][2128] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89" HandleID="k8s-pod-network.7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89" Workload="10.244.102.154-k8s-nginx--deployment--8587fbcb89--t7rxk-eth0" Jul 16 12:41:58.616120 env[1191]: 2025-07-16 12:41:58.592 [INFO][2128] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 16 12:41:58.616120 env[1191]: 2025-07-16 12:41:58.592 [INFO][2128] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 16 12:41:58.616120 env[1191]: 2025-07-16 12:41:58.604 [WARNING][2128] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89" HandleID="k8s-pod-network.7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89" Workload="10.244.102.154-k8s-nginx--deployment--8587fbcb89--t7rxk-eth0" Jul 16 12:41:58.616120 env[1191]: 2025-07-16 12:41:58.605 [INFO][2128] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89" HandleID="k8s-pod-network.7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89" Workload="10.244.102.154-k8s-nginx--deployment--8587fbcb89--t7rxk-eth0" Jul 16 12:41:58.616120 env[1191]: 2025-07-16 12:41:58.610 [INFO][2128] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 16 12:41:58.616120 env[1191]: 2025-07-16 12:41:58.614 [INFO][2097] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89" Jul 16 12:41:58.621925 env[1191]: time="2025-07-16T12:41:58.616895947Z" level=info msg="TearDown network for sandbox \"7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89\" successfully" Jul 16 12:41:58.621925 env[1191]: time="2025-07-16T12:41:58.616938725Z" level=info msg="StopPodSandbox for \"7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89\" returns successfully" Jul 16 12:41:58.621925 env[1191]: time="2025-07-16T12:41:58.617826895Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-t7rxk,Uid:d11b2cf0-12d8-4209-875b-8be7e9c082b5,Namespace:default,Attempt:1,}" Jul 16 12:41:58.619494 systemd[1]: run-netns-cni\x2d2b062f05\x2da8f9\x2d4607\x2da938\x2da9c6c2f16378.mount: Deactivated successfully. Jul 16 12:41:58.815835 systemd-networkd[1029]: cali83efb2275d7: Link UP Jul 16 12:41:58.821989 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 16 12:41:58.822326 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali83efb2275d7: link becomes ready Jul 16 12:41:58.822709 systemd-networkd[1029]: cali83efb2275d7: Gained carrier Jul 16 12:41:58.837850 env[1191]: 2025-07-16 12:41:58.662 [INFO][2134] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Jul 16 12:41:58.837850 env[1191]: 2025-07-16 12:41:58.688 [INFO][2134] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.244.102.154-k8s-nginx--deployment--8587fbcb89--t7rxk-eth0 nginx-deployment-8587fbcb89- default d11b2cf0-12d8-4209-875b-8be7e9c082b5 1305 0 2025-07-16 12:41:56 +0000 UTC map[app:nginx pod-template-hash:8587fbcb89 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.244.102.154 nginx-deployment-8587fbcb89-t7rxk eth0 default [] [] [kns.default ksa.default.default] cali83efb2275d7 [] [] }} ContainerID="2f2116d0ca5f5b1e096ebde8f3e08274757c8c9fa8f092103090bd5386e25e92" Namespace="default" Pod="nginx-deployment-8587fbcb89-t7rxk" WorkloadEndpoint="10.244.102.154-k8s-nginx--deployment--8587fbcb89--t7rxk-" Jul 16 12:41:58.837850 env[1191]: 2025-07-16 12:41:58.688 [INFO][2134] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="2f2116d0ca5f5b1e096ebde8f3e08274757c8c9fa8f092103090bd5386e25e92" Namespace="default" Pod="nginx-deployment-8587fbcb89-t7rxk" WorkloadEndpoint="10.244.102.154-k8s-nginx--deployment--8587fbcb89--t7rxk-eth0" Jul 16 12:41:58.837850 env[1191]: 2025-07-16 12:41:58.732 [INFO][2147] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2f2116d0ca5f5b1e096ebde8f3e08274757c8c9fa8f092103090bd5386e25e92" HandleID="k8s-pod-network.2f2116d0ca5f5b1e096ebde8f3e08274757c8c9fa8f092103090bd5386e25e92" Workload="10.244.102.154-k8s-nginx--deployment--8587fbcb89--t7rxk-eth0" Jul 16 12:41:58.837850 env[1191]: 2025-07-16 12:41:58.732 [INFO][2147] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="2f2116d0ca5f5b1e096ebde8f3e08274757c8c9fa8f092103090bd5386e25e92" HandleID="k8s-pod-network.2f2116d0ca5f5b1e096ebde8f3e08274757c8c9fa8f092103090bd5386e25e92" Workload="10.244.102.154-k8s-nginx--deployment--8587fbcb89--t7rxk-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002c9230), Attrs:map[string]string{"namespace":"default", "node":"10.244.102.154", "pod":"nginx-deployment-8587fbcb89-t7rxk", "timestamp":"2025-07-16 12:41:58.732576067 +0000 UTC"}, Hostname:"10.244.102.154", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 16 12:41:58.837850 env[1191]: 2025-07-16 12:41:58.733 [INFO][2147] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 16 12:41:58.837850 env[1191]: 2025-07-16 12:41:58.733 [INFO][2147] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 16 12:41:58.837850 env[1191]: 2025-07-16 12:41:58.733 [INFO][2147] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.244.102.154' Jul 16 12:41:58.837850 env[1191]: 2025-07-16 12:41:58.745 [INFO][2147] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.2f2116d0ca5f5b1e096ebde8f3e08274757c8c9fa8f092103090bd5386e25e92" host="10.244.102.154" Jul 16 12:41:58.837850 env[1191]: 2025-07-16 12:41:58.757 [INFO][2147] ipam/ipam.go 394: Looking up existing affinities for host host="10.244.102.154" Jul 16 12:41:58.837850 env[1191]: 2025-07-16 12:41:58.768 [INFO][2147] ipam/ipam.go 511: Trying affinity for 192.168.67.64/26 host="10.244.102.154" Jul 16 12:41:58.837850 env[1191]: 2025-07-16 12:41:58.771 [INFO][2147] ipam/ipam.go 158: Attempting to load block cidr=192.168.67.64/26 host="10.244.102.154" Jul 16 12:41:58.837850 env[1191]: 2025-07-16 12:41:58.776 [INFO][2147] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.67.64/26 host="10.244.102.154" Jul 16 12:41:58.837850 env[1191]: 2025-07-16 12:41:58.776 [INFO][2147] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.67.64/26 handle="k8s-pod-network.2f2116d0ca5f5b1e096ebde8f3e08274757c8c9fa8f092103090bd5386e25e92" host="10.244.102.154" Jul 16 12:41:58.837850 env[1191]: 2025-07-16 12:41:58.779 [INFO][2147] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.2f2116d0ca5f5b1e096ebde8f3e08274757c8c9fa8f092103090bd5386e25e92 Jul 16 12:41:58.837850 env[1191]: 2025-07-16 12:41:58.787 [INFO][2147] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.67.64/26 handle="k8s-pod-network.2f2116d0ca5f5b1e096ebde8f3e08274757c8c9fa8f092103090bd5386e25e92" host="10.244.102.154" Jul 16 12:41:58.837850 env[1191]: 2025-07-16 12:41:58.795 [INFO][2147] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.67.65/26] block=192.168.67.64/26 handle="k8s-pod-network.2f2116d0ca5f5b1e096ebde8f3e08274757c8c9fa8f092103090bd5386e25e92" host="10.244.102.154" Jul 16 12:41:58.837850 env[1191]: 2025-07-16 12:41:58.795 [INFO][2147] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.67.65/26] handle="k8s-pod-network.2f2116d0ca5f5b1e096ebde8f3e08274757c8c9fa8f092103090bd5386e25e92" host="10.244.102.154" Jul 16 12:41:58.837850 env[1191]: 2025-07-16 12:41:58.795 [INFO][2147] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 16 12:41:58.837850 env[1191]: 2025-07-16 12:41:58.795 [INFO][2147] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.67.65/26] IPv6=[] ContainerID="2f2116d0ca5f5b1e096ebde8f3e08274757c8c9fa8f092103090bd5386e25e92" HandleID="k8s-pod-network.2f2116d0ca5f5b1e096ebde8f3e08274757c8c9fa8f092103090bd5386e25e92" Workload="10.244.102.154-k8s-nginx--deployment--8587fbcb89--t7rxk-eth0" Jul 16 12:41:58.838792 env[1191]: 2025-07-16 12:41:58.799 [INFO][2134] cni-plugin/k8s.go 418: Populated endpoint ContainerID="2f2116d0ca5f5b1e096ebde8f3e08274757c8c9fa8f092103090bd5386e25e92" Namespace="default" Pod="nginx-deployment-8587fbcb89-t7rxk" WorkloadEndpoint="10.244.102.154-k8s-nginx--deployment--8587fbcb89--t7rxk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.102.154-k8s-nginx--deployment--8587fbcb89--t7rxk-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"d11b2cf0-12d8-4209-875b-8be7e9c082b5", ResourceVersion:"1305", Generation:0, CreationTimestamp:time.Date(2025, time.July, 16, 12, 41, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.102.154", ContainerID:"", Pod:"nginx-deployment-8587fbcb89-t7rxk", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.67.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali83efb2275d7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 16 12:41:58.838792 env[1191]: 2025-07-16 12:41:58.800 [INFO][2134] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.67.65/32] ContainerID="2f2116d0ca5f5b1e096ebde8f3e08274757c8c9fa8f092103090bd5386e25e92" Namespace="default" Pod="nginx-deployment-8587fbcb89-t7rxk" WorkloadEndpoint="10.244.102.154-k8s-nginx--deployment--8587fbcb89--t7rxk-eth0" Jul 16 12:41:58.838792 env[1191]: 2025-07-16 12:41:58.800 [INFO][2134] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali83efb2275d7 ContainerID="2f2116d0ca5f5b1e096ebde8f3e08274757c8c9fa8f092103090bd5386e25e92" Namespace="default" Pod="nginx-deployment-8587fbcb89-t7rxk" WorkloadEndpoint="10.244.102.154-k8s-nginx--deployment--8587fbcb89--t7rxk-eth0" Jul 16 12:41:58.838792 env[1191]: 2025-07-16 12:41:58.823 [INFO][2134] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="2f2116d0ca5f5b1e096ebde8f3e08274757c8c9fa8f092103090bd5386e25e92" Namespace="default" Pod="nginx-deployment-8587fbcb89-t7rxk" WorkloadEndpoint="10.244.102.154-k8s-nginx--deployment--8587fbcb89--t7rxk-eth0" Jul 16 12:41:58.838792 env[1191]: 2025-07-16 12:41:58.824 [INFO][2134] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="2f2116d0ca5f5b1e096ebde8f3e08274757c8c9fa8f092103090bd5386e25e92" Namespace="default" Pod="nginx-deployment-8587fbcb89-t7rxk" WorkloadEndpoint="10.244.102.154-k8s-nginx--deployment--8587fbcb89--t7rxk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.102.154-k8s-nginx--deployment--8587fbcb89--t7rxk-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"d11b2cf0-12d8-4209-875b-8be7e9c082b5", ResourceVersion:"1305", Generation:0, CreationTimestamp:time.Date(2025, time.July, 16, 12, 41, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.102.154", ContainerID:"2f2116d0ca5f5b1e096ebde8f3e08274757c8c9fa8f092103090bd5386e25e92", Pod:"nginx-deployment-8587fbcb89-t7rxk", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.67.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali83efb2275d7", MAC:"fa:d7:53:56:2a:11", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 16 12:41:58.838792 env[1191]: 2025-07-16 12:41:58.835 [INFO][2134] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="2f2116d0ca5f5b1e096ebde8f3e08274757c8c9fa8f092103090bd5386e25e92" Namespace="default" Pod="nginx-deployment-8587fbcb89-t7rxk" WorkloadEndpoint="10.244.102.154-k8s-nginx--deployment--8587fbcb89--t7rxk-eth0" Jul 16 12:41:58.850049 env[1191]: time="2025-07-16T12:41:58.849971663Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 16 12:41:58.850049 env[1191]: time="2025-07-16T12:41:58.850023551Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 16 12:41:58.850286 env[1191]: time="2025-07-16T12:41:58.850255104Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 16 12:41:58.850879 env[1191]: time="2025-07-16T12:41:58.850828455Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2f2116d0ca5f5b1e096ebde8f3e08274757c8c9fa8f092103090bd5386e25e92 pid=2168 runtime=io.containerd.runc.v2 Jul 16 12:41:58.866398 systemd[1]: Started cri-containerd-2f2116d0ca5f5b1e096ebde8f3e08274757c8c9fa8f092103090bd5386e25e92.scope. Jul 16 12:41:58.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:58.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:58.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:58.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:58.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:58.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:58.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:58.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:58.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:58.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:58.886000 audit: BPF prog-id=84 op=LOAD Jul 16 12:41:58.887000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:58.887000 audit[2178]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2168 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:58.887000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266323131366430636135663562316530393665626465386633653038 Jul 16 12:41:58.887000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:58.887000 audit[2178]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2168 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:58.887000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266323131366430636135663562316530393665626465386633653038 Jul 16 12:41:58.887000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:58.887000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:58.887000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:58.887000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:58.887000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:58.887000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:58.887000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:58.887000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:58.887000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:58.887000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:58.887000 audit: BPF prog-id=85 op=LOAD Jul 16 12:41:58.887000 audit[2178]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001d3d30 items=0 ppid=2168 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:58.887000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266323131366430636135663562316530393665626465386633653038 Jul 16 12:41:58.887000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:58.887000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:58.887000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:58.887000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:58.887000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:58.887000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:58.887000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:58.887000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:58.887000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:58.887000 audit: BPF prog-id=86 op=LOAD Jul 16 12:41:58.887000 audit[2178]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001d3d78 items=0 ppid=2168 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:58.887000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266323131366430636135663562316530393665626465386633653038 Jul 16 12:41:58.887000 audit: BPF prog-id=86 op=UNLOAD Jul 16 12:41:58.887000 audit: BPF prog-id=85 op=UNLOAD Jul 16 12:41:58.887000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:58.887000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:58.887000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:58.887000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:58.887000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:58.887000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:58.887000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:58.887000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:58.887000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:58.887000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:58.887000 audit: BPF prog-id=87 op=LOAD Jul 16 12:41:58.887000 audit[2178]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001f0188 items=0 ppid=2168 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:58.887000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266323131366430636135663562316530393665626465386633653038 Jul 16 12:41:58.923774 env[1191]: time="2025-07-16T12:41:58.923702547Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-t7rxk,Uid:d11b2cf0-12d8-4209-875b-8be7e9c082b5,Namespace:default,Attempt:1,} returns sandbox id \"2f2116d0ca5f5b1e096ebde8f3e08274757c8c9fa8f092103090bd5386e25e92\"" Jul 16 12:41:58.925861 env[1191]: time="2025-07-16T12:41:58.925831943Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Jul 16 12:41:59.125830 kubelet[1510]: E0716 12:41:59.125488 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:41:59.460853 systemd[1]: run-containerd-runc-k8s.io-0bc1ed93adc8c95eb29914ba58de86eb3149df1f73e451a46684bf0a815ef2e2-runc.0GUlsW.mount: Deactivated successfully. Jul 16 12:41:59.588000 audit[2260]: AVC avc: denied { write } for pid=2260 comm="tee" name="fd" dev="proc" ino=21219 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 16 12:41:59.588000 audit[2260]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc75fbf7db a2=241 a3=1b6 items=1 ppid=2232 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:59.588000 audit: CWD cwd="/etc/service/enabled/bird/log" Jul 16 12:41:59.588000 audit: PATH item=0 name="/dev/fd/63" inode=21210 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:41:59.588000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 16 12:41:59.596000 audit[2264]: AVC avc: denied { write } for pid=2264 comm="tee" name="fd" dev="proc" ino=22329 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 16 12:41:59.596000 audit[2264]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdd1b2a7da a2=241 a3=1b6 items=1 ppid=2234 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:59.596000 audit: CWD cwd="/etc/service/enabled/bird6/log" Jul 16 12:41:59.596000 audit: PATH item=0 name="/dev/fd/63" inode=22310 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:41:59.596000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 16 12:41:59.622000 audit[2285]: AVC avc: denied { write } for pid=2285 comm="tee" name="fd" dev="proc" ino=22343 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 16 12:41:59.622000 audit[2285]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd581427cb a2=241 a3=1b6 items=1 ppid=2240 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:59.622000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Jul 16 12:41:59.622000 audit: PATH item=0 name="/dev/fd/63" inode=22333 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:41:59.622000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 16 12:41:59.623000 audit[2278]: AVC avc: denied { write } for pid=2278 comm="tee" name="fd" dev="proc" ino=22347 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 16 12:41:59.623000 audit[2278]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe2c21e7da a2=241 a3=1b6 items=1 ppid=2237 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:59.623000 audit: CWD cwd="/etc/service/enabled/confd/log" Jul 16 12:41:59.623000 audit: PATH item=0 name="/dev/fd/63" inode=22326 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:41:59.623000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 16 12:41:59.623000 audit[2276]: AVC avc: denied { write } for pid=2276 comm="tee" name="fd" dev="proc" ino=22351 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 16 12:41:59.623000 audit[2276]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff550097da a2=241 a3=1b6 items=1 ppid=2238 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:59.623000 audit: CWD cwd="/etc/service/enabled/felix/log" Jul 16 12:41:59.623000 audit: PATH item=0 name="/dev/fd/63" inode=22323 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:41:59.623000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 16 12:41:59.625000 audit[2287]: AVC avc: denied { write } for pid=2287 comm="tee" name="fd" dev="proc" ino=22355 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 16 12:41:59.625000 audit[2287]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff89bb17ca a2=241 a3=1b6 items=1 ppid=2244 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:59.625000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Jul 16 12:41:59.625000 audit: PATH item=0 name="/dev/fd/63" inode=22336 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:41:59.625000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 16 12:41:59.628000 audit[2274]: AVC avc: denied { write } for pid=2274 comm="tee" name="fd" dev="proc" ino=22360 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 16 12:41:59.628000 audit[2274]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff1bc8d7dc a2=241 a3=1b6 items=1 ppid=2248 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:59.628000 audit: CWD cwd="/etc/service/enabled/cni/log" Jul 16 12:41:59.628000 audit: PATH item=0 name="/dev/fd/63" inode=21222 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:41:59.628000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 16 12:41:59.881000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.881000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.881000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.881000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.881000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.881000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.881000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.881000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.881000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.881000 audit: BPF prog-id=88 op=LOAD Jul 16 12:41:59.881000 audit[2318]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc588e00b0 a2=98 a3=1fffffffffffffff items=0 ppid=2239 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:59.881000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 16 12:41:59.882000 audit: BPF prog-id=88 op=UNLOAD Jul 16 12:41:59.882000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.882000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.882000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.882000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.882000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.882000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.882000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.882000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.882000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.882000 audit: BPF prog-id=89 op=LOAD Jul 16 12:41:59.882000 audit[2318]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc588dff90 a2=94 a3=3 items=0 ppid=2239 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:59.882000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 16 12:41:59.887000 audit: BPF prog-id=89 op=UNLOAD Jul 16 12:41:59.887000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.887000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.887000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.887000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.887000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.887000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.887000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.887000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.887000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.887000 audit: BPF prog-id=90 op=LOAD Jul 16 12:41:59.887000 audit[2318]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc588dffd0 a2=94 a3=7ffc588e01b0 items=0 ppid=2239 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:59.887000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 16 12:41:59.888000 audit: BPF prog-id=90 op=UNLOAD Jul 16 12:41:59.888000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.888000 audit[2318]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffc588e00a0 a2=50 a3=a000000085 items=0 ppid=2239 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:59.888000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 16 12:41:59.897000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.897000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.897000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.897000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.897000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.897000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.897000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.897000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.897000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.897000 audit: BPF prog-id=91 op=LOAD Jul 16 12:41:59.897000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd3e29aea0 a2=98 a3=3 items=0 ppid=2239 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:59.897000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 16 12:41:59.899000 audit: BPF prog-id=91 op=UNLOAD Jul 16 12:41:59.899000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.899000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.899000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.899000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.899000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.899000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.899000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.899000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.899000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.899000 audit: BPF prog-id=92 op=LOAD Jul 16 12:41:59.899000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd3e29ac90 