Jul 15 11:31:49.829689 kernel: Linux version 5.15.188-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Tue Jul 15 10:04:37 -00 2025 Jul 15 11:31:49.829711 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=3fdbb2e3469f90ee764ea38c6fc4332d45967696e3c4fd4a8c65f8d0125b235b Jul 15 11:31:49.829723 kernel: BIOS-provided physical RAM map: Jul 15 11:31:49.829731 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Jul 15 11:31:49.829738 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000007fffff] usable Jul 15 11:31:49.829745 kernel: BIOS-e820: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS Jul 15 11:31:49.829754 kernel: BIOS-e820: [mem 0x0000000000808000-0x000000000080afff] usable Jul 15 11:31:49.829761 kernel: BIOS-e820: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS Jul 15 11:31:49.829768 kernel: BIOS-e820: [mem 0x000000000080c000-0x000000000080ffff] usable Jul 15 11:31:49.829778 kernel: BIOS-e820: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS Jul 15 11:31:49.829785 kernel: BIOS-e820: [mem 0x0000000000900000-0x000000009c8eefff] usable Jul 15 11:31:49.829792 kernel: BIOS-e820: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved Jul 15 11:31:49.829800 kernel: BIOS-e820: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data Jul 15 11:31:49.829807 kernel: BIOS-e820: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS Jul 15 11:31:49.829817 kernel: BIOS-e820: [mem 0x000000009cbff000-0x000000009cf3ffff] usable Jul 15 11:31:49.829826 kernel: BIOS-e820: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved Jul 15 11:31:49.829852 kernel: BIOS-e820: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS Jul 15 11:31:49.829872 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Jul 15 11:31:49.829881 kernel: NX (Execute Disable) protection: active Jul 15 11:31:49.829889 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable Jul 15 11:31:49.829897 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable Jul 15 11:31:49.829904 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable Jul 15 11:31:49.829912 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable Jul 15 11:31:49.829919 kernel: extended physical RAM map: Jul 15 11:31:49.829927 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable Jul 15 11:31:49.829938 kernel: reserve setup_data: [mem 0x0000000000100000-0x00000000007fffff] usable Jul 15 11:31:49.829946 kernel: reserve setup_data: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS Jul 15 11:31:49.829953 kernel: reserve setup_data: [mem 0x0000000000808000-0x000000000080afff] usable Jul 15 11:31:49.829961 kernel: reserve setup_data: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS Jul 15 11:31:49.829969 kernel: reserve setup_data: [mem 0x000000000080c000-0x000000000080ffff] usable Jul 15 11:31:49.829976 kernel: reserve setup_data: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS Jul 15 11:31:49.829984 kernel: reserve setup_data: [mem 0x0000000000900000-0x000000009b438017] usable Jul 15 11:31:49.829992 kernel: reserve setup_data: [mem 0x000000009b438018-0x000000009b474e57] usable Jul 15 11:31:49.829999 kernel: reserve setup_data: [mem 0x000000009b474e58-0x000000009b475017] usable Jul 15 11:31:49.830007 kernel: reserve setup_data: [mem 0x000000009b475018-0x000000009b47ec57] usable Jul 15 11:31:49.830015 kernel: reserve setup_data: [mem 0x000000009b47ec58-0x000000009c8eefff] usable Jul 15 11:31:49.830025 kernel: reserve setup_data: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved Jul 15 11:31:49.830032 kernel: reserve setup_data: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data Jul 15 11:31:49.830040 kernel: reserve setup_data: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS Jul 15 11:31:49.830048 kernel: reserve setup_data: [mem 0x000000009cbff000-0x000000009cf3ffff] usable Jul 15 11:31:49.830059 kernel: reserve setup_data: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved Jul 15 11:31:49.830068 kernel: reserve setup_data: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS Jul 15 11:31:49.830076 kernel: reserve setup_data: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Jul 15 11:31:49.830087 kernel: efi: EFI v2.70 by EDK II Jul 15 11:31:49.830095 kernel: efi: SMBIOS=0x9c9ab000 ACPI=0x9cb7e000 ACPI 2.0=0x9cb7e014 MEMATTR=0x9b673018 RNG=0x9cb73018 Jul 15 11:31:49.830104 kernel: random: crng init done Jul 15 11:31:49.830112 kernel: SMBIOS 2.8 present. Jul 15 11:31:49.830120 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 Jul 15 11:31:49.830128 kernel: Hypervisor detected: KVM Jul 15 11:31:49.830137 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Jul 15 11:31:49.830144 kernel: kvm-clock: cpu 0, msr 5119b001, primary cpu clock Jul 15 11:31:49.830152 kernel: kvm-clock: using sched offset of 4006497490 cycles Jul 15 11:31:49.830162 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Jul 15 11:31:49.830170 kernel: tsc: Detected 2794.750 MHz processor Jul 15 11:31:49.830178 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Jul 15 11:31:49.830186 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Jul 15 11:31:49.830194 kernel: last_pfn = 0x9cf40 max_arch_pfn = 0x400000000 Jul 15 11:31:49.830202 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Jul 15 11:31:49.830210 kernel: Using GB pages for direct mapping Jul 15 11:31:49.830217 kernel: Secure boot disabled Jul 15 11:31:49.830225 kernel: ACPI: Early table checksum verification disabled Jul 15 11:31:49.830234 kernel: ACPI: RSDP 0x000000009CB7E014 000024 (v02 BOCHS ) Jul 15 11:31:49.830242 kernel: ACPI: XSDT 0x000000009CB7D0E8 000054 (v01 BOCHS BXPC 00000001 01000013) Jul 15 11:31:49.830250 kernel: ACPI: FACP 0x000000009CB79000 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Jul 15 11:31:49.830258 kernel: ACPI: DSDT 0x000000009CB7A000 0021BA (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 15 11:31:49.830266 kernel: ACPI: FACS 0x000000009CBDD000 000040 Jul 15 11:31:49.830274 kernel: ACPI: APIC 0x000000009CB78000 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 15 11:31:49.830282 kernel: ACPI: HPET 0x000000009CB77000 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 15 11:31:49.830289 kernel: ACPI: MCFG 0x000000009CB76000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 15 11:31:49.830297 kernel: ACPI: WAET 0x000000009CB75000 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 15 11:31:49.830306 kernel: ACPI: BGRT 0x000000009CB74000 000038 (v01 INTEL EDK2 00000002 01000013) Jul 15 11:31:49.830314 kernel: ACPI: Reserving FACP table memory at [mem 0x9cb79000-0x9cb790f3] Jul 15 11:31:49.830323 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cb7a000-0x9cb7c1b9] Jul 15 11:31:49.830331 kernel: ACPI: Reserving FACS table memory at [mem 0x9cbdd000-0x9cbdd03f] Jul 15 11:31:49.830340 kernel: ACPI: Reserving APIC table memory at [mem 0x9cb78000-0x9cb7808f] Jul 15 11:31:49.830348 kernel: ACPI: Reserving HPET table memory at [mem 0x9cb77000-0x9cb77037] Jul 15 11:31:49.830366 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cb76000-0x9cb7603b] Jul 15 11:31:49.830374 kernel: ACPI: Reserving WAET table memory at [mem 0x9cb75000-0x9cb75027] Jul 15 