a2=94 a3=54428f items=0 ppid=2239 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:59.899000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 16 12:41:59.900000 audit: BPF prog-id=92 op=UNLOAD Jul 16 12:41:59.900000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.900000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.900000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.900000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.900000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.900000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.900000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.900000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.900000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:41:59.900000 audit: BPF prog-id=93 op=LOAD Jul 16 12:41:59.900000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd3e29acc0 a2=94 a3=2 items=0 ppid=2239 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:41:59.900000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 16 12:41:59.901000 audit: BPF prog-id=93 op=UNLOAD Jul 16 12:42:00.055000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.055000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.055000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.055000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.055000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.055000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.055000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.055000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.055000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.055000 audit: BPF prog-id=94 op=LOAD Jul 16 12:42:00.055000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd3e29ab80 a2=94 a3=1 items=0 ppid=2239 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.055000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 16 12:42:00.057000 audit: BPF prog-id=94 op=UNLOAD Jul 16 12:42:00.057000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.057000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd3e29ac50 a2=50 a3=7ffd3e29ad30 items=0 ppid=2239 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.057000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 16 12:42:00.078000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.078000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd3e29ab90 a2=28 a3=0 items=0 ppid=2239 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.078000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 16 12:42:00.079000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.079000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd3e29abc0 a2=28 a3=0 items=0 ppid=2239 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.079000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 16 12:42:00.079000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.079000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd3e29aad0 a2=28 a3=0 items=0 ppid=2239 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.079000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 16 12:42:00.079000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.079000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd3e29abe0 a2=28 a3=0 items=0 ppid=2239 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.079000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 16 12:42:00.079000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.079000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd3e29abc0 a2=28 a3=0 items=0 ppid=2239 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.079000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 16 12:42:00.080000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.080000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd3e29abb0 a2=28 a3=0 items=0 ppid=2239 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.080000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 16 12:42:00.080000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.080000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd3e29abe0 a2=28 a3=0 items=0 ppid=2239 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.080000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 16 12:42:00.080000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.080000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd3e29abc0 a2=28 a3=0 items=0 ppid=2239 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.080000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 16 12:42:00.080000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.080000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd3e29abe0 a2=28 a3=0 items=0 ppid=2239 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.080000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 16 12:42:00.081000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.081000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd3e29abb0 a2=28 a3=0 items=0 ppid=2239 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.081000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 16 12:42:00.081000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.081000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd3e29ac20 a2=28 a3=0 items=0 ppid=2239 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.081000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 16 12:42:00.081000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.081000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd3e29a9d0 a2=50 a3=1 items=0 ppid=2239 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.081000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 16 12:42:00.082000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.082000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.082000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.082000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.082000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.082000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.082000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.082000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.082000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.082000 audit: BPF prog-id=95 op=LOAD Jul 16 12:42:00.082000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd3e29a9d0 a2=94 a3=5 items=0 ppid=2239 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.082000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 16 12:42:00.083000 audit: BPF prog-id=95 op=UNLOAD Jul 16 12:42:00.083000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.083000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd3e29aa80 a2=50 a3=1 items=0 ppid=2239 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.083000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 16 12:42:00.083000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.083000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd3e29aba0 a2=4 a3=38 items=0 ppid=2239 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.083000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 16 12:42:00.083000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.083000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.083000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.083000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.083000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.083000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.083000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.083000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.083000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.083000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.083000 audit[2321]: AVC avc: denied { confidentiality } for pid=2321 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:00.083000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd3e29abf0 a2=94 a3=6 items=0 ppid=2239 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.083000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 16 12:42:00.084000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.084000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.084000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.084000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.084000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.084000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.084000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.084000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.084000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.084000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.084000 audit[2321]: AVC avc: denied { confidentiality } for pid=2321 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:00.084000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd3e29a3a0 a2=94 a3=88 items=0 ppid=2239 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.084000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 16 12:42:00.085000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.085000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.085000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.085000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.085000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.085000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.085000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.085000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.085000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.085000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.085000 audit[2321]: AVC avc: denied { confidentiality } for pid=2321 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:00.085000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd3e29a3a0 a2=94 a3=88 items=0 ppid=2239 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.085000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 16 12:42:00.104000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.104000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.104000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.104000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.104000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.104000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.104000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.104000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.104000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.104000 audit: BPF prog-id=96 op=LOAD Jul 16 12:42:00.104000 audit[2339]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd09a7d110 a2=98 a3=1999999999999999 items=0 ppid=2239 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.104000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Jul 16 12:42:00.105000 audit: BPF prog-id=96 op=UNLOAD Jul 16 12:42:00.106000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.106000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.106000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.106000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.106000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.106000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.106000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.106000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.106000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.106000 audit: BPF prog-id=97 op=LOAD Jul 16 12:42:00.106000 audit[2339]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd09a7cff0 a2=94 a3=ffff items=0 ppid=2239 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.106000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Jul 16 12:42:00.107000 audit: BPF prog-id=97 op=UNLOAD Jul 16 12:42:00.107000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.107000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.107000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.107000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.107000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.107000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.107000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.107000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.107000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.107000 audit: BPF prog-id=98 op=LOAD Jul 16 12:42:00.107000 audit[2339]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd09a7d030 a2=94 a3=7ffd09a7d210 items=0 ppid=2239 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.107000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Jul 16 12:42:00.108000 audit: BPF prog-id=98 op=UNLOAD Jul 16 12:42:00.126752 kubelet[1510]: E0716 12:42:00.126567 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:42:00.186868 systemd-networkd[1029]: vxlan.calico: Link UP Jul 16 12:42:00.186877 systemd-networkd[1029]: vxlan.calico: Gained carrier Jul 16 12:42:00.246000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.246000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.246000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.246000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.246000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.246000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.246000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.246000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.246000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.246000 audit: BPF prog-id=99 op=LOAD Jul 16 12:42:00.246000 audit[2366]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffd110ed60 a2=98 a3=0 items=0 ppid=2239 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.246000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 16 12:42:00.247000 audit: BPF prog-id=99 op=UNLOAD Jul 16 12:42:00.247000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.247000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.247000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.247000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.247000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.247000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.247000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.247000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.247000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.247000 audit: BPF prog-id=100 op=LOAD Jul 16 12:42:00.247000 audit[2366]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffd110eb70 a2=94 a3=54428f items=0 ppid=2239 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.247000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 16 12:42:00.247000 audit: BPF prog-id=100 op=UNLOAD Jul 16 12:42:00.247000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.247000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.247000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.247000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.247000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.247000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.247000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.247000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.247000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.247000 audit: BPF prog-id=101 op=LOAD Jul 16 12:42:00.247000 audit[2366]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffd110eba0 a2=94 a3=2 items=0 ppid=2239 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.247000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 16 12:42:00.247000 audit: BPF prog-id=101 op=UNLOAD Jul 16 12:42:00.247000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.247000 audit[2366]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffd110ea70 a2=28 a3=0 items=0 ppid=2239 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.247000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 16 12:42:00.247000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.247000 audit[2366]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd110eaa0 a2=28 a3=0 items=0 ppid=2239 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.247000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 16 12:42:00.247000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.247000 audit[2366]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd110e9b0 a2=28 a3=0 items=0 ppid=2239 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.247000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 16 12:42:00.247000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.247000 audit[2366]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffd110eac0 a2=28 a3=0 items=0 ppid=2239 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.247000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 16 12:42:00.247000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.247000 audit[2366]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffd110eaa0 a2=28 a3=0 items=0 ppid=2239 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.247000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 16 12:42:00.247000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.247000 audit[2366]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffd110ea90 a2=28 a3=0 items=0 ppid=2239 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.247000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 16 12:42:00.247000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.247000 audit[2366]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffd110eac0 a2=28 a3=0 items=0 ppid=2239 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.247000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 16 12:42:00.247000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.247000 audit[2366]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd110eaa0 a2=28 a3=0 items=0 ppid=2239 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.247000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 16 12:42:00.247000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.247000 audit[2366]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd110eac0 a2=28 a3=0 items=0 ppid=2239 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.247000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 16 12:42:00.247000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.247000 audit[2366]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd110ea90 a2=28 a3=0 items=0 ppid=2239 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.247000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 16 12:42:00.247000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.247000 audit[2366]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffd110eb00 a2=28 a3=0 items=0 ppid=2239 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.247000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 16 12:42:00.247000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.247000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.247000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.247000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.247000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.247000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.247000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.247000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.247000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.247000 audit: BPF prog-id=102 op=LOAD Jul 16 12:42:00.247000 audit[2366]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffd110e970 a2=94 a3=0 items=0 ppid=2239 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.247000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 16 12:42:00.247000 audit: BPF prog-id=102 op=UNLOAD Jul 16 12:42:00.249000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.249000 audit[2366]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fffd110e960 a2=50 a3=2800 items=0 ppid=2239 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.249000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 16 12:42:00.249000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.249000 audit[2366]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fffd110e960 a2=50 a3=2800 items=0 ppid=2239 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.249000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 16 12:42:00.249000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.249000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.249000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.249000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.249000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.249000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.249000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.249000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.249000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.249000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.249000 audit: BPF prog-id=103 op=LOAD Jul 16 12:42:00.249000 audit[2366]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffd110e180 a2=94 a3=2 items=0 ppid=2239 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.249000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 16 12:42:00.249000 audit: BPF prog-id=103 op=UNLOAD Jul 16 12:42:00.249000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.249000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.249000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.249000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.249000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.249000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.249000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.249000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.249000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.249000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.249000 audit: BPF prog-id=104 op=LOAD Jul 16 12:42:00.249000 audit[2366]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffd110e280 a2=94 a3=30 items=0 ppid=2239 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.249000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 16 12:42:00.262000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.262000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.262000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.262000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.262000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.262000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.262000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.262000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.262000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.262000 audit: BPF prog-id=105 op=LOAD Jul 16 12:42:00.262000 audit[2373]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc2ebc3c40 a2=98 a3=0 items=0 ppid=2239 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.262000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 16 12:42:00.263000 audit: BPF prog-id=105 op=UNLOAD Jul 16 12:42:00.263000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.263000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.263000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.263000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.263000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.263000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.263000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.263000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.263000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.263000 audit: BPF prog-id=106 op=LOAD Jul 16 12:42:00.263000 audit[2373]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc2ebc3a30 a2=94 a3=54428f items=0 ppid=2239 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.263000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 16 12:42:00.263000 audit: BPF prog-id=106 op=UNLOAD Jul 16 12:42:00.263000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.263000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.263000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.263000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.263000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.263000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.263000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.263000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.263000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.263000 audit: BPF prog-id=107 op=LOAD Jul 16 12:42:00.263000 audit[2373]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc2ebc3a60 a2=94 a3=2 items=0 ppid=2239 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.263000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 16 12:42:00.263000 audit: BPF prog-id=107 op=UNLOAD Jul 16 