11:31:49.830382 kernel: ACPI: Reserving BGRT table memory at [mem 0x9cb74000-0x9cb74037] Jul 15 11:31:49.830392 kernel: No NUMA configuration found Jul 15 11:31:49.830400 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cf3ffff] Jul 15 11:31:49.830409 kernel: NODE_DATA(0) allocated [mem 0x9cea6000-0x9ceabfff] Jul 15 11:31:49.830417 kernel: Zone ranges: Jul 15 11:31:49.830425 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Jul 15 11:31:49.830434 kernel: DMA32 [mem 0x0000000001000000-0x000000009cf3ffff] Jul 15 11:31:49.830442 kernel: Normal empty Jul 15 11:31:49.830450 kernel: Movable zone start for each node Jul 15 11:31:49.830458 kernel: Early memory node ranges Jul 15 11:31:49.830468 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Jul 15 11:31:49.830476 kernel: node 0: [mem 0x0000000000100000-0x00000000007fffff] Jul 15 11:31:49.830485 kernel: node 0: [mem 0x0000000000808000-0x000000000080afff] Jul 15 11:31:49.830493 kernel: node 0: [mem 0x000000000080c000-0x000000000080ffff] Jul 15 11:31:49.830501 kernel: node 0: [mem 0x0000000000900000-0x000000009c8eefff] Jul 15 11:31:49.830509 kernel: node 0: [mem 0x000000009cbff000-0x000000009cf3ffff] Jul 15 11:31:49.830517 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cf3ffff] Jul 15 11:31:49.830525 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Jul 15 11:31:49.830532 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Jul 15 11:31:49.830540 kernel: On node 0, zone DMA: 8 pages in unavailable ranges Jul 15 11:31:49.830550 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Jul 15 11:31:49.830557 kernel: On node 0, zone DMA: 240 pages in unavailable ranges Jul 15 11:31:49.830565 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges Jul 15 11:31:49.830573 kernel: On node 0, zone DMA32: 12480 pages in unavailable ranges Jul 15 11:31:49.830581 kernel: ACPI: PM-Timer IO Port: 0x608 Jul 15 11:31:49.830589 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Jul 15 11:31:49.830597 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Jul 15 11:31:49.830604 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Jul 15 11:31:49.830612 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Jul 15 11:31:49.830621 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Jul 15 11:31:49.830629 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Jul 15 11:31:49.830637 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Jul 15 11:31:49.830645 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Jul 15 11:31:49.830652 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Jul 15 11:31:49.830661 kernel: TSC deadline timer available Jul 15 11:31:49.830669 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Jul 15 11:31:49.830677 kernel: kvm-guest: KVM setup pv remote TLB flush Jul 15 11:31:49.830686 kernel: kvm-guest: setup PV sched yield Jul 15 11:31:49.830695 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices Jul 15 11:31:49.830704 kernel: Booting paravirtualized kernel on KVM Jul 15 11:31:49.830718 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Jul 15 11:31:49.830728 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Jul 15 11:31:49.830737 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 Jul 15 11:31:49.830746 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 Jul 15 11:31:49.830755 kernel: pcpu-alloc: [0] 0 1 2 3 Jul 15 11:31:49.830764 kernel: kvm-guest: setup async PF for cpu 0 Jul 15 11:31:49.830773 kernel: kvm-guest: stealtime: cpu 0, msr 9b21c0c0 Jul 15 11:31:49.830782 kernel: kvm-guest: PV spinlocks enabled Jul 15 11:31:49.830791 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Jul 15 11:31:49.830800 kernel: Built 1 zonelists, mobility grouping on. Total pages: 629759 Jul 15 11:31:49.830811 kernel: Policy zone: DMA32 Jul 15 11:31:49.830822 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=3fdbb2e3469f90ee764ea38c6fc4332d45967696e3c4fd4a8c65f8d0125b235b Jul 15 11:31:49.830831 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Jul 15 11:31:49.830863 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Jul 15 11:31:49.830874 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jul 15 11:31:49.830883 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jul 15 11:31:49.830893 kernel: Memory: 2397432K/2567000K available (12295K kernel code, 2276K rwdata, 13732K rodata, 47476K init, 4104K bss, 169308K reserved, 0K cma-reserved) Jul 15 11:31:49.830902 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Jul 15 11:31:49.830911 kernel: ftrace: allocating 34607 entries in 136 pages Jul 15 11:31:49.830920 kernel: ftrace: allocated 136 pages with 2 groups Jul 15 11:31:49.830929 kernel: rcu: Hierarchical RCU implementation. Jul 15 11:31:49.830939 kernel: rcu: RCU event tracing is enabled. Jul 15 11:31:49.830948 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Jul 15 11:31:49.830960 kernel: Rude variant of Tasks RCU enabled. Jul 15 11:31:49.830969 kernel: Tracing variant of Tasks RCU enabled. Jul 15 11:31:49.830978 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jul 15 11:31:49.830987 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Jul 15 11:31:49.830996 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Jul 15 11:31:49.831005 kernel: Console: colour dummy device 80x25 Jul 15 11:31:49.831014 kernel: printk: console [ttyS0] enabled Jul 15 11:31:49.831023 kernel: ACPI: Core revision 20210730 Jul 15 11:31:49.831032 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Jul 15 11:31:49.831043 kernel: APIC: Switch to symmetric I/O mode setup Jul 15 11:31:49.831052 kernel: x2apic enabled Jul 15 11:31:49.831061 kernel: Switched APIC routing to physical x2apic. Jul 15 11:31:49.831070 kernel: kvm-guest: setup PV IPIs Jul 15 11:31:49.831079 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Jul 15 11:31:49.831088 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Jul 15 11:31:49.831097 kernel: Calibrating delay loop (skipped) preset value.. 5589.50 BogoMIPS (lpj=2794750) Jul 15 11:31:49.831106 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Jul 15 11:31:49.831115 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Jul 15 11:31:49.831126 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Jul 15 11:31:49.831136 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Jul 15 11:31:49.831145 kernel: Spectre V2 : Mitigation: Retpolines Jul 15 11:31:49.831154 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Jul 15 11:31:49.831162 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Jul 15 11:31:49.831172 kernel: RETBleed: Mitigation: untrained return thunk Jul 15 11:31:49.831181 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Jul 15 11:31:49.831190 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Jul 15 11:31:49.831199 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Jul 15 11:31:49.831210 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Jul 15 11:31:49.831219 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Jul 15 11:31:49.831228 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Jul 15 11:31:49.831237 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Jul 15 11:31:49.831246 kernel: Freeing SMP alternatives memory: 32K Jul 15 11:31:49.831255 kernel: pid_max: default: 32768 minimum: 301 Jul 15 11:31:49.831264 kernel: LSM: Security Framework initializing Jul 15 11:31:49.831272 kernel: SELinux: Initializing. Jul 15 11:31:49.831281 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jul 15 11:31:49.831293 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jul 15 11:31:49.831302 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) Jul 15 11:31:49.831311 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Jul 15 11:31:49.831320 kernel: ... version: 0 Jul 15 11:31:49.831329 kernel: ... bit width: 48 Jul 15 11:31:49.831338 kernel: ... generic registers: 6 Jul 15 11:31:49.831347 kernel: ... value mask: 0000ffffffffffff Jul 15 11:31:49.831365 kernel: ... max period: 00007fffffffffff Jul 15 11:31:49.831374 kernel: ... fixed-purpose events: 0 Jul 15 11:31:49.831385 kernel: ... event mask: 000000000000003f Jul 15 11:31:49.831393 kernel: signal: max sigframe size: 1776 Jul 15 11:31:49.831402 kernel: rcu: Hierarchical SRCU implementation. Jul 15 11:31:49.831412 kernel: smp: Bringing up secondary CPUs ... Jul 15 11:31:49.831421 kernel: x86: Booting SMP configuration: Jul 15 11:31:49.831430 kernel: .... node #0, CPUs: #1 Jul 15 11:31:49.831439 kernel: kvm-clock: cpu 1, msr 5119b041, secondary cpu clock Jul 15 11:31:49.831447 kernel: kvm-guest: setup async PF for cpu 1 Jul 15 11:31:49.831456 kernel: kvm-guest: stealtime: cpu 1, msr 9b29c0c0 Jul 15 11:31:49.831467 kernel: #2 Jul 15 11:31:49.831476 kernel: kvm-clock: cpu 2, msr 5119b081, secondary cpu clock Jul 15 11:31:49.831485 kernel: kvm-guest: setup async PF for cpu 2 Jul 15 11:31:49.831494 kernel: kvm-guest: stealtime: cpu 2, msr 9b31c0c0 Jul 15 11:31:49.831503 kernel: #3 Jul 15 11:31:49.831512 kernel: kvm-clock: cpu 3, msr 5119b0c1, secondary cpu clock Jul 15 11:31:49.831521 kernel: kvm-guest: setup async PF for cpu 3 Jul 15 11:31:49.831530 kernel: kvm-guest: stealtime: cpu 3, msr 9b39c0c0 Jul 15 11:31:49.831539 kernel: smp: Brought up 1 node, 4 CPUs Jul 15 11:31:49.831548 kernel: smpboot: Max logical packages: 1 Jul 15 11:31:49.831558 kernel: smpboot: Total of 4 processors activated (22358.00 BogoMIPS) Jul 15 11:31:49.831567 kernel: devtmpfs: initialized Jul 15 11:31:49.831576 kernel: x86/mm: Memory block size: 128MB Jul 15 11:31:49.831586 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00800000-0x00807fff] (32768 bytes) Jul 15 11:31:49.831595 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x0080b000-0x0080bfff] (4096 bytes) Jul 15 11:31:49.831604 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00810000-0x008fffff] (983040 bytes) Jul 15 11:31:49.831613 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cb7f000-0x9cbfefff] (524288 bytes) Jul 15 11:31:49.831622 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cf60000-0x9cffffff] (655360 bytes) Jul 15 11:31:49.831631 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jul 15 11:31:49.831642 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Jul 15 11:31:49.831652 kernel: pinctrl core: initialized pinctrl subsystem Jul 15 11:31:49.831661 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jul 15 11:31:49.831670 kernel: audit: initializing netlink subsys (disabled) Jul 15 11:31:49.831679 kernel: audit: type=2000 audit(1752579109.397:1): state=initialized audit_enabled=0 res=1 Jul 15 11:31:49.831688 kernel: thermal_sys: Registered thermal governor 'step_wise' Jul 15 11:31:49.831697 kernel: thermal_sys: Registered thermal governor 'user_space' Jul 15 11:31:49.831705 kernel: cpuidle: using governor menu Jul 15 11:31:49.831714 kernel: ACPI: bus type PCI registered Jul 15 11:31:49.831725 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jul 15 11:31:49.831734 kernel: dca service started, version 1.12.1 Jul 15 11:31:49.831743 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Jul 15 11:31:49.831752 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Jul 15 11:31:49.831761 kernel: PCI: Using configuration type 1 for base access Jul 15 11:31:49.831770 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Jul 15 11:31:49.831779 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Jul 15 11:31:49.831788 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Jul 15 11:31:49.831799 kernel: ACPI: Added _OSI(Module Device) Jul 15 11:31:49.831808 kernel: ACPI: Added _OSI(Processor Device) Jul 15 11:31:49.831817 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jul 15 11:31:49.831826 kernel: ACPI: Added _OSI(Linux-Dell-Video) Jul 15 11:31:49.831846 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Jul 15 11:31:49.831856 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Jul 15 11:31:49.831865 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Jul 15 11:31:49.831874 kernel: ACPI: Interpreter enabled Jul 15 11:31:49.831883 kernel: ACPI: PM: (supports S0 S3 S5) Jul 15 11:31:49.831891 kernel: ACPI: Using IOAPIC for interrupt routing Jul 15 11:31:49.831903 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Jul 15 11:31:49.831912 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Jul 15 11:31:49.831921 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Jul 15 11:31:49.832059 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Jul 15 11:31:49.832158 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] Jul 15 11:31:49.832252 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] Jul 15 11:31:49.832265 kernel: PCI host bridge to bus 0000:00 Jul 15 11:31:49.832386 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Jul 15 11:31:49.832474 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Jul 15 11:31:49.832559 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Jul 15 11:31:49.832642 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] Jul 15 11:31:49.832727 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Jul 15 11:31:49.832811 kernel: pci_bus 0000:00: root bus resource [mem 0x800000000-0xfffffffff window] Jul 15 11:31:49.832910 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Jul 15 11:31:49.833027 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Jul 15 11:31:49.833130 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 Jul 15 11:31:49.833224 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xc0000000-0xc0ffffff pref] Jul 15 11:31:49.833319 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xc1044000-0xc1044fff] Jul 15 11:31:49.833431 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] Jul 15 11:31:49.833529 kernel: pci 0000:00:01.0: BAR 0: assigned to efifb Jul 15 11:31:49.833627 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Jul 15 11:31:49.833731 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 Jul 15 11:31:49.833830 kernel: pci 0000:00:02.0: reg 0x10: [io 0x6100-0x611f] Jul 15 11:31:49.833939 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xc1043000-0xc1043fff] Jul 15 11:31:49.834037 kernel: pci 0000:00:02.0: reg 0x20: [mem 0x800000000-0x800003fff 64bit pref] Jul 15 11:31:49.834139 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 Jul 15 11:31:49.834282 kernel: pci 0000:00:03.0: reg 0x10: [io 0x6000-0x607f] Jul 15 11:31:49.834430 