12:42:00.437000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.437000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.437000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.437000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.437000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.437000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.437000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.437000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.437000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.437000 audit: BPF prog-id=108 op=LOAD Jul 16 12:42:00.437000 audit[2373]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc2ebc3920 a2=94 a3=1 items=0 ppid=2239 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.437000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 16 12:42:00.438000 audit: BPF prog-id=108 op=UNLOAD Jul 16 12:42:00.438000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.438000 audit[2373]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc2ebc39f0 a2=50 a3=7ffc2ebc3ad0 items=0 ppid=2239 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.438000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 16 12:42:00.456000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.456000 audit[2373]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc2ebc3930 a2=28 a3=0 items=0 ppid=2239 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.456000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 16 12:42:00.457000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.457000 audit[2373]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc2ebc3960 a2=28 a3=0 items=0 ppid=2239 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.457000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 16 12:42:00.458000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.458000 audit[2373]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc2ebc3870 a2=28 a3=0 items=0 ppid=2239 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.458000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 16 12:42:00.458000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.458000 audit[2373]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc2ebc3980 a2=28 a3=0 items=0 ppid=2239 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.458000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 16 12:42:00.459000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.459000 audit[2373]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc2ebc3960 a2=28 a3=0 items=0 ppid=2239 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.459000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 16 12:42:00.459000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.459000 audit[2373]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc2ebc3950 a2=28 a3=0 items=0 ppid=2239 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.459000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 16 12:42:00.459000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.459000 audit[2373]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc2ebc3980 a2=28 a3=0 items=0 ppid=2239 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.459000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 16 12:42:00.460000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.460000 audit[2373]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc2ebc3960 a2=28 a3=0 items=0 ppid=2239 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.460000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 16 12:42:00.460000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.460000 audit[2373]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc2ebc3980 a2=28 a3=0 items=0 ppid=2239 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.460000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 16 12:42:00.460000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.460000 audit[2373]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc2ebc3950 a2=28 a3=0 items=0 ppid=2239 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.460000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 16 12:42:00.461000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.461000 audit[2373]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc2ebc39c0 a2=28 a3=0 items=0 ppid=2239 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.461000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 16 12:42:00.465000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.465000 audit[2373]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc2ebc3770 a2=50 a3=1 items=0 ppid=2239 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.465000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 16 12:42:00.465000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.465000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.465000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.465000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.465000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.465000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.465000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.465000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.465000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.465000 audit: BPF prog-id=109 op=LOAD Jul 16 12:42:00.465000 audit[2373]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc2ebc3770 a2=94 a3=5 items=0 ppid=2239 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.465000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 16 12:42:00.466000 audit: BPF prog-id=109 op=UNLOAD Jul 16 12:42:00.466000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.466000 audit[2373]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc2ebc3820 a2=50 a3=1 items=0 ppid=2239 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.466000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 16 12:42:00.466000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.466000 audit[2373]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc2ebc3940 a2=4 a3=38 items=0 ppid=2239 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.466000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 16 12:42:00.466000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.466000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.466000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.466000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.466000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.466000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.466000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.466000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.466000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.466000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.466000 audit[2373]: AVC avc: denied { confidentiality } for pid=2373 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:00.466000 audit[2373]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc2ebc3990 a2=94 a3=6 items=0 ppid=2239 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.466000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 16 12:42:00.467000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.467000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.467000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.467000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.467000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.467000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.467000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.467000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.467000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.467000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.467000 audit[2373]: AVC avc: denied { confidentiality } for pid=2373 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:00.467000 audit[2373]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc2ebc3140 a2=94 a3=88 items=0 ppid=2239 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.467000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 16 12:42:00.469000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.469000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.469000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.469000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.469000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.469000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.469000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.469000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.469000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.469000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.469000 audit[2373]: AVC avc: denied { confidentiality } for pid=2373 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:00.469000 audit[2373]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc2ebc3140 a2=94 a3=88 items=0 ppid=2239 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.469000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 16 12:42:00.469000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.469000 audit[2373]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc2ebc4b70 a2=10 a3=f8f00800 items=0 ppid=2239 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.469000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 16 12:42:00.470000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.470000 audit[2373]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc2ebc4a10 a2=10 a3=3 items=0 ppid=2239 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.470000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 16 12:42:00.470000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.470000 audit[2373]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc2ebc49b0 a2=10 a3=3 items=0 ppid=2239 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.470000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 16 12:42:00.470000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:00.470000 audit[2373]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc2ebc49b0 a2=10 a3=7 items=0 ppid=2239 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.470000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 16 12:42:00.481000 audit: BPF prog-id=104 op=UNLOAD Jul 16 12:42:00.585000 audit[2403]: NETFILTER_CFG table=mangle:67 family=2 entries=16 op=nft_register_chain pid=2403 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 16 12:42:00.585000 audit[2403]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffedf820190 a2=0 a3=7ffedf82017c items=0 ppid=2239 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.585000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 16 12:42:00.614000 audit[2402]: NETFILTER_CFG table=raw:68 family=2 entries=21 op=nft_register_chain pid=2402 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 16 12:42:00.614000 audit[2402]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffd0ec95e30 a2=0 a3=7ffd0ec95e1c items=0 ppid=2239 pid=2402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.614000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 16 12:42:00.619000 audit[2404]: NETFILTER_CFG table=nat:69 family=2 entries=15 op=nft_register_chain pid=2404 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 16 12:42:00.619000 audit[2404]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7fff61fb2820 a2=0 a3=7fff61fb280c items=0 ppid=2239 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.619000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 16 12:42:00.629000 audit[2405]: NETFILTER_CFG table=filter:70 family=2 entries=73 op=nft_register_chain pid=2405 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 16 12:42:00.629000 audit[2405]: SYSCALL arch=c000003e syscall=46 success=yes exit=38580 a0=3 a1=7ffd6ba9d890 a2=0 a3=7ffd6ba9d87c items=0 ppid=2239 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:00.629000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 16 12:42:00.721938 systemd-networkd[1029]: cali83efb2275d7: Gained IPv6LL Jul 16 12:42:01.127733 kubelet[1510]: E0716 12:42:01.127585 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:42:02.087326 systemd-networkd[1029]: vxlan.calico: Gained IPv6LL Jul 16 12:42:02.128760 kubelet[1510]: E0716 12:42:02.128679 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:42:02.495654 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount35719758.mount: Deactivated successfully. Jul 16 12:42:03.129466 kubelet[1510]: E0716 12:42:03.129377 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:42:04.130246 kubelet[1510]: E0716 12:42:04.130168 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:42:04.227487 env[1191]: time="2025-07-16T12:42:04.227425757Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:42:04.229847 env[1191]: time="2025-07-16T12:42:04.229796913Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f6422896ca84c9af48d5417d6b7a573bf6b38f81edc15538907d987fc658d909,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:42:04.233532 env[1191]: time="2025-07-16T12:42:04.233481145Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:42:04.237289 env[1191]: time="2025-07-16T12:42:04.237239577Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:30bb68e656e0665bce700e67d2756f68bdca3345fa1099a32bfdb8febcf621cd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:42:04.239087 env[1191]: time="2025-07-16T12:42:04.239018758Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:f6422896ca84c9af48d5417d6b7a573bf6b38f81edc15538907d987fc658d909\"" Jul 16 12:42:04.242977 env[1191]: time="2025-07-16T12:42:04.242934895Z" level=info msg="CreateContainer within sandbox \"2f2116d0ca5f5b1e096ebde8f3e08274757c8c9fa8f092103090bd5386e25e92\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Jul 16 12:42:04.254319 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3807482830.mount: Deactivated successfully. Jul 16 12:42:04.261684 env[1191]: time="2025-07-16T12:42:04.261641544Z" level=info msg="CreateContainer within sandbox \"2f2116d0ca5f5b1e096ebde8f3e08274757c8c9fa8f092103090bd5386e25e92\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"159e9517e0a3492b421973c2a9a2f93d0dc95795d5e5f2b3340995790466a191\"" Jul 16 12:42:04.262292 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2777426288.mount: Deactivated successfully. Jul 16 12:42:04.263799 env[1191]: time="2025-07-16T12:42:04.263766571Z" level=info msg="StartContainer for \"159e9517e0a3492b421973c2a9a2f93d0dc95795d5e5f2b3340995790466a191\"" Jul 16 12:42:04.296261 systemd[1]: Started cri-containerd-159e9517e0a3492b421973c2a9a2f93d0dc95795d5e5f2b3340995790466a191.scope. Jul 16 12:42:04.322639 kernel: kauditd_printk_skb: 647 callbacks suppressed Jul 16 12:42:04.322822 kernel: audit: type=1400 audit(1752669724.319:687): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:04.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:04.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:04.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:04.331542 kernel: audit: type=1400 audit(1752669724.319:688): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:04.331644 kernel: audit: type=1400 audit(1752669724.319:689): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:04.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:04.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:04.337048 kernel: audit: type=1400 audit(1752669724.319:690): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:04.337131 kernel: audit: type=1400 audit(1752669724.319:691): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:04.337169 kernel: audit: type=1400 audit(1752669724.319:692): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:04.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:04.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:04.342715 kernel: audit: type=1400 audit(1752669724.319:693): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:04.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:04.346025 kernel: audit: type=1400 audit(1752669724.319:694): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:04.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:04.349227 kernel: audit: type=1400 audit(1752669724.319:695): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:04.349299 kernel: audit: type=1400 audit(1752669724.321:696): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:04.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:04.321000 audit: BPF prog-id=110 op=LOAD Jul 16 12:42:04.324000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:04.324000 audit[2429]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2168 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:04.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135396539353137653061333439326234323139373363326139613266 Jul 16 12:42:04.324000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:04.324000 audit[2429]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2168 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:04.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135396539353137653061333439326234323139373363326139613266 Jul 16 12:42:04.324000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:04.324000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:04.324000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:04.324000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:04.324000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:04.324000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:04.324000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:04.324000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:04.324000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:04.324000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:04.324000 audit: BPF prog-id=111 op=LOAD Jul 16 12:42:04.324000 audit[2429]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0001dfa00 items=0 ppid=2168 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:04.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135396539353137653061333439326234323139373363326139613266 Jul 16 12:42:04.325000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:04.325000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:04.325000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:04.325000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:04.325000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:04.325000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:04.325000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:04.325000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:04.325000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:04.325000 audit: BPF prog-id=112 op=LOAD Jul 16 12:42:04.325000 audit[2429]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0001dfa48 items=0 ppid=2168 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:04.325000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135396539353137653061333439326234323139373363326139613266 Jul 16 12:42:04.325000 audit: BPF prog-id=112 op=UNLOAD Jul 16 12:42:04.325000 audit: BPF prog-id=111 op=UNLOAD Jul 16 12:42:04.325000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:04.325000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:04.325000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:04.325000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:04.325000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:04.325000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:04.325000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:04.325000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:04.325000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:04.325000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:04.325000 audit: BPF prog-id=113 op=LOAD Jul 16 12:42:04.325000 audit[2429]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0001dfe58 items=0 ppid=2168 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:04.325000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135396539353137653061333439326234323139373363326139613266 Jul 16 12:42:04.372221 env[1191]: time="2025-07-16T12:42:04.372146518Z" level=info msg="StartContainer for \"159e9517e0a3492b421973c2a9a2f93d0dc95795d5e5f2b3340995790466a191\" returns successfully" Jul 16 12:42:05.130707 kubelet[1510]: E0716 12:42:05.130662 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:42:05.337435 env[1191]: time="2025-07-16T12:42:05.337206419Z" level=info msg="StopPodSandbox for \"ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de\"" Jul 16 12:42:05.442945 kubelet[1510]: I0716 12:42:05.442770 1510 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-8587fbcb89-t7rxk" podStartSLOduration=4.126913292 podStartE2EDuration="9.44273372s" podCreationTimestamp="2025-07-16 12:41:56 +0000 UTC" firstStartedPulling="2025-07-16 12:41:58.925238424 +0000 UTC m=+22.296122253" lastFinishedPulling="2025-07-16 12:42:04.241058851 +0000 UTC m=+27.611942681" observedRunningTime="2025-07-16 12:42:04.45687876 +0000 UTC m=+27.827762613" watchObservedRunningTime="2025-07-16 12:42:05.44273372 +0000 UTC m=+28.813617578" Jul 16 12:42:05.513952 env[1191]: 2025-07-16 12:42:05.444 [INFO][2487] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de" Jul 16 12:42:05.513952 env[1191]: 2025-07-16 12:42:05.444 [INFO][2487] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de" iface="eth0" netns="/var/run/netns/cni-9a613439-a789-6c69-fad8-0fe07cfd9826" Jul 16 12:42:05.513952 env[1191]: 2025-07-16 12:42:05.445 [INFO][2487] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de" iface="eth0" netns="/var/run/netns/cni-9a613439-a789-6c69-fad8-0fe07cfd9826" Jul 16 12:42:05.513952 env[1191]: 2025-07-16 12:42:05.446 [INFO][2487] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de" iface="eth0" netns="/var/run/netns/cni-9a613439-a789-6c69-fad8-0fe07cfd9826" Jul 16 12:42:05.513952 env[1191]: 2025-07-16 12:42:05.446 [INFO][2487] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de" Jul 16 12:42:05.513952 env[1191]: 2025-07-16 12:42:05.446 [INFO][2487] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de" Jul 16 12:42:05.513952 env[1191]: 2025-07-16 12:42:05.485 [INFO][2494] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de" HandleID="k8s-pod-network.ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de" Workload="10.244.102.154-k8s-csi--node--driver--shkf4-eth0" Jul 16 12:42:05.513952 env[1191]: 2025-07-16 12:42:05.485 [INFO][2494] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 16 12:42:05.513952 env[1191]: 2025-07-16 12:42:05.485 [INFO][2494] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 16 12:42:05.513952 env[1191]: 2025-07-16 12:42:05.505 [WARNING][2494] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de" HandleID="k8s-pod-network.ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de" Workload="10.244.102.154-k8s-csi--node--driver--shkf4-eth0" Jul 16 12:42:05.513952 env[1191]: 2025-07-16 12:42:05.505 [INFO][2494] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de" HandleID="k8s-pod-network.ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de" Workload="10.244.102.154-k8s-csi--node--driver--shkf4-eth0" Jul 16 12:42:05.513952 env[1191]: 2025-07-16 12:42:05.508 [INFO][2494] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 16 12:42:05.513952 env[1191]: 2025-07-16 12:42:05.511 [INFO][2487] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de" Jul 16 12:42:05.517587 systemd[1]: run-netns-cni\x2d9a613439\x2da789\x2d6c69\x2dfad8\x2d0fe07cfd9826.mount: Deactivated successfully. Jul 16 12:42:05.519680 env[1191]: time="2025-07-16T12:42:05.519503927Z" level=info msg="TearDown network for sandbox \"ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de\" successfully" Jul 16 12:42:05.519811 env[1191]: time="2025-07-16T12:42:05.519681574Z" level=info msg="StopPodSandbox for \"ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de\" returns successfully" Jul 16 12:42:05.520797 env[1191]: time="2025-07-16T12:42:05.520745129Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-shkf4,Uid:2fcf4458-9494-4dc8-b20e-0300cabbff4b,Namespace:calico-system,Attempt:1,}" Jul 16 12:42:05.731273 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 16 12:42:05.731446 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali27088d6cbb4: link becomes ready Jul 16 12:42:05.722396 systemd-networkd[1029]: cali27088d6cbb4: Link UP Jul 16 12:42:05.734022 systemd-networkd[1029]: cali27088d6cbb4: Gained carrier Jul 16 12:42:05.774753 env[1191]: 2025-07-16 12:42:05.599 [INFO][2500] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.244.102.154-k8s-csi--node--driver--shkf4-eth0 csi-node-driver- calico-system 2fcf4458-9494-4dc8-b20e-0300cabbff4b 1333 0 2025-07-16 12:41:37 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:57bd658777 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.244.102.154 csi-node-driver-shkf4 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali27088d6cbb4 [] [] }} ContainerID="097d0cc454bacb386bb013ddf7f71cf2b92bdfd52636e0afee877c2eec27c47f" Namespace="calico-system" Pod="csi-node-driver-shkf4" WorkloadEndpoint="10.244.102.154-k8s-csi--node--driver--shkf4-" Jul 16 12:42:05.774753 env[1191]: 2025-07-16 12:42:05.599 [INFO][2500] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="097d0cc454bacb386bb013ddf7f71cf2b92bdfd52636e0afee877c2eec27c47f" Namespace="calico-system" Pod="csi-node-driver-shkf4" WorkloadEndpoint="10.244.102.154-k8s-csi--node--driver--shkf4-eth0" Jul 16 12:42:05.774753 env[1191]: 2025-07-16 12:42:05.645 [INFO][2515] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="097d0cc454bacb386bb013ddf7f71cf2b92bdfd52636e0afee877c2eec27c47f" HandleID="k8s-pod-network.097d0cc454bacb386bb013ddf7f71cf2b92bdfd52636e0afee877c2eec27c47f" Workload="10.244.102.154-k8s-csi--node--driver--shkf4-eth0" Jul 16 12:42:05.774753 env[1191]: 2025-07-16 12:42:05.645 [INFO][2515] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="097d0cc454bacb386bb013ddf7f71cf2b92bdfd52636e0afee877c2eec27c47f" HandleID="k8s-pod-network.097d0cc454bacb386bb013ddf7f71cf2b92bdfd52636e0afee877c2eec27c47f" Workload="10.244.102.154-k8s-csi--node--driver--shkf4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d4ff0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.244.102.154", "pod":"csi-node-driver-shkf4", "timestamp":"2025-07-16 12:42:05.645486018 +0000 UTC"}, Hostname:"10.244.102.154", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 16 12:42:05.774753 env[1191]: 2025-07-16 12:42:05.645 [INFO][2515] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 16 12:42:05.774753 env[1191]: 2025-07-16 12:42:05.645 [INFO][2515] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 16 12:42:05.774753 env[1191]: 2025-07-16 12:42:05.645 [INFO][2515] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.244.102.154' Jul 16 12:42:05.774753 env[1191]: 2025-07-16 12:42:05.659 [INFO][2515] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.097d0cc454bacb386bb013ddf7f71cf2b92bdfd52636e0afee877c2eec27c47f" host="10.244.102.154" Jul 16 12:42:05.774753 env[1191]: 2025-07-16 12:42:05.668 [INFO][2515] ipam/ipam.go 394: Looking up existing affinities for host host="10.244.102.154" Jul 16 12:42:05.774753 env[1191]: 2025-07-16 12:42:05.677 [INFO][2515] ipam/ipam.go 511: Trying affinity for 192.168.67.64/26 host="10.244.102.154" Jul 16 12:42:05.774753 env[1191]: 2025-07-16 12:42:05.681 [INFO][2515] ipam/ipam.go 158: Attempting to load block cidr=192.168.67.64/26 host="10.244.102.154" Jul 16 12:42:05.774753 env[1191]: 2025-07-16 12:42:05.685 [INFO][2515] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.67.64/26 host="10.244.102.154" Jul 16 12:42:05.774753 env[1191]: 2025-07-16 12:42:05.685 [INFO][2515] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.67.64/26 handle="k8s-pod-network.097d0cc454bacb386bb013ddf7f71cf2b92bdfd52636e0afee877c2eec27c47f" host="10.244.102.154" Jul 16 12:42:05.774753 env[1191]: 2025-07-16 12:42:05.688 [INFO][2515] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.097d0cc454bacb386bb013ddf7f71cf2b92bdfd52636e0afee877c2eec27c47f Jul 16 12:42:05.774753 env[1191]: 2025-07-16 12:42:05.699 [INFO][2515] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.67.64/26 handle="k8s-pod-network.097d0cc454bacb386bb013ddf7f71cf2b92bdfd52636e0afee877c2eec27c47f" host="10.244.102.154" Jul 16 12:42:05.774753 env[1191]: 2025-07-16 12:42:05.708 [INFO][2515] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.67.66/26] block=192.168.67.64/26 handle="k8s-pod-network.097d0cc454bacb386bb013ddf7f71cf2b92bdfd52636e0afee877c2eec27c47f" host="10.244.102.154" Jul 16 12:42:05.774753 env[1191]: 2025-07-16 12:42:05.708 [INFO][2515] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.67.66/26] handle="k8s-pod-network.097d0cc454bacb386bb013ddf7f71cf2b92bdfd52636e0afee877c2eec27c47f" host="10.244.102.154" Jul 16 12:42:05.774753 env[1191]: 2025-07-16 12:42:05.708 [INFO][2515] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 16 12:42:05.774753 env[1191]: 2025-07-16 12:42:05.708 [INFO][2515] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.67.66/26] IPv6=[] ContainerID="097d0cc454bacb386bb013ddf7f71cf2b92bdfd52636e0afee877c2eec27c47f" HandleID="k8s-pod-network.097d0cc454bacb386bb013ddf7f71cf2b92bdfd52636e0afee877c2eec27c47f" Workload="10.244.102.154-k8s-csi--node--driver--shkf4-eth0" Jul 16 12:42:05.776845 env[1191]: 2025-07-16 12:42:05.712 [INFO][2500] cni-plugin/k8s.go 418: Populated endpoint ContainerID="097d0cc454bacb386bb013ddf7f71cf2b92bdfd52636e0afee877c2eec27c47f" Namespace="calico-system" Pod="csi-node-driver-shkf4" WorkloadEndpoint="10.244.102.154-k8s-csi--node--driver--shkf4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.102.154-k8s-csi--node--driver--shkf4-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2fcf4458-9494-4dc8-b20e-0300cabbff4b", ResourceVersion:"1333", Generation:0, CreationTimestamp:time.Date(2025, time.July, 16, 12, 41, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"57bd658777", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.102.154", ContainerID:"", Pod:"csi-node-driver-shkf4", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.67.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali27088d6cbb4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 16 12:42:05.776845 env[1191]: 2025-07-16 12:42:05.712 [INFO][2500] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.67.66/32] ContainerID="097d0cc454bacb386bb013ddf7f71cf2b92bdfd52636e0afee877c2eec27c47f" Namespace="calico-system" Pod="csi-node-driver-shkf4" WorkloadEndpoint="10.244.102.154-k8s-csi--node--driver--shkf4-eth0" Jul 16 12:42:05.776845 env[1191]: 2025-07-16 12:42:05.712 [INFO][2500] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali27088d6cbb4 ContainerID="097d0cc454bacb386bb013ddf7f71cf2b92bdfd52636e0afee877c2eec27c47f" Namespace="calico-system" Pod="csi-node-driver-shkf4" WorkloadEndpoint="10.244.102.154-k8s-csi--node--driver--shkf4-eth0" Jul 16 12:42:05.776845 env[1191]: 2025-07-16 12:42:05.724 [INFO][2500] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="097d0cc454bacb386bb013ddf7f71cf2b92bdfd52636e0afee877c2eec27c47f" Namespace="calico-system" Pod="csi-node-driver-shkf4" WorkloadEndpoint="10.244.102.154-k8s-csi--node--driver--shkf4-eth0" Jul 16 12:42:05.776845 env[1191]: 2025-07-16 12:42:05.734 [INFO][2500] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="097d0cc454bacb386bb013ddf7f71cf2b92bdfd52636e0afee877c2eec27c47f" Namespace="calico-system" Pod="csi-node-driver-shkf4" WorkloadEndpoint="10.244.102.154-k8s-csi--node--driver--shkf4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.102.154-k8s-csi--node--driver--shkf4-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2fcf4458-9494-4dc8-b20e-0300cabbff4b", ResourceVersion:"1333", Generation:0, CreationTimestamp:time.Date(2025, time.July, 16, 12, 41, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"57bd658777", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.102.154", ContainerID:"097d0cc454bacb386bb013ddf7f71cf2b92bdfd52636e0afee877c2eec27c47f", Pod:"csi-node-driver-shkf4", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.67.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali27088d6cbb4", MAC:"aa:15:6d:ec:35:6d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 16 12:42:05.776845 env[1191]: 2025-07-16 12:42:05.766 [INFO][2500] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="097d0cc454bacb386bb013ddf7f71cf2b92bdfd52636e0afee877c2eec27c47f" Namespace="calico-system" Pod="csi-node-driver-shkf4" WorkloadEndpoint="10.244.102.154-k8s-csi--node--driver--shkf4-eth0" Jul 16 12:42:05.782000 audit[2538]: NETFILTER_CFG table=filter:71 family=2 entries=42 op=nft_register_chain pid=2538 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 16 12:42:05.782000 audit[2538]: SYSCALL arch=c000003e syscall=46 success=yes exit=22552 a0=3 a1=7fff871114e0 a2=0 a3=7fff871114cc items=0 ppid=2239 pid=2538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:05.782000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 16 12:42:05.790274 env[1191]: time="2025-07-16T12:42:05.790144372Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 16 12:42:05.790274 env[1191]: time="2025-07-16T12:42:05.790237326Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 16 12:42:05.790274 env[1191]: time="2025-07-16T12:42:05.790261708Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 16 12:42:05.790954 env[1191]: time="2025-07-16T12:42:05.790908075Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/097d0cc454bacb386bb013ddf7f71cf2b92bdfd52636e0afee877c2eec27c47f pid=2545 runtime=io.containerd.runc.v2 Jul 16 12:42:05.813319 systemd[1]: Started cri-containerd-097d0cc454bacb386bb013ddf7f71cf2b92bdfd52636e0afee877c2eec27c47f.scope. Jul 16 12:42:05.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:05.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:05.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:05.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:05.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:05.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:05.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:05.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:05.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:05.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:05.834000 audit: BPF prog-id=114 op=LOAD Jul 16 12:42:05.835000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:05.835000 audit[2557]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2545 pid=2557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:05.835000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039376430636334353462616362333836626230313364646637663731 Jul 16 12:42:05.835000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:05.835000 audit[2557]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2545 pid=2557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:05.835000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039376430636334353462616362333836626230313364646637663731 Jul 16 12:42:05.835000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:05.835000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:05.835000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:05.835000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:05.835000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:05.835000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:05.835000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:05.835000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:05.835000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:05.835000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:05.835000 audit: BPF prog-id=115 op=LOAD Jul 16 12:42:05.835000 audit[2557]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000300ff0 items=0 ppid=2545 pid=2557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:05.835000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039376430636334353462616362333836626230313364646637663731 Jul 16 12:42:05.836000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:05.836000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:05.836000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:05.836000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:05.836000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:05.836000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:05.836000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:05.836000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:05.836000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:05.836000 audit: BPF prog-id=116 op=LOAD Jul 16 12:42:05.836000 audit[2557]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000301038 items=0 ppid=2545 pid=2557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:05.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039376430636334353462616362333836626230313364646637663731 Jul 16 12:42:05.837000 audit: BPF prog-id=116 op=UNLOAD Jul 16 12:42:05.837000 audit: BPF prog-id=115 op=UNLOAD Jul 16 12:42:05.837000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:05.837000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:05.837000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:05.837000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:05.837000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:05.837000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:05.837000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:05.837000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:05.837000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:05.837000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:05.837000 audit: BPF prog-id=117 op=LOAD Jul 16 12:42:05.837000 audit[2557]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000301448 items=0 ppid=2545 pid=2557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:05.837000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039376430636334353462616362333836626230313364646637663731 Jul 16 12:42:05.852883 env[1191]: time="2025-07-16T12:42:05.852841830Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-shkf4,Uid:2fcf4458-9494-4dc8-b20e-0300cabbff4b,Namespace:calico-system,Attempt:1,} returns sandbox id \"097d0cc454bacb386bb013ddf7f71cf2b92bdfd52636e0afee877c2eec27c47f\"" Jul 16 12:42:05.854913 env[1191]: time="2025-07-16T12:42:05.854870465Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.2\"" Jul 16 12:42:06.132263 kubelet[1510]: E0716 12:42:06.132214 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:42:07.133542 kubelet[1510]: E0716 12:42:07.133444 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:42:07.255726 env[1191]: time="2025-07-16T12:42:07.255627491Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:42:07.257201 env[1191]: time="2025-07-16T12:42:07.257140319Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c7fd1cc652979d89a51bbcc125e28e90c9815c0bd8f922a5bd36eed4e1927c6d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:42:07.258871 env[1191]: time="2025-07-16T12:42:07.258817969Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:42:07.260538 env[1191]: time="2025-07-16T12:42:07.260476938Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e570128aa8067a2f06b96d3cc98afa2e0a4b9790b435ee36ca051c8e72aeb8d0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:42:07.261136 env[1191]: time="2025-07-16T12:42:07.261084093Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.2\" returns image reference \"sha256:c7fd1cc652979d89a51bbcc125e28e90c9815c0bd8f922a5bd36eed4e1927c6d\"" Jul 16 12:42:07.267715 env[1191]: time="2025-07-16T12:42:07.267672335Z" level=info msg="CreateContainer within sandbox \"097d0cc454bacb386bb013ddf7f71cf2b92bdfd52636e0afee877c2eec27c47f\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Jul 16 12:42:07.281469 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2940243543.mount: Deactivated successfully. Jul 16 12:42:07.289299 env[1191]: time="2025-07-16T12:42:07.289219555Z" level=info msg="CreateContainer within sandbox \"097d0cc454bacb386bb013ddf7f71cf2b92bdfd52636e0afee877c2eec27c47f\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"1ed7eaec499dc44f80800e7c87f58db607354ef4269acf16574a6d2fd0623a6e\"" Jul 16 12:42:07.290855 env[1191]: time="2025-07-16T12:42:07.290796081Z" level=info msg="StartContainer for \"1ed7eaec499dc44f80800e7c87f58db607354ef4269acf16574a6d2fd0623a6e\"" Jul 16 12:42:07.314184 systemd[1]: Started cri-containerd-1ed7eaec499dc44f80800e7c87f58db607354ef4269acf16574a6d2fd0623a6e.scope. Jul 16 12:42:07.339000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:07.339000 audit[2586]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f104e165138 items=0 ppid=2545 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:07.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165643765616563343939646334346638303830306537633837663538 Jul 16 12:42:07.339000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:07.339000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:07.339000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:07.339000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:07.339000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:07.339000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:07.339000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:07.339000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:07.339000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:07.339000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:07.339000 audit: BPF prog-id=118 op=LOAD Jul 16 12:42:07.339000 audit[2586]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000182758 items=0 ppid=2545 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:07.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165643765616563343939646334346638303830306537633837663538 Jul 16 12:42:07.339000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:07.339000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:07.339000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:07.339000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:07.339000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:07.339000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:07.339000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:07.339000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:07.339000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:07.339000 audit: BPF prog-id=119 op=LOAD Jul 16 12:42:07.339000 audit[2586]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001827a8 items=0 ppid=2545 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:07.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165643765616563343939646334346638303830306537633837663538 Jul 16 12:42:07.339000 audit: BPF prog-id=119 op=UNLOAD Jul 16 12:42:07.339000 audit: BPF prog-id=118 op=UNLOAD Jul 16 12:42:07.339000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:07.339000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:07.339000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:07.339000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:07.339000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:07.339000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:07.339000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:07.339000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:07.339000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:07.339000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:07.339000 audit: BPF prog-id=120 op=LOAD Jul 16 12:42:07.339000 audit[2586]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000182838 items=0 ppid=2545 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:07.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165643765616563343939646334346638303830306537633837663538 Jul 16 12:42:07.357053 env[1191]: time="2025-07-16T12:42:07.357013707Z" level=info msg="StartContainer for \"1ed7eaec499dc44f80800e7c87f58db607354ef4269acf16574a6d2fd0623a6e\" returns successfully" Jul 16 12:42:07.358512 env[1191]: time="2025-07-16T12:42:07.358479967Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2\"" Jul 16 12:42:07.569224 systemd-networkd[1029]: cali27088d6cbb4: Gained IPv6LL Jul 16 12:42:08.133996 kubelet[1510]: E0716 12:42:08.133910 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:42:09.134488 kubelet[1510]: E0716 12:42:09.134437 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:42:09.338952 env[1191]: time="2025-07-16T12:42:09.338854510Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:42:09.340993 env[1191]: time="2025-07-16T12:42:09.340964694Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9e48822a4fe26f4ed9231b361fdd1357ea3567f1fc0a8db4d616622fe570a866,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:42:09.342554 env[1191]: time="2025-07-16T12:42:09.342529314Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:42:09.344019 env[1191]: time="2025-07-16T12:42:09.343997481Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:8fec2de12dfa51bae89d941938a07af2598eb8bfcab55d0dded1d9c193d7b99f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:42:09.344695 env[1191]: time="2025-07-16T12:42:09.344669559Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2\" returns image reference \"sha256:9e48822a4fe26f4ed9231b361fdd1357ea3567f1fc0a8db4d616622fe570a866\"" Jul 16 12:42:09.347976 env[1191]: time="2025-07-16T12:42:09.347919694Z" level=info msg="CreateContainer within sandbox \"097d0cc454bacb386bb013ddf7f71cf2b92bdfd52636e0afee877c2eec27c47f\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Jul 16 12:42:09.359900 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount189540051.mount: Deactivated successfully. Jul 16 12:42:09.373704 env[1191]: time="2025-07-16T12:42:09.373657525Z" level=info msg="CreateContainer within sandbox \"097d0cc454bacb386bb013ddf7f71cf2b92bdfd52636e0afee877c2eec27c47f\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"e0f875432ecd20008ec10b862e348692d830155aae9282054edcbed53bf11235\"" Jul 16 12:42:09.374852 env[1191]: time="2025-07-16T12:42:09.374829828Z" level=info msg="StartContainer for \"e0f875432ecd20008ec10b862e348692d830155aae9282054edcbed53bf11235\"" Jul 16 12:42:09.400859 systemd[1]: Started cri-containerd-e0f875432ecd20008ec10b862e348692d830155aae9282054edcbed53bf11235.scope. Jul 16 12:42:09.437538 kernel: kauditd_printk_skb: 150 callbacks suppressed Jul 16 12:42:09.437697 kernel: audit: type=1400 audit(1752669729.427:730): avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:09.437732 kernel: audit: type=1300 audit(1752669729.427:730): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f7d6052d6c8 items=0 ppid=2545 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:09.427000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:09.427000 audit[2620]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f7d6052d6c8 items=0 ppid=2545 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:09.427000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530663837353433326563643230303038656331306238363265333438 Jul 16 12:42:09.445638 kernel: audit: type=1327 audit(1752669729.427:730): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530663837353433326563643230303038656331306238363265333438 Jul 16 12:42:09.445741 kernel: audit: type=1400 audit(1752669729.428:731): avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:09.445770 kernel: audit: type=1400 audit(1752669729.428:731): avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:09.428000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:09.428000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:09.428000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:09.463645 kernel: audit: type=1400 audit(1752669729.428:731): avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:09.428000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:09.470628 kernel: audit: type=1400 audit(1752669729.428:731): avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:09.428000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:09.428000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:09.477171 kernel: audit: type=1400 audit(1752669729.428:731): avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:09.477288 kernel: audit: type=1400 audit(1752669729.428:731): avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:09.477366 kernel: audit: type=1400 audit(1752669729.428:731): avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:09.428000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:09.428000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:09.428000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:09.428000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:09.428000 audit: BPF prog-id=121 op=LOAD Jul 16 12:42:09.428000 audit[2620]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000b8488 items=0 ppid=2545 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:09.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530663837353433326563643230303038656331306238363265333438 Jul 16 12:42:09.428000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:09.428000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:09.428000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:09.428000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:09.428000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:09.428000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:09.428000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:09.428000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:09.428000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:09.428000 audit: BPF prog-id=122 op=LOAD Jul 16 12:42:09.428000 audit[2620]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000b84d8 items=0 ppid=2545 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:09.