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc1042000-0xc1042fff] Jul 15 11:31:49.834571 kernel: pci 0000:00:03.0: reg 0x20: [mem 0x800004000-0x800007fff 64bit pref] Jul 15 11:31:49.834677 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Jul 15 11:31:49.834773 kernel: pci 0000:00:04.0: reg 0x10: [io 0x60e0-0x60ff] Jul 15 11:31:49.834885 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc1041000-0xc1041fff] Jul 15 11:31:49.834979 kernel: pci 0000:00:04.0: reg 0x20: [mem 0x800008000-0x80000bfff 64bit pref] Jul 15 11:31:49.835074 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfffc0000-0xffffffff pref] Jul 15 11:31:49.835181 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Jul 15 11:31:49.835276 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Jul 15 11:31:49.835389 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Jul 15 11:31:49.835502 kernel: pci 0000:00:1f.2: reg 0x20: [io 0x60c0-0x60df] Jul 15 11:31:49.835602 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xc1040000-0xc1040fff] Jul 15 11:31:49.835711 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Jul 15 11:31:49.835798 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x6080-0x60bf] Jul 15 11:31:49.835809 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Jul 15 11:31:49.835818 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Jul 15 11:31:49.835826 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Jul 15 11:31:49.835849 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Jul 15 11:31:49.835857 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 Jul 15 11:31:49.835865 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 Jul 15 11:31:49.835874 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Jul 15 11:31:49.835882 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Jul 15 11:31:49.835892 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 Jul 15 11:31:49.835901 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 Jul 15 11:31:49.835910 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 Jul 15 11:31:49.835919 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 Jul 15 11:31:49.835927 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 Jul 15 11:31:49.835935 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 Jul 15 11:31:49.835944 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 Jul 15 11:31:49.835952 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 Jul 15 11:31:49.835960 kernel: iommu: Default domain type: Translated Jul 15 11:31:49.835971 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Jul 15 11:31:49.836055 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Jul 15 11:31:49.836138 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Jul 15 11:31:49.836217 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Jul 15 11:31:49.836228 kernel: vgaarb: loaded Jul 15 11:31:49.836237 kernel: pps_core: LinuxPPS API ver. 1 registered Jul 15 11:31:49.836246 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Jul 15 11:31:49.836255 kernel: PTP clock support registered Jul 15 11:31:49.836263 kernel: Registered efivars operations Jul 15 11:31:49.836275 kernel: PCI: Using ACPI for IRQ routing Jul 15 11:31:49.836283 kernel: PCI: pci_cache_line_size set to 64 bytes Jul 15 11:31:49.836292 kernel: e820: reserve RAM buffer [mem 0x0080b000-0x008fffff] Jul 15 11:31:49.836301 kernel: e820: reserve RAM buffer [mem 0x00810000-0x008fffff] Jul 15 11:31:49.836310 kernel: e820: reserve RAM buffer [mem 0x9b438018-0x9bffffff] Jul 15 11:31:49.836319 kernel: e820: reserve RAM buffer [mem 0x9b475018-0x9bffffff] Jul 15 11:31:49.836328 kernel: e820: reserve RAM buffer [mem 0x9c8ef000-0x9fffffff] Jul 15 11:31:49.836343 kernel: e820: reserve RAM buffer [mem 0x9cf40000-0x9fffffff] Jul 15 11:31:49.836364 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Jul 15 11:31:49.836374 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Jul 15 11:31:49.836383 kernel: clocksource: Switched to clocksource kvm-clock Jul 15 11:31:49.836392 kernel: VFS: Disk quotas dquot_6.6.0 Jul 15 11:31:49.836402 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jul 15 11:31:49.836411 kernel: pnp: PnP ACPI init Jul 15 11:31:49.836522 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved Jul 15 11:31:49.836536 kernel: pnp: PnP ACPI: found 6 devices Jul 15 11:31:49.836548 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Jul 15 11:31:49.836558 kernel: NET: Registered PF_INET protocol family Jul 15 11:31:49.836567 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Jul 15 11:31:49.836576 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Jul 15 11:31:49.836586 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jul 15 11:31:49.836595 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Jul 15 11:31:49.836604 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Jul 15 11:31:49.836613 kernel: TCP: Hash tables configured (established 32768 bind 32768) Jul 15 11:31:49.836622 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Jul 15 11:31:49.836633 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Jul 15 11:31:49.836643 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jul 15 11:31:49.836652 kernel: NET: Registered PF_XDP protocol family Jul 15 11:31:49.836749 kernel: pci 0000:00:04.0: can't claim BAR 6 [mem 0xfffc0000-0xffffffff pref]: no compatible bridge window Jul 15 11:31:49.836887 kernel: pci 0000:00:04.0: BAR 6: assigned [mem 0x9d000000-0x9d03ffff pref] Jul 15 11:31:49.836975 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Jul 15 11:31:49.837064 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Jul 15 11:31:49.837148 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Jul 15 11:31:49.837234 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] Jul 15 11:31:49.837317 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Jul 15 11:31:49.837411 kernel: pci_bus 0000:00: resource 9 [mem 0x800000000-0xfffffffff window] Jul 15 11:31:49.837425 kernel: PCI: CLS 0 bytes, default 64 Jul 15 11:31:49.837434 kernel: Initialise system trusted keyrings Jul 15 11:31:49.837444 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Jul 15 11:31:49.837453 kernel: Key type asymmetric registered Jul 15 11:31:49.837462 kernel: Asymmetric key parser 'x509' registered Jul 15 11:31:49.837471 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Jul 15 11:31:49.837483 kernel: io scheduler mq-deadline registered Jul 15 11:31:49.837492 kernel: io scheduler kyber registered Jul 15 11:31:49.837513 kernel: io scheduler bfq registered Jul 15 11:31:49.837524 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Jul 15 11:31:49.837535 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 Jul 15 11:31:49.837544 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 Jul 15 11:31:49.837554 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 Jul 15 11:31:49.837564 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jul 15 11:31:49.837574 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Jul 15 11:31:49.837585 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Jul 15 11:31:49.837595 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Jul 15 11:31:49.837605 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Jul 15 11:31:49.837614 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Jul 15 11:31:49.837712 kernel: rtc_cmos 00:04: RTC can wake from S4 Jul 15 11:31:49.837802 kernel: rtc_cmos 00:04: registered as rtc0 Jul 15 11:31:49.837903 kernel: rtc_cmos 00:04: setting system clock to 2025-07-15T11:31:49 UTC (1752579109) Jul 15 11:31:49.837990 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Jul 15 11:31:49.838006 kernel: efifb: probing for efifb Jul 15 11:31:49.838017 kernel: efifb: framebuffer at 0xc0000000, using 4000k, total 4000k Jul 15 11:31:49.838026 kernel: efifb: mode is 1280x800x32, linelength=5120, pages=1 Jul 15 11:31:49.838036 kernel: efifb: scrolling: redraw Jul 15 11:31:49.838046 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Jul 15 11:31:49.838056 kernel: Console: switching to colour frame buffer device 160x50 Jul 15 11:31:49.838065 kernel: fb0: EFI VGA frame buffer device Jul 15 11:31:49.838075 kernel: pstore: Registered efi as persistent store backend Jul 15 11:31:49.838084 kernel: NET: Registered PF_INET6 protocol family Jul 15 11:31:49.838096 kernel: Segment Routing with IPv6 Jul 15 11:31:49.838106 kernel: In-situ OAM (IOAM) with IPv6 Jul 15 11:31:49.838116 kernel: NET: Registered PF_PACKET protocol family Jul 15 11:31:49.838127 kernel: Key type dns_resolver registered Jul 15 11:31:49.838136 kernel: IPI shorthand broadcast: enabled Jul 15 11:31:49.838146 kernel: sched_clock: Marking stable (436166555, 122652398)->(574391819, -15572866) Jul 15 11:31:49.838157 kernel: registered taskstats version 1 Jul 15 11:31:49.838166 kernel: Loading compiled-in X.509 certificates Jul 15 11:31:49.838176 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.188-flatcar: c4b3a19d3bd6de5654dc12075428550cf6251289' Jul 15 11:31:49.838186 kernel: Key type .fscrypt registered Jul 15 11:31:49.838195 kernel: Key type fscrypt-provisioning registered Jul 15 11:31:49.838207 kernel: pstore: Using crash dump compression: deflate Jul 15 11:31:49.838217 kernel: ima: No TPM chip found, activating TPM-bypass! Jul 15 11:31:49.838226 kernel: ima: Allocated hash algorithm: sha1 Jul 15 11:31:49.838238 kernel: ima: No architecture policies found Jul 15 11:31:49.838247 kernel: clk: Disabling unused clocks Jul 15 11:31:49.838257 kernel: Freeing unused kernel image (initmem) memory: 47476K Jul 15 11:31:49.838266 kernel: Write protecting the kernel read-only data: 28672k Jul 15 11:31:49.838276 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Jul 15 11:31:49.838286 kernel: Freeing unused kernel image (rodata/data gap) memory: 604K Jul 15 11:31:49.838296 kernel: Run /init as init process Jul 15 11:31:49.838305 kernel: with arguments: Jul 15 11:31:49.838315 kernel: /init Jul 15 11:31:49.838326 kernel: with environment: Jul 15 11:31:49.838335 kernel: HOME=/ Jul 15 11:31:49.838345 kernel: TERM=linux Jul 15 11:31:49.838364 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Jul 15 11:31:49.838377 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 15 11:31:49.838390 systemd[1]: Detected virtualization kvm. Jul 15 11:31:49.838401 systemd[1]: Detected architecture x86-64. Jul 15 11:31:49.838410 systemd[1]: Running in initrd. Jul 15 11:31:49.838423 systemd[1]: No hostname configured, using default hostname. Jul 15 11:31:49.838433 systemd[1]: Hostname set to . Jul 15 11:31:49.838443 systemd[1]: Initializing machine ID from VM UUID. Jul 15 11:31:49.838453 systemd[1]: Queued start job for default target initrd.target. Jul 15 11:31:49.838464 systemd[1]: Started systemd-ask-password-console.path. Jul 15 11:31:49.838474 systemd[1]: Reached target cryptsetup.target. Jul 15 11:31:49.838484 systemd[1]: Reached target paths.target. Jul 15 11:31:49.838493 systemd[1]: Reached target slices.target. Jul 15 11:31:49.838504 systemd[1]: Reached target swap.target. Jul 15 11:31:49.838516 systemd[1]: Reached target timers.target. Jul 15 11:31:49.838526 systemd[1]: Listening on iscsid.socket. Jul 15 11:31:49.838537 systemd[1]: Listening on iscsiuio.socket. Jul 15 11:31:49.838547 systemd[1]: Listening on systemd-journald-audit.socket. Jul 15 11:31:49.838558 systemd[1]: Listening on systemd-journald-dev-log.socket. Jul 15 11:31:49.838568 systemd[1]: Listening on systemd-journald.socket. Jul 15 11:31:49.838578 systemd[1]: Listening on systemd-networkd.socket. Jul 15 11:31:49.838590 systemd[1]: Listening on systemd-udevd-control.socket. Jul 15 11:31:49.838600 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 15 11:31:49.838610 systemd[1]: Reached target sockets.target. Jul 15 11:31:49.838621 systemd[1]: Starting kmod-static-nodes.service... Jul 15 11:31:49.838631 systemd[1]: Finished network-cleanup.service. Jul 15 11:31:49.838641 systemd[1]: Starting systemd-fsck-usr.service... Jul 15 11:31:49.838651 systemd[1]: Starting systemd-journald.service... Jul 15 11:31:49.838661 systemd[1]: Starting systemd-modules-load.service... Jul 15 11:31:49.838671 systemd[1]: Starting systemd-resolved.service... Jul 15 11:31:49.838683 systemd[1]: Starting systemd-vconsole-setup.service... Jul 15 11:31:49.838694 systemd[1]: Finished kmod-static-nodes.service. Jul 15 11:31:49.838704 kernel: audit: type=1130 audit(1752579109.829:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:49.838714 systemd[1]: Finished systemd-fsck-usr.service. Jul 15 11:31:49.838725 kernel: audit: type=1130 audit(1752579109.835:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:49.838739 systemd-journald[197]: Journal started Jul 15 11:31:49.838792 systemd-journald[197]: Runtime Journal (/run/log/journal/3e652486bc3b4363aeb036b5f90ca5e7) is 6.0M, max 48.4M, 42.4M free. Jul 15 11:31:49.829000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:49.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:49.836326 systemd-modules-load[198]: Inserted module 'overlay' Jul 15 11:31:49.841107 systemd[1]: Started systemd-journald.service. Jul 15 11:31:49.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:49.842396 systemd[1]: Finished systemd-vconsole-setup.service. Jul 15 11:31:49.850563 kernel: audit: type=1130 audit(1752579109.841:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:49.850587 kernel: audit: type=1130 audit(1752579109.845:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:49.845000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:49.848809 systemd[1]: Starting dracut-cmdline-ask.service... Jul 15 11:31:49.849771 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 15 11:31:49.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:49.858265 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 15 11:31:49.862515 kernel: audit: type=1130 audit(1752579109.857:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:49.866430 systemd-resolved[199]: Positive Trust Anchors: Jul 15 11:31:49.866446 systemd-resolved[199]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 15 11:31:49.