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530663837353433326563643230303038656331306238363265333438 Jul 16 12:42:09.428000 audit: BPF prog-id=122 op=UNLOAD Jul 16 12:42:09.428000 audit: BPF prog-id=121 op=UNLOAD Jul 16 12:42:09.428000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:09.428000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:09.428000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:09.428000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:09.428000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:09.428000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:09.428000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:09.428000 audit[2620]: AVC avc: denied { perfmon } for pid=2620 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:09.428000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:09.428000 audit[2620]: AVC avc: denied { bpf } for pid=2620 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:09.428000 audit: BPF prog-id=123 op=LOAD Jul 16 12:42:09.428000 audit[2620]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000b8568 items=0 ppid=2545 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:09.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530663837353433326563643230303038656331306238363265333438 Jul 16 12:42:09.494547 env[1191]: time="2025-07-16T12:42:09.494474780Z" level=info msg="StartContainer for \"e0f875432ecd20008ec10b862e348692d830155aae9282054edcbed53bf11235\" returns successfully" Jul 16 12:42:10.135671 kubelet[1510]: E0716 12:42:10.135618 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:42:10.237341 kubelet[1510]: I0716 12:42:10.237290 1510 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Jul 16 12:42:10.237341 kubelet[1510]: I0716 12:42:10.237349 1510 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Jul 16 12:42:10.500117 kubelet[1510]: I0716 12:42:10.500053 1510 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-shkf4" podStartSLOduration=30.008308272 podStartE2EDuration="33.500023803s" podCreationTimestamp="2025-07-16 12:41:37 +0000 UTC" firstStartedPulling="2025-07-16 12:42:05.85426935 +0000 UTC m=+29.225153179" lastFinishedPulling="2025-07-16 12:42:09.345984871 +0000 UTC m=+32.716868710" observedRunningTime="2025-07-16 12:42:10.499199139 +0000 UTC m=+33.870082969" watchObservedRunningTime="2025-07-16 12:42:10.500023803 +0000 UTC m=+33.870907656" Jul 16 12:42:11.136824 kubelet[1510]: E0716 12:42:11.136774 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:42:12.138373 kubelet[1510]: E0716 12:42:12.138263 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:42:13.140546 kubelet[1510]: E0716 12:42:13.140475 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:42:13.805000 audit[2660]: NETFILTER_CFG table=filter:72 family=2 entries=20 op=nft_register_rule pid=2660 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:42:13.805000 audit[2660]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffd1b429860 a2=0 a3=7ffd1b42984c items=0 ppid=1725 pid=2660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:13.805000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:42:13.811000 audit[2660]: NETFILTER_CFG table=nat:73 family=2 entries=26 op=nft_register_rule pid=2660 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:42:13.811000 audit[2660]: SYSCALL arch=c000003e syscall=46 success=yes exit=8076 a0=3 a1=7ffd1b429860 a2=0 a3=0 items=0 ppid=1725 pid=2660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:13.811000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:42:13.923000 audit[2662]: NETFILTER_CFG table=filter:74 family=2 entries=32 op=nft_register_rule pid=2662 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:42:13.923000 audit[2662]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7fffa7341aa0 a2=0 a3=7fffa7341a8c items=0 ppid=1725 pid=2662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:13.923000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:42:13.929000 audit[2662]: NETFILTER_CFG table=nat:75 family=2 entries=26 op=nft_register_rule pid=2662 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:42:13.929000 audit[2662]: SYSCALL arch=c000003e syscall=46 success=yes exit=8076 a0=3 a1=7fffa7341aa0 a2=0 a3=0 items=0 ppid=1725 pid=2662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:13.929000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:42:14.143417 kubelet[1510]: E0716 12:42:14.142405 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:42:14.319919 systemd[1]: Created slice kubepods-besteffort-pod301fd6e4_23b3_44a1_935c_5cb6afe1ae27.slice. Jul 16 12:42:14.340793 kubelet[1510]: I0716 12:42:14.340757 1510 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/301fd6e4-23b3-44a1-935c-5cb6afe1ae27-data\") pod \"nfs-server-provisioner-0\" (UID: \"301fd6e4-23b3-44a1-935c-5cb6afe1ae27\") " pod="default/nfs-server-provisioner-0" Jul 16 12:42:14.341070 kubelet[1510]: I0716 12:42:14.341049 1510 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-97mwq\" (UniqueName: \"kubernetes.io/projected/301fd6e4-23b3-44a1-935c-5cb6afe1ae27-kube-api-access-97mwq\") pod \"nfs-server-provisioner-0\" (UID: \"301fd6e4-23b3-44a1-935c-5cb6afe1ae27\") " pod="default/nfs-server-provisioner-0" Jul 16 12:42:14.626566 env[1191]: time="2025-07-16T12:42:14.625122149Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:301fd6e4-23b3-44a1-935c-5cb6afe1ae27,Namespace:default,Attempt:0,}" Jul 16 12:42:14.838894 systemd-networkd[1029]: cali60e51b789ff: Link UP Jul 16 12:42:14.841511 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 16 12:42:14.841851 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Jul 16 12:42:14.841990 systemd-networkd[1029]: cali60e51b789ff: Gained carrier Jul 16 12:42:14.857516 env[1191]: 2025-07-16 12:42:14.709 [INFO][2664] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.244.102.154-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 301fd6e4-23b3-44a1-935c-5cb6afe1ae27 1384 0 2025-07-16 12:42:14 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.244.102.154 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="91e0e17760062ceed41846c81c05ceb9520c72a9a8d35e93990c68482ad76d1a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.244.102.154-k8s-nfs--server--provisioner--0-" Jul 16 12:42:14.857516 env[1191]: 2025-07-16 12:42:14.709 [INFO][2664] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="91e0e17760062ceed41846c81c05ceb9520c72a9a8d35e93990c68482ad76d1a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.244.102.154-k8s-nfs--server--provisioner--0-eth0" Jul 16 12:42:14.857516 env[1191]: 2025-07-16 12:42:14.758 [INFO][2677] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="91e0e17760062ceed41846c81c05ceb9520c72a9a8d35e93990c68482ad76d1a" HandleID="k8s-pod-network.91e0e17760062ceed41846c81c05ceb9520c72a9a8d35e93990c68482ad76d1a" Workload="10.244.102.154-k8s-nfs--server--provisioner--0-eth0" Jul 16 12:42:14.857516 env[1191]: 2025-07-16 12:42:14.758 [INFO][2677] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="91e0e17760062ceed41846c81c05ceb9520c72a9a8d35e93990c68482ad76d1a" HandleID="k8s-pod-network.91e0e17760062ceed41846c81c05ceb9520c72a9a8d35e93990c68482ad76d1a" Workload="10.244.102.154-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d4ff0), Attrs:map[string]string{"namespace":"default", "node":"10.244.102.154", "pod":"nfs-server-provisioner-0", "timestamp":"2025-07-16 12:42:14.758042192 +0000 UTC"}, Hostname:"10.244.102.154", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 16 12:42:14.857516 env[1191]: 2025-07-16 12:42:14.758 [INFO][2677] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 16 12:42:14.857516 env[1191]: 2025-07-16 12:42:14.758 [INFO][2677] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 16 12:42:14.857516 env[1191]: 2025-07-16 12:42:14.758 [INFO][2677] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.244.102.154' Jul 16 12:42:14.857516 env[1191]: 2025-07-16 12:42:14.778 [INFO][2677] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.91e0e17760062ceed41846c81c05ceb9520c72a9a8d35e93990c68482ad76d1a" host="10.244.102.154" Jul 16 12:42:14.857516 env[1191]: 2025-07-16 12:42:14.788 [INFO][2677] ipam/ipam.go 394: Looking up existing affinities for host host="10.244.102.154" Jul 16 12:42:14.857516 env[1191]: 2025-07-16 12:42:14.797 [INFO][2677] ipam/ipam.go 511: Trying affinity for 192.168.67.64/26 host="10.244.102.154" Jul 16 12:42:14.857516 env[1191]: 2025-07-16 12:42:14.800 [INFO][2677] ipam/ipam.go 158: Attempting to load block cidr=192.168.67.64/26 host="10.244.102.154" Jul 16 12:42:14.857516 env[1191]: 2025-07-16 12:42:14.805 [INFO][2677] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.67.64/26 host="10.244.102.154" Jul 16 12:42:14.857516 env[1191]: 2025-07-16 12:42:14.805 [INFO][2677] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.67.64/26 handle="k8s-pod-network.91e0e17760062ceed41846c81c05ceb9520c72a9a8d35e93990c68482ad76d1a" host="10.244.102.154" Jul 16 12:42:14.857516 env[1191]: 2025-07-16 12:42:14.808 [INFO][2677] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.91e0e17760062ceed41846c81c05ceb9520c72a9a8d35e93990c68482ad76d1a Jul 16 12:42:14.857516 env[1191]: 2025-07-16 12:42:14.817 [INFO][2677] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.67.64/26 handle="k8s-pod-network.91e0e17760062ceed41846c81c05ceb9520c72a9a8d35e93990c68482ad76d1a" host="10.244.102.154" Jul 16 12:42:14.857516 env[1191]: 2025-07-16 12:42:14.826 [INFO][2677] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.67.67/26] block=192.168.67.64/26 handle="k8s-pod-network.91e0e17760062ceed41846c81c05ceb9520c72a9a8d35e93990c68482ad76d1a" host="10.244.102.154" Jul 16 12:42:14.857516 env[1191]: 2025-07-16 12:42:14.826 [INFO][2677] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.67.67/26] handle="k8s-pod-network.91e0e17760062ceed41846c81c05ceb9520c72a9a8d35e93990c68482ad76d1a" host="10.244.102.154" Jul 16 12:42:14.857516 env[1191]: 2025-07-16 12:42:14.826 [INFO][2677] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 16 12:42:14.857516 env[1191]: 2025-07-16 12:42:14.826 [INFO][2677] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.67.67/26] IPv6=[] ContainerID="91e0e17760062ceed41846c81c05ceb9520c72a9a8d35e93990c68482ad76d1a" HandleID="k8s-pod-network.91e0e17760062ceed41846c81c05ceb9520c72a9a8d35e93990c68482ad76d1a" Workload="10.244.102.154-k8s-nfs--server--provisioner--0-eth0" Jul 16 12:42:14.858626 env[1191]: 2025-07-16 12:42:14.829 [INFO][2664] cni-plugin/k8s.go 418: Populated endpoint ContainerID="91e0e17760062ceed41846c81c05ceb9520c72a9a8d35e93990c68482ad76d1a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.244.102.154-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.102.154-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"301fd6e4-23b3-44a1-935c-5cb6afe1ae27", ResourceVersion:"1384", Generation:0, CreationTimestamp:time.Date(2025, time.July, 16, 12, 42, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.102.154", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.67.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 16 12:42:14.858626 env[1191]: 2025-07-16 12:42:14.829 [INFO][2664] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.67.67/32] ContainerID="91e0e17760062ceed41846c81c05ceb9520c72a9a8d35e93990c68482ad76d1a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.244.102.154-k8s-nfs--server--provisioner--0-eth0" Jul 16 12:42:14.858626 env[1191]: 2025-07-16 12:42:14.829 [INFO][2664] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="91e0e17760062ceed41846c81c05ceb9520c72a9a8d35e93990c68482ad76d1a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.244.102.154-k8s-nfs--server--provisioner--0-eth0" Jul 16 12:42:14.858626 env[1191]: 2025-07-16 12:42:14.842 [INFO][2664] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="91e0e17760062ceed41846c81c05ceb9520c72a9a8d35e93990c68482ad76d1a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.244.102.154-k8s-nfs--server--provisioner--0-eth0" Jul 16 12:42:14.858845 env[1191]: 2025-07-16 12:42:14.843 [INFO][2664] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="91e0e17760062ceed41846c81c05ceb9520c72a9a8d35e93990c68482ad76d1a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.244.102.154-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.102.154-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"301fd6e4-23b3-44a1-935c-5cb6afe1ae27", ResourceVersion:"1384", Generation:0, CreationTimestamp:time.Date(2025, time.July, 16, 12, 42, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.102.154", ContainerID:"91e0e17760062ceed41846c81c05ceb9520c72a9a8d35e93990c68482ad76d1a", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.67.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"4e:94:6f:5e:c4:cb", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 16 12:42:14.858845 env[1191]: 2025-07-16 12:42:14.855 [INFO][2664] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="91e0e17760062ceed41846c81c05ceb9520c72a9a8d35e93990c68482ad76d1a" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.244.102.154-k8s-nfs--server--provisioner--0-eth0" Jul 16 12:42:14.872123 env[1191]: time="2025-07-16T12:42:14.872051719Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 16 12:42:14.872288 env[1191]: time="2025-07-16T12:42:14.872099840Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 16 12:42:14.872288 env[1191]: time="2025-07-16T12:42:14.872112091Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 16 12:42:14.872399 env[1191]: time="2025-07-16T12:42:14.872301885Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/91e0e17760062ceed41846c81c05ceb9520c72a9a8d35e93990c68482ad76d1a pid=2700 runtime=io.containerd.runc.v2 Jul 16 12:42:14.887000 audit[2717]: NETFILTER_CFG table=filter:76 family=2 entries=40 op=nft_register_chain pid=2717 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 16 12:42:14.889811 kernel: kauditd_printk_skb: 45 callbacks suppressed Jul 16 12:42:14.889867 kernel: audit: type=1325 audit(1752669734.887:740): table=filter:76 family=2 entries=40 op=nft_register_chain pid=2717 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 16 12:42:14.887000 audit[2717]: SYSCALL arch=c000003e syscall=46 success=yes exit=20756 a0=3 a1=7ffcefc1b400 a2=0 a3=7ffcefc1b3ec items=0 ppid=2239 pid=2717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:14.887000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 16 12:42:14.902434 kernel: audit: type=1300 audit(1752669734.887:740): arch=c000003e syscall=46 success=yes exit=20756 a0=3 a1=7ffcefc1b400 a2=0 a3=7ffcefc1b3ec items=0 ppid=2239 pid=2717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:14.902516 kernel: audit: type=1327 audit(1752669734.887:740): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 16 12:42:14.908630 systemd[1]: Started cri-containerd-91e0e17760062ceed41846c81c05ceb9520c72a9a8d35e93990c68482ad76d1a.scope. Jul 16 12:42:14.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:14.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:14.935129 kernel: audit: type=1400 audit(1752669734.928:741): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:14.935226 kernel: audit: type=1400 audit(1752669734.928:742): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:14.935278 kernel: audit: type=1400 audit(1752669734.928:743): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:14.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:14.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:14.942088 kernel: audit: type=1400 audit(1752669734.928:744): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:14.942153 kernel: audit: type=1400 audit(1752669734.928:745): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:14.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:14.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:14.946713 kernel: audit: type=1400 audit(1752669734.928:746): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:14.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:14.949995 kernel: audit: type=1400 audit(1752669734.928:747): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:14.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:14.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:14.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:14.928000 audit: BPF prog-id=124 op=LOAD Jul 16 12:42:14.934000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:14.934000 audit[2713]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2700 pid=2713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:14.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931653065313737363030363263656564343138343663383163303563 Jul 16 12:42:14.934000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:14.934000 audit[2713]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2700 pid=2713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:14.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931653065313737363030363263656564343138343663383163303563 Jul 16 12:42:14.934000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:14.934000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:14.934000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:14.934000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:14.934000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:14.934000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:14.934000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:14.934000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:14.934000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:14.934000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:14.934000 audit: BPF prog-id=125 op=LOAD Jul 16 12:42:14.934000 audit[2713]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00021c440 items=0 ppid=2700 pid=2713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:14.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931653065313737363030363263656564343138343663383163303563 Jul 16 12:42:14.937000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:14.937000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:14.937000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:14.937000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:14.937000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:14.937000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:14.937000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:14.937000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:14.937000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:14.937000 audit: BPF prog-id=126 op=LOAD Jul 16 12:42:14.937000 audit[2713]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00021c488 items=0 ppid=2700 pid=2713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:14.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931653065313737363030363263656564343138343663383163303563 Jul 16 12:42:14.937000 audit: BPF prog-id=126 op=UNLOAD Jul 16 12:42:14.937000 audit: BPF prog-id=125 op=UNLOAD Jul 16 12:42:14.937000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:14.937000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:14.937000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:14.937000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:14.937000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:14.937000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:14.937000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:14.937000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:14.937000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:14.937000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:14.937000 audit: BPF prog-id=127 op=LOAD Jul 16 12:42:14.937000 audit[2713]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00021c898 items=0 ppid=2700 pid=2713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:14.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931653065313737363030363263656564343138343663383163303563 Jul 16 12:42:14.985505 env[1191]: time="2025-07-16T12:42:14.985445328Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:301fd6e4-23b3-44a1-935c-5cb6afe1ae27,Namespace:default,Attempt:0,} returns sandbox id \"91e0e17760062ceed41846c81c05ceb9520c72a9a8d35e93990c68482ad76d1a\"" Jul 16 12:42:14.988678 env[1191]: time="2025-07-16T12:42:14.988496434Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Jul 16 12:42:15.144541 kubelet[1510]: E0716 12:42:15.144159 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:42:15.462902 systemd[1]: run-containerd-runc-k8s.io-91e0e17760062ceed41846c81c05ceb9520c72a9a8d35e93990c68482ad76d1a-runc.Pvssmf.mount: Deactivated successfully. Jul 16 12:42:16.144973 kubelet[1510]: E0716 12:42:16.144889 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:42:16.467312 systemd-networkd[1029]: cali60e51b789ff: Gained IPv6LL Jul 16 12:42:17.107394 kubelet[1510]: E0716 12:42:17.107331 1510 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:42:17.146188 kubelet[1510]: E0716 12:42:17.146095 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:42:17.841621 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3622681873.mount: Deactivated successfully. Jul 16 12:42:18.146843 kubelet[1510]: E0716 12:42:18.146419 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:42:19.147015 kubelet[1510]: E0716 12:42:19.146925 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:42:20.104724 env[1191]: time="2025-07-16T12:42:20.104624214Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:42:20.107282 env[1191]: time="2025-07-16T12:42:20.107234419Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:42:20.110249 env[1191]: time="2025-07-16T12:42:20.110171463Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:42:20.112335 env[1191]: time="2025-07-16T12:42:20.112290328Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:42:20.113359 env[1191]: time="2025-07-16T12:42:20.113296883Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Jul 16 12:42:20.116680 env[1191]: time="2025-07-16T12:42:20.116649291Z" level=info msg="CreateContainer within sandbox \"91e0e17760062ceed41846c81c05ceb9520c72a9a8d35e93990c68482ad76d1a\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Jul 16 12:42:20.127469 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3852453598.mount: Deactivated successfully. Jul 16 12:42:20.135231 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2486732187.mount: Deactivated successfully. Jul 16 12:42:20.139811 env[1191]: time="2025-07-16T12:42:20.139750104Z" level=info msg="CreateContainer within sandbox \"91e0e17760062ceed41846c81c05ceb9520c72a9a8d35e93990c68482ad76d1a\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"802c4df203b1095b1275bdc5b24d0c29da77f89b4ba1064e1f5a7df083626f39\"" Jul 16 12:42:20.140653 env[1191]: time="2025-07-16T12:42:20.140625805Z" level=info msg="StartContainer for \"802c4df203b1095b1275bdc5b24d0c29da77f89b4ba1064e1f5a7df083626f39\"" Jul 16 12:42:20.147371 kubelet[1510]: E0716 12:42:20.147308 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:42:20.168503 systemd[1]: Started cri-containerd-802c4df203b1095b1275bdc5b24d0c29da77f89b4ba1064e1f5a7df083626f39.scope. Jul 16 12:42:20.201215 kernel: kauditd_printk_skb: 50 callbacks suppressed Jul 16 12:42:20.201439 kernel: audit: type=1400 audit(1752669740.191:759): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:20.201503 kernel: audit: type=1400 audit(1752669740.191:760): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:20.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:20.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:20.203762 kernel: audit: type=1400 audit(1752669740.191:761): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:20.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:20.210669 kernel: audit: type=1400 audit(1752669740.191:762): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:20.210781 kernel: audit: type=1400 audit(1752669740.191:763): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:20.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:20.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:20.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:20.217685 kernel: audit: type=1400 audit(1752669740.191:764): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:20.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:20.221684 kernel: audit: type=1400 audit(1752669740.191:765): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:20.221756 kernel: audit: type=1400 audit(1752669740.191:766): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:20.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:20.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:20.