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:49.866472 systemd-resolved[199]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 15 11:31:49.881971 kernel: audit: type=1130 audit(1752579109.866:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:49.882034 dracut-cmdline[214]: dracut-dracut-053 Jul 15 11:31:49.882034 dracut-cmdline[214]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Jul 15 11:31:49.882034 dracut-cmdline[214]: BEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=3fdbb2e3469f90ee764ea38c6fc4332d45967696e3c4fd4a8c65f8d0125b235b Jul 15 11:31:49.891728 kernel: audit: type=1130 audit(1752579109.882:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:49.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:49.866539 systemd[1]: Finished dracut-cmdline-ask.service. Jul 15 11:31:49.867794 systemd[1]: Starting dracut-cmdline.service... Jul 15 11:31:49.868643 systemd-resolved[199]: Defaulting to hostname 'linux'. Jul 15 11:31:49.872765 systemd[1]: Started systemd-resolved.service. Jul 15 11:31:49.882947 systemd[1]: Reached target nss-lookup.target. Jul 15 11:31:49.905857 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Jul 15 11:31:49.911867 kernel: Bridge firewalling registered Jul 15 11:31:49.911814 systemd-modules-load[198]: Inserted module 'br_netfilter' Jul 15 11:31:49.929861 kernel: SCSI subsystem initialized Jul 15 11:31:49.939856 kernel: Loading iSCSI transport class v2.0-870. Jul 15 11:31:49.939897 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jul 15 11:31:49.942308 kernel: device-mapper: uevent: version 1.0.3 Jul 15 11:31:49.943544 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Jul 15 11:31:49.946589 systemd-modules-load[198]: Inserted module 'dm_multipath' Jul 15 11:31:49.948187 systemd[1]: Finished systemd-modules-load.service. Jul 15 11:31:49.952546 kernel: audit: type=1130 audit(1752579109.947:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:49.947000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:49.952589 systemd[1]: Starting systemd-sysctl.service... Jul 15 11:31:49.959862 kernel: iscsi: registered transport (tcp) Jul 15 11:31:49.960463 systemd[1]: Finished systemd-sysctl.service. Jul 15 11:31:49.962000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:49.964860 kernel: audit: type=1130 audit(1752579109.962:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:49.981097 kernel: iscsi: registered transport (qla4xxx) Jul 15 11:31:49.981150 kernel: QLogic iSCSI HBA Driver Jul 15 11:31:50.009372 systemd[1]: Finished dracut-cmdline.service. Jul 15 11:31:50.008000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:50.010658 systemd[1]: Starting dracut-pre-udev.service... Jul 15 11:31:50.056869 kernel: raid6: avx2x4 gen() 29777 MB/s Jul 15 11:31:50.073857 kernel: raid6: avx2x4 xor() 7471 MB/s Jul 15 11:31:50.090866 kernel: raid6: avx2x2 gen() 32063 MB/s Jul 15 11:31:50.107854 kernel: raid6: avx2x2 xor() 19259 MB/s Jul 15 11:31:50.124856 kernel: raid6: avx2x1 gen() 26516 MB/s Jul 15 11:31:50.141863 kernel: raid6: avx2x1 xor() 15331 MB/s Jul 15 11:31:50.158863 kernel: raid6: sse2x4 gen() 14690 MB/s Jul 15 11:31:50.175854 kernel: raid6: sse2x4 xor() 6993 MB/s Jul 15 11:31:50.192860 kernel: raid6: sse2x2 gen() 16400 MB/s Jul 15 11:31:50.209855 kernel: raid6: sse2x2 xor() 9817 MB/s Jul 15 11:31:50.226863 kernel: raid6: sse2x1 gen() 11869 MB/s Jul 15 11:31:50.244174 kernel: raid6: sse2x1 xor() 7799 MB/s Jul 15 11:31:50.244197 kernel: raid6: using algorithm avx2x2 gen() 32063 MB/s Jul 15 11:31:50.244206 kernel: raid6: .... xor() 19259 MB/s, rmw enabled Jul 15 11:31:50.244857 kernel: raid6: using avx2x2 recovery algorithm Jul 15 11:31:50.257871 kernel: xor: automatically using best checksumming function avx Jul 15 11:31:50.347869 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Jul 15 11:31:50.355283 systemd[1]: Finished dracut-pre-udev.service. Jul 15 11:31:50.354000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:50.356000 audit: BPF prog-id=7 op=LOAD Jul 15 11:31:50.356000 audit: BPF prog-id=8 op=LOAD Jul 15 11:31:50.357225 systemd[1]: Starting systemd-udevd.service... Jul 15 11:31:50.368991 systemd-udevd[398]: Using default interface naming scheme 'v252'. Jul 15 11:31:50.373511 systemd[1]: Started systemd-udevd.service. Jul 15 11:31:50.372000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:50.374391 systemd[1]: Starting dracut-pre-trigger.service... Jul 15 11:31:50.385049 dracut-pre-trigger[400]: rd.md=0: removing MD RAID activation Jul 15 11:31:50.406134 systemd[1]: Finished dracut-pre-trigger.service. Jul 15 11:31:50.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:50.407696 systemd[1]: Starting systemd-udev-trigger.service... Jul 15 11:31:50.439552 systemd[1]: Finished systemd-udev-trigger.service. Jul 15 11:31:50.439000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:50.460564 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Jul 15 11:31:50.468924 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Jul 15 11:31:50.468941 kernel: GPT:9289727 != 19775487 Jul 15 11:31:50.468950 kernel: GPT:Alternate GPT header not at the end of the disk. Jul 15 11:31:50.468958 kernel: GPT:9289727 != 19775487 Jul 15 11:31:50.468967 kernel: GPT: Use GNU Parted to correct GPT errors. Jul 15 11:31:50.468975 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 15 11:31:50.471848 kernel: cryptd: max_cpu_qlen set to 1000 Jul 15 11:31:50.472851 kernel: libata version 3.00 loaded. Jul 15 11:31:50.480874 kernel: ahci 0000:00:1f.2: version 3.0 Jul 15 11:31:50.529681 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 Jul 15 11:31:50.529703 kernel: AVX2 version of gcm_enc/dec engaged. Jul 15 11:31:50.529712 kernel: AES CTR mode by8 optimization enabled Jul 15 11:31:50.529721 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Jul 15 11:31:50.529810 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Jul 15 11:31:50.529902 kernel: scsi host0: ahci Jul 15 11:31:50.529991 kernel: scsi host1: ahci Jul 15 11:31:50.530073 kernel: scsi host2: ahci Jul 15 11:31:50.530159 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/vda6 scanned by (udev-worker) (448) Jul 15 11:31:50.530169 kernel: scsi host3: ahci Jul 15 11:31:50.530250 kernel: scsi host4: ahci Jul 15 11:31:50.530348 kernel: scsi host5: ahci Jul 15 11:31:50.530430 kernel: ata1: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040100 irq 31 Jul 15 11:31:50.530439 kernel: ata2: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040180 irq 31 Jul 15 11:31:50.530448 kernel: ata3: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040200 irq 31 Jul 15 11:31:50.530459 kernel: ata4: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040280 irq 31 Jul 15 11:31:50.530467 kernel: ata5: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040300 irq 31 Jul 15 11:31:50.530476 kernel: ata6: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040380 irq 31 Jul 15 11:31:50.498533 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Jul 15 11:31:50.519078 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Jul 15 11:31:50.523446 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Jul 15 11:31:50.539242 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 15 11:31:50.542960 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Jul 15 11:31:50.545426 systemd[1]: Starting disk-uuid.service... Jul 15 11:31:50.559879 disk-uuid[532]: Primary Header is updated. Jul 15 11:31:50.559879 disk-uuid[532]: Secondary Entries is updated. Jul 15 11:31:50.559879 disk-uuid[532]: Secondary Header is updated. Jul 15 11:31:50.563859 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 15 11:31:50.567863 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 15 11:31:50.838431 kernel: ata1: SATA link down (SStatus 0 SControl 300) Jul 15 11:31:50.838512 kernel: ata2: SATA link down (SStatus 0 SControl 300) Jul 15 11:31:50.838527 kernel: ata6: SATA link down (SStatus 0 SControl 300) Jul 15 11:31:50.838540 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) Jul 15 11:31:50.839866 kernel: ata5: SATA link down (SStatus 0 SControl 300) Jul 15 11:31:50.840870 kernel: ata4: SATA link down (SStatus 0 SControl 300) Jul 15 11:31:50.841873 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Jul 15 11:31:50.843188 kernel: ata3.00: applying bridge limits Jul 15 11:31:50.843970 kernel: ata3.00: configured for UDMA/100 Jul 15 11:31:50.844884 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Jul 15 11:31:50.878893 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Jul 15 11:31:50.895722 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Jul 15 11:31:50.895741 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Jul 15 11:31:51.567872 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 15 11:31:51.568324 disk-uuid[533]: The operation has completed successfully. Jul 15 11:31:51.589595 systemd[1]: disk-uuid.service: Deactivated successfully. Jul 15 11:31:51.589000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:51.589000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:51.589674 systemd[1]: Finished disk-uuid.service. Jul 15 11:31:51.597368 systemd[1]: Starting verity-setup.service... Jul 15 11:31:51.609866 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" Jul 15 11:31:51.628424 systemd[1]: Found device dev-mapper-usr.device. Jul 15 11:31:51.630641 systemd[1]: Mounting sysusr-usr.mount... Jul 15 11:31:51.632540 systemd[1]: Finished verity-setup.service. Jul 15 11:31:51.634000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:51.688852 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 15 11:31:51.689149 systemd[1]: Mounted sysusr-usr.mount. Jul 15 11:31:51.690051 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Jul 15 11:31:51.690660 systemd[1]: Starting ignition-setup.service... Jul 15 11:31:51.692016 systemd[1]: Starting parse-ip-for-networkd.service... Jul 15 11:31:51.701611 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Jul 15 11:31:51.701655 kernel: BTRFS info (device vda6): using free space tree Jul 15 11:31:51.701667 kernel: BTRFS info (device vda6): has skinny extents Jul 15 11:31:51.709318 systemd[1]: mnt-oem.mount: Deactivated successfully. Jul 15 11:31:51.718092 systemd[1]: Finished ignition-setup.service. Jul 15 11:31:51.719828 systemd[1]: Starting ignition-fetch-offline.service... Jul 15 11:31:51.718000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:51.757226 ignition[657]: Ignition 2.14.0 Jul 15 11:31:51.757241 ignition[657]: Stage: fetch-offline Jul 15 11:31:51.757341 ignition[657]: no configs at "/usr/lib/ignition/base.d" Jul 15 11:31:51.757353 ignition[657]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 15 11:31:51.757467 ignition[657]: parsed url from cmdline: "" Jul 15 11:31:51.757472 ignition[657]: no config URL provided Jul 15 11:31:51.757477 ignition[657]: reading system config file "/usr/lib/ignition/user.ign" Jul 15 11:31:51.757485 ignition[657]: no config at "/usr/lib/ignition/user.ign" Jul 15 11:31:51.757503 ignition[657]: op(1): [started] loading QEMU firmware config module Jul 15 11:31:51.757508 ignition[657]: op(1): executing: "modprobe" "qemu_fw_cfg" Jul 15 11:31:51.766996 systemd[1]: Finished parse-ip-for-networkd.service. Jul 15 11:31:51.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:51.767000 audit: BPF prog-id=9 op=LOAD Jul 15 11:31:51.768896 ignition[657]: op(1): [finished] loading QEMU firmware config module Jul 15 11:31:51.769072 systemd[1]: Starting systemd-networkd.service... Jul 15 11:31:51.771658 ignition[657]: parsing config with SHA512: 2cc3c83f2193f1bac8feaee6733f825175ec29c7342ec3b20e313acaf5c488e0e90c96f2c09360147b5a12a4a9782b25dbf6968eb1213602f775707a83288e37 Jul 15 11:31:51.775405 unknown[657]: fetched base config from "system" Jul 15 11:31:51.775739 unknown[657]: fetched user config from "qemu" Jul 15 11:31:51.776214 ignition[657]: fetch-offline: fetch-offline passed Jul 15 11:31:51.776286 ignition[657]: Ignition finished successfully Jul 15 11:31:51.779354 systemd[1]: Finished ignition-fetch-offline.service. Jul 15 11:31:51.780000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:51.792368 systemd-networkd[725]: lo: Link UP Jul 15 11:31:51.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:51.792377 systemd-networkd[725]: lo: Gained carrier Jul 15 11:31:51.792754 systemd-networkd[725]: Enumeration completed Jul 15 11:31:51.792867 systemd[1]: Started systemd-networkd.service. Jul 15 11:31:51.793017 systemd-networkd[725]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 15 11:31:51.794462 systemd-networkd[725]: eth0: Link UP Jul 15 11:31:51.794466 systemd-networkd[725]: eth0: Gained carrier Jul 15 11:31:51.794598 systemd[1]: Reached target network.target. Jul 15 11:31:51.801000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:51.795479 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Jul 15 11:31:51.806450 iscsid[731]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Jul 15 11:31:51.806450 iscsid[731]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Jul 15 11:31:51.806450 iscsid[731]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Jul 15 11:31:51.806450 iscsid[731]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Jul 15 11:31:51.806450 iscsid[731]: If using hardware iscsi like qla4xxx this message can be ignored. Jul 15 11:31:51.806450 iscsid[731]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Jul 15 11:31:51.806450 iscsid[731]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Jul 15 11:31:51.806000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:51.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:51.819000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:51.796215 systemd[1]: Starting ignition-kargs.service... Jul 15 11:31:51.810968 ignition[727]: Ignition 2.14.0 Jul 15 11:31:51.797580 systemd[1]: Starting iscsiuio.service... Jul 15 11:31:51.810975 ignition[727]: Stage: kargs Jul 15 11:31:51.801217 systemd[1]: Started iscsiuio.service. Jul 15 11:31:51.811080 ignition[727]: no configs at "/usr/lib/ignition/base.d" Jul 15 11:31:51.802714 systemd[1]: Starting iscsid.service... Jul 15 11:31:51.811091 ignition[727]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 15 11:31:51.806312 systemd[1]: Started iscsid.service. Jul 15 11:31:51.812056 ignition[727]: kargs: kargs passed Jul 15 11:31:51.807938 systemd[1]: Starting dracut-initqueue.service... Jul 15 11:31:51.812101 ignition[727]: Ignition finished successfully Jul 15 11:31:51.