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:20.232905 kernel: audit: type=1400 audit(1752669740.191:767): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:20.233095 kernel: audit: type=1400 audit(1752669740.192:768): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:20.192000 audit: BPF prog-id=128 op=LOAD Jul 16 12:42:20.202000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:20.202000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2700 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:20.202000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830326334646632303362313039356231323735626463356232346430 Jul 16 12:42:20.202000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:20.202000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2700 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:20.202000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830326334646632303362313039356231323735626463356232346430 Jul 16 12:42:20.202000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:20.202000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:20.202000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:20.202000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:20.202000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:20.202000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:20.202000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:20.202000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:20.202000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:20.202000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:20.202000 audit: BPF prog-id=129 op=LOAD Jul 16 12:42:20.202000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00032f0a0 items=0 ppid=2700 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:20.202000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830326334646632303362313039356231323735626463356232346430 Jul 16 12:42:20.209000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:20.209000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:20.209000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:20.209000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:20.209000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:20.209000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:20.209000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:20.209000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:20.209000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:20.209000 audit: BPF prog-id=130 op=LOAD Jul 16 12:42:20.209000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00032f0e8 items=0 ppid=2700 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:20.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830326334646632303362313039356231323735626463356232346430 Jul 16 12:42:20.212000 audit: BPF prog-id=130 op=UNLOAD Jul 16 12:42:20.212000 audit: BPF prog-id=129 op=UNLOAD Jul 16 12:42:20.212000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:20.212000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:20.212000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:20.212000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:20.212000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:20.212000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:20.212000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:20.212000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:20.212000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:20.212000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:20.212000 audit: BPF prog-id=131 op=LOAD Jul 16 12:42:20.212000 audit[2748]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00032f4f8 items=0 ppid=2700 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:20.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830326334646632303362313039356231323735626463356232346430 Jul 16 12:42:20.243981 env[1191]: time="2025-07-16T12:42:20.243927194Z" level=info msg="StartContainer for \"802c4df203b1095b1275bdc5b24d0c29da77f89b4ba1064e1f5a7df083626f39\" returns successfully" Jul 16 12:42:20.297000 audit[2775]: AVC avc: denied { search } for pid=2775 comm="rpcbind" name="crypto" dev="proc" ino=24692 scontext=system_u:system_r:svirt_lxc_net_t:s0:c626,c937 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 16 12:42:20.297000 audit[2775]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f4752d460c0 a2=0 a3=0 items=0 ppid=2759 pid=2775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c626,c937 key=(null) Jul 16 12:42:20.297000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Jul 16 12:42:20.344000 audit[2780]: AVC avc: denied { search } for pid=2780 comm="dbus-daemon" name="crypto" dev="proc" ino=24692 scontext=system_u:system_r:svirt_lxc_net_t:s0:c626,c937 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 16 12:42:20.344000 audit[2780]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fbb456b70c0 a2=0 a3=0 items=0 ppid=2759 pid=2780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c626,c937 key=(null) Jul 16 12:42:20.344000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Jul 16 12:42:20.348000 audit[2781]: AVC avc: denied { watch } for pid=2781 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=1049786 scontext=system_u:system_r:svirt_lxc_net_t:s0:c626,c937 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c626,c937 tclass=dir permissive=0 Jul 16 12:42:20.348000 audit[2781]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55eb997ff480 a2=2c8 a3=7fff12edf82c items=0 ppid=2759 pid=2781 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c626,c937 key=(null) Jul 16 12:42:20.348000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Jul 16 12:42:20.352000 audit[2782]: AVC avc: denied { read } for pid=2782 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=24784 scontext=system_u:system_r:svirt_lxc_net_t:s0:c626,c937 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Jul 16 12:42:20.352000 audit[2782]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f112b8e6320 a1=80000 a2=d a3=7ffddd3f2f60 items=0 ppid=2759 pid=2782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c626,c937 key=(null) Jul 16 12:42:20.352000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Jul 16 12:42:20.353000 audit[2782]: AVC avc: denied { search } for pid=2782 comm="ganesha.nfsd" name="crypto" dev="proc" ino=24692 scontext=system_u:system_r:svirt_lxc_net_t:s0:c626,c937 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 16 12:42:20.353000 audit[2782]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f112ae3a0c0 a2=0 a3=0 items=0 ppid=2759 pid=2782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c626,c937 key=(null) Jul 16 12:42:20.353000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Jul 16 12:42:20.540145 kubelet[1510]: I0716 12:42:20.539988 1510 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.412949969 podStartE2EDuration="6.539854511s" podCreationTimestamp="2025-07-16 12:42:14 +0000 UTC" firstStartedPulling="2025-07-16 12:42:14.987761696 +0000 UTC m=+38.358645540" lastFinishedPulling="2025-07-16 12:42:20.114666252 +0000 UTC m=+43.485550082" observedRunningTime="2025-07-16 12:42:20.538832933 +0000 UTC m=+43.909716865" watchObservedRunningTime="2025-07-16 12:42:20.539854511 +0000 UTC m=+43.910738458" Jul 16 12:42:20.621000 audit[2800]: NETFILTER_CFG table=filter:77 family=2 entries=20 op=nft_register_rule pid=2800 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:42:20.621000 audit[2800]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffc258ce390 a2=0 a3=7ffc258ce37c items=0 ppid=1725 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:20.621000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:42:20.628000 audit[2800]: NETFILTER_CFG table=nat:78 family=2 entries=110 op=nft_register_chain pid=2800 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 16 12:42:20.628000 audit[2800]: SYSCALL arch=c000003e syscall=46 success=yes exit=50988 a0=3 a1=7ffc258ce390 a2=0 a3=7ffc258ce37c items=0 ppid=1725 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:20.628000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 16 12:42:21.147975 kubelet[1510]: E0716 12:42:21.147868 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:42:22.149047 kubelet[1510]: E0716 12:42:22.148977 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:42:23.150724 kubelet[1510]: E0716 12:42:23.150667 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:42:24.151276 kubelet[1510]: E0716 12:42:24.151172 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:42:25.151468 kubelet[1510]: E0716 12:42:25.151383 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:42:25.201310 systemd[1]: run-containerd-runc-k8s.io-0bc1ed93adc8c95eb29914ba58de86eb3149df1f73e451a46684bf0a815ef2e2-runc.xYjJjC.mount: Deactivated successfully. Jul 16 12:42:26.152905 kubelet[1510]: E0716 12:42:26.152816 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:42:27.153791 kubelet[1510]: E0716 12:42:27.153718 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:42:28.155412 kubelet[1510]: E0716 12:42:28.155332 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:42:29.155746 kubelet[1510]: E0716 12:42:29.155532 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:42:29.688083 systemd[1]: Created slice kubepods-besteffort-pod15dd5fe0_a29a_44af_b72d_e75023aca9c0.slice. Jul 16 12:42:29.855499 kubelet[1510]: I0716 12:42:29.855297 1510 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cn2sb\" (UniqueName: \"kubernetes.io/projected/15dd5fe0-a29a-44af-b72d-e75023aca9c0-kube-api-access-cn2sb\") pod \"test-pod-1\" (UID: \"15dd5fe0-a29a-44af-b72d-e75023aca9c0\") " pod="default/test-pod-1" Jul 16 12:42:29.856503 kubelet[1510]: I0716 12:42:29.855958 1510 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-67095b5f-6fd9-4123-9f33-b2a6ce94c2aa\" (UniqueName: \"kubernetes.io/nfs/15dd5fe0-a29a-44af-b72d-e75023aca9c0-pvc-67095b5f-6fd9-4123-9f33-b2a6ce94c2aa\") pod \"test-pod-1\" (UID: \"15dd5fe0-a29a-44af-b72d-e75023aca9c0\") " pod="default/test-pod-1" Jul 16 12:42:29.992000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:29.997583 kernel: Failed to create system directory netfs Jul 16 12:42:29.997792 kernel: kauditd_printk_skb: 68 callbacks suppressed Jul 16 12:42:29.997863 kernel: audit: type=1400 audit(1752669749.992:784): avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.009864 kernel: Failed to create system directory netfs Jul 16 12:42:30.009988 kernel: audit: type=1400 audit(1752669749.992:784): avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.010035 kernel: Failed to create system directory netfs Jul 16 12:42:30.010083 kernel: Failed to create system directory netfs Jul 16 12:42:30.010112 kernel: audit: type=1400 audit(1752669749.992:784): avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:29.992000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:29.992000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:29.992000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.016653 kernel: audit: type=1400 audit(1752669749.992:784): avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:29.992000 audit[2838]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55e78358e5e0 a1=153bc a2=55e7586652b0 a3=5 items=0 ppid=531 pid=2838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:30.024619 kernel: audit: type=1300 audit(1752669749.992:784): arch=c000003e syscall=175 success=yes exit=0 a0=55e78358e5e0 a1=153bc a2=55e7586652b0 a3=5 items=0 ppid=531 pid=2838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:29.992000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 16 12:42:30.026619 kernel: audit: type=1327 audit(1752669749.992:784): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 16 12:42:30.034307 kernel: Failed to create system directory fscache Jul 16 12:42:30.034393 kernel: audit: type=1400 audit(1752669750.026:785): avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.034435 kernel: Failed to create system directory fscache Jul 16 12:42:30.026000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.038184 kernel: audit: type=1400 audit(1752669750.026:785): avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.038234 kernel: Failed to create system directory fscache Jul 16 12:42:30.026000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.042040 kernel: audit: type=1400 audit(1752669750.026:785): avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.042098 kernel: Failed to create system directory fscache Jul 16 12:42:30.026000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.045887 kernel: audit: type=1400 audit(1752669750.026:785): avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.045942 kernel: Failed to create system directory fscache Jul 16 12:42:30.026000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.026000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.026000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.026000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.048248 kernel: Failed to create system directory fscache Jul 16 12:42:30.048555 kernel: Failed to create system directory fscache Jul 16 12:42:30.048731 kernel: Failed to create system directory fscache Jul 16 12:42:30.026000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.026000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.049809 kernel: Failed to create system directory fscache Jul 16 12:42:30.050128 kernel: Failed to create system directory fscache Jul 16 12:42:30.026000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.050628 kernel: Failed to create system directory fscache Jul 16 12:42:30.026000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.026000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.052155 kernel: Failed to create system directory fscache Jul 16 12:42:30.052203 kernel: Failed to create system directory fscache Jul 16 12:42:30.026000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.026000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.053735 kernel: Failed to create system directory fscache Jul 16 12:42:30.026000 audit[2838]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55e7837a39c0 a1=4c0fc a2=55e7586652b0 a3=5 items=0 ppid=531 pid=2838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:30.055691 kernel: FS-Cache: Loaded Jul 16 12:42:30.026000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.097209 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.097295 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.097339 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.097962 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.098714 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.100226 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.100291 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.101739 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.101807 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.103262 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.103311 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.104790 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.104855 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.106287 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.106333 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.107836 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.107896 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.109348 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.109435 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.110837 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.110925 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.113131 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.113171 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.113190 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.114638 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.114677 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.116108 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.116144 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.117623 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.117658 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.119095 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.119148 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.121294 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.121348 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.121371 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.122797 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.122848 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.124295 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.124342 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.125179 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.127361 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.127522 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.127632 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.128147 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.128840 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.130333 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.130406 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.131087 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.131835 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.133321 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.133381 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.134135 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.134902 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.145283 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.145454 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.145989 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.146664 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.148263 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.148396 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.148974 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.149781 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.151368 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.151498 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.151927 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.152786 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.154271 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.154471 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.155014 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.155769 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.157496 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.157734 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.158111 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.158306 kubelet[1510]: E0716 12:42:30.157293 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:42:30.159936 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.160013 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.160446 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.161119 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.161969 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.163396 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.163480 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.164922 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.165281 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.165692 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.167182 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.167263 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.167954 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.168687 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.170255 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.170298 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.170993 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.171748 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.173220 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.173259 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.173943 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.174729 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.176213 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.176241 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.176935 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.177716 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.179342 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.179415 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.180115 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.182345 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.182385 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.182428 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.183059 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.183846 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.185342 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.185392 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.186060 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.186849 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.188370 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.188450 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.189093 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.189856 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.191341 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.191395 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.192051 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.192857 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.194341 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.194385 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.195076 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.195827 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.197321 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.197374 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.198074 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.198817 kernel: Failed to create system directory sunrpc Jul 16 12:42:30.081000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.211915 kernel: RPC: Registered named UNIX socket transport module. Jul 16 12:42:30.212062 kernel: RPC: Registered udp transport module. Jul 16 12:42:30.212109 kernel: RPC: Registered tcp transport module. Jul 16 12:42:30.212950 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Jul 16 12:42:30.081000 audit[2838]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55e7837efad0 a1=1a81bc a2=55e7586652b0 a3=5 items=6 ppid=531 pid=2838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:30.081000 audit: CWD cwd="/" Jul 16 12:42:30.081000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:42:30.081000 audit: PATH item=1 name=(null) inode=25060 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:42:30.081000 audit: PATH item=2 name=(null) inode=25060 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:42:30.081000 audit: PATH item=3 name=(null) inode=25061 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:42:30.081000 audit: PATH item=4 name=(null) inode=25060 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:42:30.081000 audit: PATH item=5 name=(null) inode=25062 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 16 12:42:30.081000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.268107 kernel: Failed to create system directory nfs Jul 16 12:42:30.268287 kernel: Failed to create system directory nfs Jul 16 12:42:30.268337 kernel: Failed to create system directory nfs Jul 16 12:42:30.268382 kernel: Failed to create system directory nfs Jul 16 12:42:30.268440 kernel: Failed to create system directory nfs Jul 16 12:42:30.268493 kernel: Failed to create system directory nfs Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.268834 kernel: Failed to create system directory nfs Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.270221 kernel: Failed to create system directory nfs Jul 16 12:42:30.270338 kernel: Failed to create system directory nfs Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.270926 kernel: Failed to create system directory nfs Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.272364 kernel: Failed to create system directory nfs Jul 16 12:42:30.272475 kernel: Failed to create system directory nfs Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.273035 kernel: Failed to create system directory nfs Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.273824 kernel: Failed to create system directory nfs Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.275215 kernel: Failed to create system directory nfs Jul 16 12:42:30.275534 kernel: Failed to create system directory nfs Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.276663 kernel: Failed to create system directory nfs Jul 16 12:42:30.276707 kernel: Failed to create system directory nfs Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.278101 kernel: Failed to create system directory nfs Jul 16 12:42:30.278178 kernel: Failed to create system directory nfs Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.280251 kernel: Failed to create system directory nfs Jul 16 12:42:30.280293 kernel: Failed to create system directory nfs Jul 16 12:42:30.280330 kernel: Failed to create system directory nfs Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.280937 kernel: Failed to create system directory nfs Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.281697 kernel: Failed to create system directory nfs Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.283142 kernel: Failed to create system directory nfs Jul 16 12:42:30.283185 kernel: Failed to create system directory nfs Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.283825 kernel: Failed to create system directory nfs Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.285308 kernel: Failed to create system directory nfs Jul 16 12:42:30.285364 kernel: Failed to create system directory nfs Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.286737 kernel: Failed to create system directory nfs Jul 16 12:42:30.286767 kernel: Failed to create system directory nfs Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.288256 kernel: Failed to create system directory nfs Jul 16 12:42:30.288295 kernel: Failed to create system directory nfs Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.288933 kernel: Failed to create system directory nfs Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.290339 kernel: Failed to create system directory nfs Jul 16 12:42:30.290374 kernel: Failed to create system directory nfs Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.291779 kernel: Failed to create system directory nfs Jul 16 12:42:30.291809 kernel: Failed to create system directory nfs Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.293206 kernel: Failed to create system directory nfs Jul 16 12:42:30.293241 kernel: Failed to create system directory nfs Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.293946 kernel: Failed to create system directory nfs Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.294671 kernel: Failed to create system directory nfs Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.296110 kernel: Failed to create system directory nfs Jul 16 12:42:30.296142 kernel: Failed to create system directory nfs Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.298276 kernel: Failed to create system directory nfs Jul 16 12:42:30.298317 kernel: Failed to create system directory nfs Jul 16 12:42:30.298369 kernel: Failed to create system directory nfs Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.299011 kernel: Failed to create system directory nfs Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.299718 kernel: Failed to create system directory nfs Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.301176 kernel: Failed to create system directory nfs Jul 16 12:42:30.301215 kernel: Failed to create system directory nfs Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.301864 kernel: Failed to create system directory nfs Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.302672 kernel: Failed to create system directory nfs Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.304136 kernel: Failed to create system directory nfs Jul 16 12:42:30.304193 kernel: Failed to create system directory nfs Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.304818 kernel: Failed to create system directory nfs Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.306475 kernel: Failed to create system directory nfs Jul 16 12:42:30.306720 kernel: Failed to create system directory nfs Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.307078 kernel: Failed to create system directory nfs Jul 16 12:42:30.253000 audit[2838]: AVC avc: denied { confidentiality } for pid=2838 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.332810 kernel: FS-Cache: Netfs 'nfs' registered for caching Jul 16 12:42:30.253000 audit[2838]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55e783a10af0 a1=16ed54 a2=55e7586652b0 a3=5 items=0 ppid=531 pid=2838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:30.253000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.388145 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.388359 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.388535 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.389131 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.390219 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.390653 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.391057 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.392411 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.392564 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.393098 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.393815 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.395267 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.395362 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.396002 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.398257 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.398385 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.398465 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.398908 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.399754 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.401214 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.401347 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.401889 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.402735 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.404253 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.404381 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.405023 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.405754 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.407371 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.407563 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.407907 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.408773 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.410210 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.410343 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.411697 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.412026 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.413359 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.413466 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.414808 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.414900 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.416287 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.416369 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.426559 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.426728 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.427184 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.428044 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.430315 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.430444 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.430498 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.430961 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.431672 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.433148 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.433227 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.435373 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.435447 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.435475 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.436853 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.436884 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.438465 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.438576 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.439850 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.439897 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.441297 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.441339 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.442751 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.442790 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.444195 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.444237 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.445706 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.445753 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.447153 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.447230 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.447914 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.449372 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.449465 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.450858 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.450910 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.452303 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.452341 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.453068 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.453811 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.455269 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.455315 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.456825 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.456871 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.458294 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.458398 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.459938 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.460248 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.461557 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.461736 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.462834 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.462973 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.464291 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.464539 kernel: Failed to create system directory nfs4 Jul 16 12:42:30.368000 audit[2844]: AVC avc: denied { confidentiality } for pid=2844 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.628990 kernel: NFS: Registering the id_resolver key type Jul 16 12:42:30.629288 kernel: Key type id_resolver registered Jul 16 12:42:30.629359 kernel: Key type id_legacy registered Jul 16 12:42:30.368000 audit[2844]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f69f2294010 a1=2095ac a2=556e59ea72b0 a3=5 items=0 ppid=531 pid=2844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:30.368000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Jul 16 12:42:30.652000 audit[2845]: AVC avc: denied { confidentiality } for pid=2845 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.662132 kernel: Failed to create system directory rpcgss Jul 16 12:42:30.662185 kernel: Failed to create system directory rpcgss Jul 16 12:42:30.652000 audit[2845]: AVC avc: denied { confidentiality } for pid=2845 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.663057 kernel: Failed to create system directory rpcgss Jul 16 12:42:30.652000 audit[2845]: AVC avc: denied { confidentiality } for pid=2845 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.663961 kernel: Failed to create system directory rpcgss Jul 16 12:42:30.652000 audit[2845]: AVC avc: denied { confidentiality } for pid=2845 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.664805 kernel: Failed to create system directory rpcgss Jul 16 12:42:30.652000 audit[2845]: AVC avc: denied { confidentiality } for pid=2845 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.665675 kernel: Failed to create system directory rpcgss Jul 16 12:42:30.652000 audit[2845]: AVC avc: denied { confidentiality } for pid=2845 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.666634 kernel: Failed to create system directory rpcgss Jul 16 12:42:30.652000 audit[2845]: AVC avc: denied { confidentiality } for pid=2845 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.652000 audit[2845]: AVC avc: denied { confidentiality } for pid=2845 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.668309 kernel: Failed to create system directory rpcgss Jul 16 12:42:30.668344 kernel: Failed to create system directory rpcgss Jul 16 12:42:30.652000 audit[2845]: AVC avc: denied { confidentiality } for pid=2845 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.669199 kernel: Failed to create system directory rpcgss Jul 16 12:42:30.652000 audit[2845]: AVC avc: denied { confidentiality } for pid=2845 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.669988 kernel: Failed to create system directory rpcgss Jul 16 12:42:30.652000 audit[2845]: AVC avc: denied { confidentiality } for pid=2845 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.670845 kernel: Failed to create system directory rpcgss Jul 16 12:42:30.652000 audit[2845]: AVC avc: denied { confidentiality } for pid=2845 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.671723 kernel: Failed to create system directory rpcgss Jul 16 12:42:30.652000 audit[2845]: AVC avc: denied { confidentiality } for pid=2845 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.672842 kernel: Failed to create system directory rpcgss Jul 16 12:42:30.652000 audit[2845]: AVC avc: denied { confidentiality } for pid=2845 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.673857 kernel: Failed to create system directory rpcgss Jul 16 12:42:30.652000 audit[2845]: AVC avc: denied { confidentiality } for pid=2845 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.675098 kernel: Failed to create system directory rpcgss Jul 16 12:42:30.652000 audit[2845]: AVC avc: denied { confidentiality } for pid=2845 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.676058 kernel: Failed to create system directory rpcgss Jul 16 12:42:30.652000 audit[2845]: AVC avc: denied { confidentiality } for pid=2845 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.676980 kernel: Failed to create system directory rpcgss Jul 16 12:42:30.652000 audit[2845]: AVC avc: denied { confidentiality } for pid=2845 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.677941 kernel: Failed to create system directory rpcgss Jul 16 12:42:30.652000 audit[2845]: AVC avc: denied { confidentiality } for pid=2845 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.678973 kernel: Failed to create system directory rpcgss Jul 16 12:42:30.652000 audit[2845]: AVC avc: denied { confidentiality } for pid=2845 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.679940 kernel: Failed to create system directory rpcgss Jul 16 12:42:30.652000 audit[2845]: AVC avc: denied { confidentiality } for pid=2845 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.680859 kernel: Failed to create system directory rpcgss Jul 16 12:42:30.652000 audit[2845]: AVC avc: denied { confidentiality } for pid=2845 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.681789 kernel: Failed to create system directory rpcgss Jul 16 12:42:30.652000 audit[2845]: AVC avc: denied { confidentiality } for pid=2845 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.682712 kernel: Failed to create system directory rpcgss Jul 16 12:42:30.652000 audit[2845]: AVC avc: denied { confidentiality } for pid=2845 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.683633 kernel: Failed to create system directory rpcgss Jul 16 12:42:30.652000 audit[2845]: AVC avc: denied { confidentiality } for pid=2845 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.652000 audit[2845]: AVC avc: denied { confidentiality } for pid=2845 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 16 12:42:30.684643 kernel: Failed to create system directory rpcgss Jul 16 12:42:30.652000 audit[2845]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f02e9efd010 a1=70bac a2=564269bb42b0 a3=5 items=0 ppid=531 pid=2845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:30.652000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Jul 16 12:42:30.747462 nfsidmap[2852]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'gb1.brightbox.com' Jul 16 12:42:30.759948 nfsidmap[2855]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'gb1.brightbox.com' Jul 16 12:42:30.778000 audit[1277]: AVC avc: denied { watch_reads } for pid=1277 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2689 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 16 12:42:30.778000 audit[1277]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=555b4c30e220 a2=10 a3=2c9ce33610c3741a items=0 ppid=1 pid=1277 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:30.778000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 16 12:42:30.778000 audit[1277]: AVC avc: denied { watch_reads } for pid=1277 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2689 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 16 12:42:30.778000 audit[1277]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=555b4c30e220 a2=10 a3=2c9ce33610c3741a items=0 ppid=1 pid=1277 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:30.778000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 16 12:42:30.778000 audit[1277]: AVC avc: denied { watch_reads } for pid=1277 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2689 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 16 12:42:30.778000 audit[1277]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=555b4c30e220 a2=10 a3=2c9ce33610c3741a items=0 ppid=1 pid=1277 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:30.778000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 16 12:42:30.778000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2689 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 16 12:42:30.778000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2689 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 16 12:42:30.778000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2689 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 16 12:42:30.896319 env[1191]: time="2025-07-16T12:42:30.892958550Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:15dd5fe0-a29a-44af-b72d-e75023aca9c0,Namespace:default,Attempt:0,}" Jul 16 12:42:31.132674 systemd-networkd[1029]: cali5ec59c6bf6e: Link UP Jul 16 12:42:31.140674 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 16 12:42:31.140908 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Jul 16 12:42:31.142331 systemd-networkd[1029]: cali5ec59c6bf6e: Gained carrier Jul 16 12:42:31.158176 kubelet[1510]: E0716 12:42:31.157662 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:42:31.162954 env[1191]: 2025-07-16 12:42:30.980 [INFO][2858] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.244.102.154-k8s-test--pod--1-eth0 default 15dd5fe0-a29a-44af-b72d-e75023aca9c0 1445 0 2025-07-16 12:42:18 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.244.102.154 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="986bbbbe8caaf8838797d36f329c9c7333e94f310153b2e96db586236336fb8e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.244.102.154-k8s-test--pod--1-" Jul 16 12:42:31.162954 env[1191]: 2025-07-16 12:42:30.981 [INFO][2858] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="986bbbbe8caaf8838797d36f329c9c7333e94f310153b2e96db586236336fb8e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.244.102.154-k8s-test--pod--1-eth0" Jul 16 12:42:31.162954 env[1191]: 2025-07-16 12:42:31.038 [INFO][2871] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="986bbbbe8caaf8838797d36f329c9c7333e94f310153b2e96db586236336fb8e" HandleID="k8s-pod-network.986bbbbe8caaf8838797d36f329c9c7333e94f310153b2e96db586236336fb8e" Workload="10.244.102.154-k8s-test--pod--1-eth0" Jul 16 12:42:31.162954 env[1191]: 2025-07-16 12:42:31.038 [INFO][2871] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="986bbbbe8caaf8838797d36f329c9c7333e94f310153b2e96db586236336fb8e" HandleID="k8s-pod-network.986bbbbe8caaf8838797d36f329c9c7333e94f310153b2e96db586236336fb8e" Workload="10.244.102.154-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ccff0), Attrs:map[string]string{"namespace":"default", "node":"10.244.102.154", "pod":"test-pod-1", "timestamp":"2025-07-16 12:42:31.038549477 +0000 UTC"}, Hostname:"10.244.102.154", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 16 12:42:31.162954 env[1191]: 2025-07-16 12:42:31.038 [INFO][2871] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 16 12:42:31.162954 env[1191]: 2025-07-16 12:42:31.038 [INFO][2871] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 16 12:42:31.162954 env[1191]: 2025-07-16 12:42:31.039 [INFO][2871] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.244.102.154' Jul 16 12:42:31.162954 env[1191]: 2025-07-16 12:42:31.056 [INFO][2871] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.986bbbbe8caaf8838797d36f329c9c7333e94f310153b2e96db586236336fb8e" host="10.244.102.154" Jul 16 12:42:31.162954 env[1191]: 2025-07-16 12:42:31.066 [INFO][2871] ipam/ipam.go 394: Looking up existing affinities for host host="10.244.102.154" Jul 16 12:42:31.162954 env[1191]: 2025-07-16 12:42:31.076 [INFO][2871] ipam/ipam.go 511: Trying affinity for 192.168.67.64/26 host="10.244.102.154" Jul 16 12:42:31.162954 env[1191]: 2025-07-16 12:42:31.087 [INFO][2871] ipam/ipam.go 158: Attempting to load block cidr=192.168.67.64/26 host="10.244.102.154" Jul 16 12:42:31.162954 env[1191]: 2025-07-16 12:42:31.092 [INFO][2871] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.67.64/26 host="10.244.102.154" Jul 16 12:42:31.162954 env[1191]: 2025-07-16 12:42:31.092 [INFO][2871] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.67.64/26 handle="k8s-pod-network.986bbbbe8caaf8838797d36f329c9c7333e94f310153b2e96db586236336fb8e" host="10.244.102.154" Jul 16 12:42:31.162954 env[1191]: 2025-07-16 12:42:31.095 [INFO][2871] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.986bbbbe8caaf8838797d36f329c9c7333e94f310153b2e96db586236336fb8e Jul 16 12:42:31.162954 env[1191]: 2025-07-16 12:42:31.102 [INFO][2871] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.67.64/26 handle="k8s-pod-network.986bbbbe8caaf8838797d36f329c9c7333e94f310153b2e96db586236336fb8e" host="10.244.102.154" Jul 16 12:42:31.162954 env[1191]: 2025-07-16 12:42:31.112 [INFO][2871] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.67.68/26] block=192.168.67.64/26 handle="k8s-pod-network.986bbbbe8caaf8838797d36f329c9c7333e94f310153b2e96db586236336fb8e" host="10.244.102.154" Jul 16 12:42:31.162954 env[1191]: 2025-07-16 12:42:31.112 [INFO][2871] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.67.68/26] handle="k8s-pod-network.986bbbbe8caaf8838797d36f329c9c7333e94f310153b2e96db586236336fb8e" host="10.244.102.154" Jul 16 12:42:31.162954 env[1191]: 2025-07-16 12:42:31.113 [INFO][2871] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 16 12:42:31.162954 env[1191]: 2025-07-16 12:42:31.113 [INFO][2871] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.67.68/26] IPv6=[] ContainerID="986bbbbe8caaf8838797d36f329c9c7333e94f310153b2e96db586236336fb8e" HandleID="k8s-pod-network.986bbbbe8caaf8838797d36f329c9c7333e94f310153b2e96db586236336fb8e" Workload="10.244.102.154-k8s-test--pod--1-eth0" Jul 16 12:42:31.162954 env[1191]: 2025-07-16 12:42:31.116 [INFO][2858] cni-plugin/k8s.go 418: Populated endpoint ContainerID="986bbbbe8caaf8838797d36f329c9c7333e94f310153b2e96db586236336fb8e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.244.102.154-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.102.154-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"15dd5fe0-a29a-44af-b72d-e75023aca9c0", ResourceVersion:"1445", Generation:0, CreationTimestamp:time.Date(2025, time.July, 16, 12, 42, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.102.154", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.67.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 16 12:42:31.163941 env[1191]: 2025-07-16 12:42:31.116 [INFO][2858] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.67.68/32] ContainerID="986bbbbe8caaf8838797d36f329c9c7333e94f310153b2e96db586236336fb8e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.244.102.154-k8s-test--pod--1-eth0" Jul 16 12:42:31.163941 env[1191]: 2025-07-16 12:42:31.117 [INFO][2858] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="986bbbbe8caaf8838797d36f329c9c7333e94f310153b2e96db586236336fb8e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.244.102.154-k8s-test--pod--1-eth0" Jul 16 12:42:31.163941 env[1191]: 2025-07-16 12:42:31.143 [INFO][2858] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="986bbbbe8caaf8838797d36f329c9c7333e94f310153b2e96db586236336fb8e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.244.102.154-k8s-test--pod--1-eth0" Jul 16 12:42:31.163941 env[1191]: 2025-07-16 12:42:31.144 [INFO][2858] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="986bbbbe8caaf8838797d36f329c9c7333e94f310153b2e96db586236336fb8e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.244.102.154-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.102.154-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"15dd5fe0-a29a-44af-b72d-e75023aca9c0", ResourceVersion:"1445", Generation:0, CreationTimestamp:time.Date(2025, time.July, 16, 12, 42, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.102.154", ContainerID:"986bbbbe8caaf8838797d36f329c9c7333e94f310153b2e96db586236336fb8e", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.67.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"82:10:8c:76:3f:06", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 16 12:42:31.163941 env[1191]: 2025-07-16 12:42:31.157 [INFO][2858] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="986bbbbe8caaf8838797d36f329c9c7333e94f310153b2e96db586236336fb8e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.244.102.154-k8s-test--pod--1-eth0" Jul 16 12:42:31.190000 audit[2892]: NETFILTER_CFG table=filter:79 family=2 entries=40 op=nft_register_chain pid=2892 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 16 12:42:31.190000 audit[2892]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffedc862640 a2=0 a3=7ffedc86262c items=0 ppid=2239 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:31.190000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 16 12:42:31.192787 env[1191]: time="2025-07-16T12:42:31.192678988Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 16 12:42:31.193008 env[1191]: time="2025-07-16T12:42:31.192984631Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 16 12:42:31.193111 env[1191]: time="2025-07-16T12:42:31.193091681Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 16 12:42:31.193486 env[1191]: time="2025-07-16T12:42:31.193450925Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/986bbbbe8caaf8838797d36f329c9c7333e94f310153b2e96db586236336fb8e pid=2893 runtime=io.containerd.runc.v2 Jul 16 12:42:31.221155 systemd[1]: run-containerd-runc-k8s.io-986bbbbe8caaf8838797d36f329c9c7333e94f310153b2e96db586236336fb8e-runc.W7pFJd.mount: Deactivated successfully. Jul 16 12:42:31.228709 systemd[1]: Started cri-containerd-986bbbbe8caaf8838797d36f329c9c7333e94f310153b2e96db586236336fb8e.scope. Jul 16 12:42:31.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.252000 audit: BPF prog-id=132 op=LOAD Jul 16 12:42:31.254000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.254000 audit[2905]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2893 pid=2905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:31.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938366262626265386361616638383338373937643336663332396339 Jul 16 12:42:31.254000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.254000 audit[2905]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2893 pid=2905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:31.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938366262626265386361616638383338373937643336663332396339 Jul 16 12:42:31.254000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.254000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.254000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.254000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.254000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.254000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.254000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.254000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.254000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.254000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.254000 audit: BPF prog-id=133 op=LOAD Jul 16 12:42:31.254000 audit[2905]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00031d530 items=0 ppid=2893 pid=2905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:31.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938366262626265386361616638383338373937643336663332396339 Jul 16 12:42:31.254000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.254000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.254000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.254000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.254000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.254000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.254000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.254000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.254000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.254000 audit: BPF prog-id=134 op=LOAD Jul 16 12:42:31.254000 audit[2905]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00031d578 items=0 ppid=2893 pid=2905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:31.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938366262626265386361616638383338373937643336663332396339 Jul 16 12:42:31.254000 audit: BPF prog-id=134 op=UNLOAD Jul 16 12:42:31.254000 audit: BPF prog-id=133 op=UNLOAD Jul 16 12:42:31.254000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.254000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.254000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.254000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.254000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.254000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.254000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.254000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.254000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.254000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.254000 audit: BPF prog-id=135 op=LOAD Jul 16 12:42:31.254000 audit[2905]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00031d988 items=0 ppid=2893 pid=2905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:31.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938366262626265386361616638383338373937643336663332396339 Jul 16 12:42:31.299562 env[1191]: time="2025-07-16T12:42:31.299511665Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:15dd5fe0-a29a-44af-b72d-e75023aca9c0,Namespace:default,Attempt:0,} returns sandbox id \"986bbbbe8caaf8838797d36f329c9c7333e94f310153b2e96db586236336fb8e\"" Jul 16 12:42:31.302641 env[1191]: time="2025-07-16T12:42:31.302571489Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Jul 16 12:42:31.787911 env[1191]: time="2025-07-16T12:42:31.787817047Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:42:31.791514 env[1191]: time="2025-07-16T12:42:31.791451728Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:f6422896ca84c9af48d5417d6b7a573bf6b38f81edc15538907d987fc658d909,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:42:31.793187 env[1191]: time="2025-07-16T12:42:31.793155616Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:42:31.795141 env[1191]: time="2025-07-16T12:42:31.795111122Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:30bb68e656e0665bce700e67d2756f68bdca3345fa1099a32bfdb8febcf621cd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 16 12:42:31.796227 env[1191]: time="2025-07-16T12:42:31.796188249Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:f6422896ca84c9af48d5417d6b7a573bf6b38f81edc15538907d987fc658d909\"" Jul 16 12:42:31.799636 env[1191]: time="2025-07-16T12:42:31.799572425Z" level=info msg="CreateContainer within sandbox \"986bbbbe8caaf8838797d36f329c9c7333e94f310153b2e96db586236336fb8e\" for container &ContainerMetadata{Name:test,Attempt:0,}" Jul 16 12:42:31.817433 env[1191]: time="2025-07-16T12:42:31.817383790Z" level=info msg="CreateContainer within sandbox \"986bbbbe8caaf8838797d36f329c9c7333e94f310153b2e96db586236336fb8e\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"0757ed234b75c1bf0f02417ac82e88188d74ddc243182a01415ec51fc9cfa786\"" Jul 16 12:42:31.818224 env[1191]: time="2025-07-16T12:42:31.818200939Z" level=info msg="StartContainer for \"0757ed234b75c1bf0f02417ac82e88188d74ddc243182a01415ec51fc9cfa786\"" Jul 16 12:42:31.836673 systemd[1]: Started cri-containerd-0757ed234b75c1bf0f02417ac82e88188d74ddc243182a01415ec51fc9cfa786.scope. Jul 16 12:42:31.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.854000 audit: BPF prog-id=136 op=LOAD Jul 16 12:42:31.855000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.855000 audit[2938]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2893 pid=2938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:31.855000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037353765643233346237356331626630663032343137616338326538 Jul 16 12:42:31.856000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.856000 audit[2938]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2893 pid=2938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:31.856000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037353765643233346237356331626630663032343137616338326538 Jul 16 12:42:31.856000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.856000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.856000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.856000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.856000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.856000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.856000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.856000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.856000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.856000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.856000 audit: BPF prog-id=137 op=LOAD Jul 16 12:42:31.856000 audit[2938]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000203320 items=0 ppid=2893 pid=2938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:31.856000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037353765643233346237356331626630663032343137616338326538 Jul 16 12:42:31.857000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.857000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.857000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.857000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.857000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.857000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.857000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.857000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.857000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.857000 audit: BPF prog-id=138 op=LOAD Jul 16 12:42:31.857000 audit[2938]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000203368 items=0 ppid=2893 pid=2938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:31.857000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037353765643233346237356331626630663032343137616338326538 Jul 16 12:42:31.857000 audit: BPF prog-id=138 op=UNLOAD Jul 16 12:42:31.857000 audit: BPF prog-id=137 op=UNLOAD Jul 16 12:42:31.858000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.858000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.858000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.858000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.858000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.858000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.858000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.858000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.858000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.858000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 16 12:42:31.858000 audit: BPF prog-id=139 op=LOAD Jul 16 12:42:31.858000 audit[2938]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000203778 items=0 ppid=2893 pid=2938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 16 12:42:31.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037353765643233346237356331626630663032343137616338326538 Jul 16 12:42:31.880132 env[1191]: time="2025-07-16T12:42:31.880066766Z" level=info msg="StartContainer for \"0757ed234b75c1bf0f02417ac82e88188d74ddc243182a01415ec51fc9cfa786\" returns successfully" Jul 16 12:42:32.158349 kubelet[1510]: E0716 12:42:32.158121 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:42:32.200220 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3325165018.mount: Deactivated successfully. Jul 16 12:42:32.793532 systemd-networkd[1029]: cali5ec59c6bf6e: Gained IPv6LL Jul 16 12:42:33.160095 kubelet[1510]: E0716 12:42:33.159389 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:42:34.160206 kubelet[1510]: E0716 12:42:34.160129 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:42:35.161560 kubelet[1510]: E0716 12:42:35.161494 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:42:36.162647 kubelet[1510]: E0716 12:42:36.162545 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:42:37.106842 kubelet[1510]: E0716 12:42:37.106770 1510 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:42:37.155217 env[1191]: time="2025-07-16T12:42:37.155125672Z" level=info msg="StopPodSandbox for \"7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89\"" Jul 16 12:42:37.163689 kubelet[1510]: E0716 12:42:37.163639 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:42:37.284477 env[1191]: 2025-07-16 12:42:37.232 [WARNING][2996] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.102.154-k8s-nginx--deployment--8587fbcb89--t7rxk-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"d11b2cf0-12d8-4209-875b-8be7e9c082b5", ResourceVersion:"1326", Generation:0, CreationTimestamp:time.Date(2025, time.July, 16, 12, 41, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.102.154", ContainerID:"2f2116d0ca5f5b1e096ebde8f3e08274757c8c9fa8f092103090bd5386e25e92", Pod:"nginx-deployment-8587fbcb89-t7rxk", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.67.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali83efb2275d7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 16 12:42:37.284477 env[1191]: 2025-07-16 12:42:37.234 [INFO][2996] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89" Jul 16 12:42:37.284477 env[1191]: 2025-07-16 12:42:37.234 [INFO][2996] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89" iface="eth0" netns="" Jul 16 12:42:37.284477 env[1191]: 2025-07-16 12:42:37.234 [INFO][2996] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89" Jul 16 12:42:37.284477 env[1191]: 2025-07-16 12:42:37.234 [INFO][2996] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89" Jul 16 12:42:37.284477 env[1191]: 2025-07-16 12:42:37.265 [INFO][3003] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89" HandleID="k8s-pod-network.7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89" Workload="10.244.102.154-k8s-nginx--deployment--8587fbcb89--t7rxk-eth0" Jul 16 12:42:37.284477 env[1191]: 2025-07-16 12:42:37.265 [INFO][3003] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 16 12:42:37.284477 env[1191]: 2025-07-16 12:42:37.265 [INFO][3003] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 16 12:42:37.284477 env[1191]: 2025-07-16 12:42:37.277 [WARNING][3003] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89" HandleID="k8s-pod-network.7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89" Workload="10.244.102.154-k8s-nginx--deployment--8587fbcb89--t7rxk-eth0" Jul 16 12:42:37.284477 env[1191]: 2025-07-16 12:42:37.277 [INFO][3003] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89" HandleID="k8s-pod-network.7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89" Workload="10.244.102.154-k8s-nginx--deployment--8587fbcb89--t7rxk-eth0" Jul 16 12:42:37.284477 env[1191]: 2025-07-16 12:42:37.280 [INFO][3003] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 16 12:42:37.284477 env[1191]: 2025-07-16 12:42:37.282 [INFO][2996] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89" Jul 16 12:42:37.285414 env[1191]: time="2025-07-16T12:42:37.285352191Z" level=info msg="TearDown network for sandbox \"7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89\" successfully" Jul 16 12:42:37.285504 env[1191]: time="2025-07-16T12:42:37.285486665Z" level=info msg="StopPodSandbox for \"7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89\" returns successfully" Jul 16 12:42:37.286450 env[1191]: time="2025-07-16T12:42:37.286402473Z" level=info msg="RemovePodSandbox for \"7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89\"" Jul 16 12:42:37.286547 env[1191]: time="2025-07-16T12:42:37.286454010Z" level=info msg="Forcibly stopping sandbox \"7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89\"" Jul 16 12:42:37.421672 env[1191]: 2025-07-16 12:42:37.343 [WARNING][3018] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.102.154-k8s-nginx--deployment--8587fbcb89--t7rxk-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"d11b2cf0-12d8-4209-875b-8be7e9c082b5", ResourceVersion:"1326", Generation:0, CreationTimestamp:time.Date(2025, time.July, 16, 12, 41, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.102.154", ContainerID:"2f2116d0ca5f5b1e096ebde8f3e08274757c8c9fa8f092103090bd5386e25e92", Pod:"nginx-deployment-8587fbcb89-t7rxk", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.67.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali83efb2275d7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 16 12:42:37.421672 env[1191]: 2025-07-16 12:42:37.345 [INFO][3018] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89" Jul 16 12:42:37.421672 env[1191]: 2025-07-16 12:42:37.345 [INFO][3018] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89" iface="eth0" netns="" Jul 16 12:42:37.421672 env[1191]: 2025-07-16 12:42:37.345 [INFO][3018] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89" Jul 16 12:42:37.421672 env[1191]: 2025-07-16 12:42:37.345 [INFO][3018] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89" Jul 16 12:42:37.421672 env[1191]: 2025-07-16 12:42:37.381 [INFO][3027] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89" HandleID="k8s-pod-network.7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89" Workload="10.244.102.154-k8s-nginx--deployment--8587fbcb89--t7rxk-eth0" Jul 16 12:42:37.421672 env[1191]: 2025-07-16 12:42:37.382 [INFO][3027] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 16 12:42:37.421672 env[1191]: 2025-07-16 12:42:37.382 [INFO][3027] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 16 12:42:37.421672 env[1191]: 2025-07-16 12:42:37.399 [WARNING][3027] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89" HandleID="k8s-pod-network.7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89" Workload="10.244.102.154-k8s-nginx--deployment--8587fbcb89--t7rxk-eth0" Jul 16 12:42:37.421672 env[1191]: 2025-07-16 12:42:37.399 [INFO][3027] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89" HandleID="k8s-pod-network.7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89" Workload="10.244.102.154-k8s-nginx--deployment--8587fbcb89--t7rxk-eth0" Jul 16 12:42:37.421672 env[1191]: 2025-07-16 12:42:37.414 [INFO][3027] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 16 12:42:37.421672 env[1191]: 2025-07-16 12:42:37.418 [INFO][3018] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89" Jul 16 12:42:37.422872 env[1191]: time="2025-07-16T12:42:37.422769914Z" level=info msg="TearDown network for sandbox \"7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89\" successfully" Jul 16 12:42:37.426564 env[1191]: time="2025-07-16T12:42:37.426508045Z" level=info msg="RemovePodSandbox \"7a3378fc65e868052eb08b07a0d72503e4db205adb5c0db70635de323317ef89\" returns successfully" Jul 16 12:42:37.427791 env[1191]: time="2025-07-16T12:42:37.427761230Z" level=info msg="StopPodSandbox for \"ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de\"" Jul 16 12:42:37.551050 env[1191]: 2025-07-16 12:42:37.490 [WARNING][3042] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.102.154-k8s-csi--node--driver--shkf4-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2fcf4458-9494-4dc8-b20e-0300cabbff4b", ResourceVersion:"1357", Generation:0, CreationTimestamp:time.Date(2025, time.July, 16, 12, 41, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"57bd658777", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.102.154", ContainerID:"097d0cc454bacb386bb013ddf7f71cf2b92bdfd52636e0afee877c2eec27c47f", Pod:"csi-node-driver-shkf4", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.67.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali27088d6cbb4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 16 12:42:37.551050 env[1191]: 2025-07-16 12:42:37.490 [INFO][3042] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de" Jul 16 12:42:37.551050 env[1191]: 2025-07-16 12:42:37.490 [INFO][3042] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de" iface="eth0" netns="" Jul 16 12:42:37.551050 env[1191]: 2025-07-16 12:42:37.490 [INFO][3042] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de" Jul 16 12:42:37.551050 env[1191]: 2025-07-16 12:42:37.491 [INFO][3042] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de" Jul 16 12:42:37.551050 env[1191]: 2025-07-16 12:42:37.521 [INFO][3049] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de" HandleID="k8s-pod-network.ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de" Workload="10.244.102.154-k8s-csi--node--driver--shkf4-eth0" Jul 16 12:42:37.551050 env[1191]: 2025-07-16 12:42:37.521 [INFO][3049] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 16 12:42:37.551050 env[1191]: 2025-07-16 12:42:37.521 [INFO][3049] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 16 12:42:37.551050 env[1191]: 2025-07-16 12:42:37.537 [WARNING][3049] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de" HandleID="k8s-pod-network.ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de" Workload="10.244.102.154-k8s-csi--node--driver--shkf4-eth0" Jul 16 12:42:37.551050 env[1191]: 2025-07-16 12:42:37.537 [INFO][3049] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de" HandleID="k8s-pod-network.ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de" Workload="10.244.102.154-k8s-csi--node--driver--shkf4-eth0" Jul 16 12:42:37.551050 env[1191]: 2025-07-16 12:42:37.547 [INFO][3049] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 16 12:42:37.551050 env[1191]: 2025-07-16 12:42:37.549 [INFO][3042] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de" Jul 16 12:42:37.551838 env[1191]: time="2025-07-16T12:42:37.551120911Z" level=info msg="TearDown network for sandbox \"ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de\" successfully" Jul 16 12:42:37.551838 env[1191]: time="2025-07-16T12:42:37.551178996Z" level=info msg="StopPodSandbox for \"ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de\" returns successfully" Jul 16 12:42:37.552207 env[1191]: time="2025-07-16T12:42:37.552150327Z" level=info msg="RemovePodSandbox for \"ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de\"" Jul 16 12:42:37.552297 env[1191]: time="2025-07-16T12:42:37.552221319Z" level=info msg="Forcibly stopping sandbox \"ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de\"" Jul 16 12:42:37.676857 env[1191]: 2025-07-16 12:42:37.609 [WARNING][3065] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.244.102.154-k8s-csi--node--driver--shkf4-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2fcf4458-9494-4dc8-b20e-0300cabbff4b", ResourceVersion:"1357", Generation:0, CreationTimestamp:time.Date(2025, time.July, 16, 12, 41, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"57bd658777", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.244.102.154", ContainerID:"097d0cc454bacb386bb013ddf7f71cf2b92bdfd52636e0afee877c2eec27c47f", Pod:"csi-node-driver-shkf4", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.67.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali27088d6cbb4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 16 12:42:37.676857 env[1191]: 2025-07-16 12:42:37.610 [INFO][3065] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de" Jul 16 12:42:37.676857 env[1191]: 2025-07-16 12:42:37.610 [INFO][3065] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de" iface="eth0" netns="" Jul 16 12:42:37.676857 env[1191]: 2025-07-16 12:42:37.610 [INFO][3065] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de" Jul 16 12:42:37.676857 env[1191]: 2025-07-16 12:42:37.610 [INFO][3065] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de" Jul 16 12:42:37.676857 env[1191]: 2025-07-16 12:42:37.644 [INFO][3072] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de" HandleID="k8s-pod-network.ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de" Workload="10.244.102.154-k8s-csi--node--driver--shkf4-eth0" Jul 16 12:42:37.676857 env[1191]: 2025-07-16 12:42:37.644 [INFO][3072] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 16 12:42:37.676857 env[1191]: 2025-07-16 12:42:37.644 [INFO][3072] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 16 12:42:37.676857 env[1191]: 2025-07-16 12:42:37.665 [WARNING][3072] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de" HandleID="k8s-pod-network.ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de" Workload="10.244.102.154-k8s-csi--node--driver--shkf4-eth0" Jul 16 12:42:37.676857 env[1191]: 2025-07-16 12:42:37.665 [INFO][3072] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de" HandleID="k8s-pod-network.ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de" Workload="10.244.102.154-k8s-csi--node--driver--shkf4-eth0" Jul 16 12:42:37.676857 env[1191]: 2025-07-16 12:42:37.672 [INFO][3072] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 16 12:42:37.676857 env[1191]: 2025-07-16 12:42:37.674 [INFO][3065] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de" Jul 16 12:42:37.678031 env[1191]: time="2025-07-16T12:42:37.677560538Z" level=info msg="TearDown network for sandbox \"ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de\" successfully" Jul 16 12:42:37.680855 env[1191]: time="2025-07-16T12:42:37.680774936Z" level=info msg="RemovePodSandbox \"ec4fb3dcc02363170e1742f06480ea5cceca5b463aadba9acdf64eb9341033de\" returns successfully" Jul 16 12:42:38.165055 kubelet[1510]: E0716 12:42:38.164928 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:42:39.165849 kubelet[1510]: E0716 12:42:39.165717 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 16 12:42:40.166519 kubelet[1510]: E0716 12:42:40.166457 1510 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"