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:51.812542 systemd-networkd[725]: eth0: DHCPv4 address 10.0.0.87/16, gateway 10.0.0.1 acquired from 10.0.0.1 Jul 15 11:31:51.824048 ignition[745]: Ignition 2.14.0 Jul 15 11:31:51.813824 systemd[1]: Finished ignition-kargs.service. Jul 15 11:31:51.824054 ignition[745]: Stage: disks Jul 15 11:31:51.817629 systemd[1]: Starting ignition-disks.service... Jul 15 11:31:51.824139 ignition[745]: no configs at "/usr/lib/ignition/base.d" Jul 15 11:31:51.818792 systemd[1]: Finished dracut-initqueue.service. Jul 15 11:31:51.824147 ignition[745]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 15 11:31:51.820746 systemd[1]: Reached target remote-fs-pre.target. Jul 15 11:31:51.824744 ignition[745]: disks: disks passed Jul 15 11:31:51.822776 systemd[1]: Reached target remote-cryptsetup.target. Jul 15 11:31:51.824776 ignition[745]: Ignition finished successfully Jul 15 11:31:51.824941 systemd[1]: Reached target remote-fs.target. Jul 15 11:31:51.830454 systemd[1]: Starting dracut-pre-mount.service... Jul 15 11:31:51.835164 systemd[1]: Finished ignition-disks.service. Jul 15 11:31:51.836887 systemd[1]: Reached target initrd-root-device.target. Jul 15 11:31:51.839105 systemd[1]: Reached target local-fs-pre.target. Jul 15 11:31:51.840527 systemd[1]: Reached target local-fs.target. Jul 15 11:31:51.842031 systemd[1]: Reached target sysinit.target. Jul 15 11:31:51.843316 systemd[1]: Reached target basic.target. Jul 15 11:31:51.853356 systemd[1]: Finished dracut-pre-mount.service. Jul 15 11:31:51.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:51.858167 systemd[1]: Starting systemd-fsck-root.service... Jul 15 11:31:51.866878 systemd-fsck[758]: ROOT: clean, 619/553520 files, 56023/553472 blocks Jul 15 11:31:51.871363 systemd[1]: Finished systemd-fsck-root.service. Jul 15 11:31:51.871000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:51.874065 systemd[1]: Mounting sysroot.mount... Jul 15 11:31:51.880488 systemd[1]: Mounted sysroot.mount. Jul 15 11:31:51.881852 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Jul 15 11:31:51.881854 systemd[1]: Reached target initrd-root-fs.target. Jul 15 11:31:51.884118 systemd[1]: Mounting sysroot-usr.mount... Jul 15 11:31:51.885767 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Jul 15 11:31:51.885801 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Jul 15 11:31:51.885819 systemd[1]: Reached target ignition-diskful.target. Jul 15 11:31:51.890811 systemd[1]: Mounted sysroot-usr.mount. Jul 15 11:31:51.892749 systemd[1]: Starting initrd-setup-root.service... Jul 15 11:31:51.896416 initrd-setup-root[768]: cut: /sysroot/etc/passwd: No such file or directory Jul 15 11:31:51.900585 initrd-setup-root[776]: cut: /sysroot/etc/group: No such file or directory Jul 15 11:31:51.903146 initrd-setup-root[784]: cut: /sysroot/etc/shadow: No such file or directory Jul 15 11:31:51.906712 initrd-setup-root[792]: cut: /sysroot/etc/gshadow: No such file or directory Jul 15 11:31:51.933081 systemd[1]: Finished initrd-setup-root.service. Jul 15 11:31:51.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:51.935279 systemd[1]: Starting ignition-mount.service... Jul 15 11:31:51.937249 systemd[1]: Starting sysroot-boot.service... Jul 15 11:31:51.940551 bash[809]: umount: /sysroot/usr/share/oem: not mounted. Jul 15 11:31:51.947515 ignition[810]: INFO : Ignition 2.14.0 Jul 15 11:31:51.948535 ignition[810]: INFO : Stage: mount Jul 15 11:31:51.948535 ignition[810]: INFO : no configs at "/usr/lib/ignition/base.d" Jul 15 11:31:51.948535 ignition[810]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 15 11:31:51.951385 ignition[810]: INFO : mount: mount passed Jul 15 11:31:51.952139 ignition[810]: INFO : Ignition finished successfully Jul 15 11:31:51.952373 systemd[1]: Finished ignition-mount.service. Jul 15 11:31:51.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:51.958034 systemd[1]: Finished sysroot-boot.service. Jul 15 11:31:51.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:52.639633 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 15 11:31:52.646244 kernel: BTRFS: device label OEM devid 1 transid 10 /dev/vda6 scanned by mount (819) Jul 15 11:31:52.646269 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Jul 15 11:31:52.646291 kernel: BTRFS info (device vda6): using free space tree Jul 15 11:31:52.647012 kernel: BTRFS info (device vda6): has skinny extents Jul 15 11:31:52.650707 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 15 11:31:52.651638 systemd[1]: Starting ignition-files.service... Jul 15 11:31:52.664723 ignition[839]: INFO : Ignition 2.14.0 Jul 15 11:31:52.664723 ignition[839]: INFO : Stage: files Jul 15 11:31:52.666849 ignition[839]: INFO : no configs at "/usr/lib/ignition/base.d" Jul 15 11:31:52.666849 ignition[839]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 15 11:31:52.666849 ignition[839]: DEBUG : files: compiled without relabeling support, skipping Jul 15 11:31:52.666849 ignition[839]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Jul 15 11:31:52.666849 ignition[839]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Jul 15 11:31:52.674236 ignition[839]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Jul 15 11:31:52.674236 ignition[839]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Jul 15 11:31:52.674236 ignition[839]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Jul 15 11:31:52.674236 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Jul 15 11:31:52.674236 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Jul 15 11:31:52.674236 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Jul 15 11:31:52.674236 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Jul 15 11:31:52.674236 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Jul 15 11:31:52.674236 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Jul 15 11:31:52.674236 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Jul 15 11:31:52.674236 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://extensions.flatcar.org/extensions/kubernetes-v1.33.0-x86-64.raw: attempt #1 Jul 15 11:31:52.668933 unknown[839]: wrote ssh authorized keys file for user: core Jul 15 11:31:53.101816 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Jul 15 11:31:53.245959 systemd-networkd[725]: eth0: Gained IPv6LL Jul 15 11:31:53.605735 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Jul 15 11:31:53.605735 ignition[839]: INFO : files: op(7): [started] processing unit "coreos-metadata.service" Jul 15 11:31:53.610268 ignition[839]: INFO : files: op(7): op(8): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Jul 15 11:31:53.610268 ignition[839]: INFO : files: op(7): op(8): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Jul 15 11:31:53.610268 ignition[839]: INFO : files: op(7): [finished] processing unit "coreos-metadata.service" Jul 15 11:31:53.610268 ignition[839]: INFO : files: op(9): [started] setting preset to disabled for "coreos-metadata.service" Jul 15 11:31:53.610268 ignition[839]: INFO : files: op(9): op(a): [started] removing enablement symlink(s) for "coreos-metadata.service" Jul 15 11:31:53.629591 ignition[839]: INFO : files: op(9): op(a): [finished] removing enablement symlink(s) for "coreos-metadata.service" Jul 15 11:31:53.631191 ignition[839]: INFO : files: op(9): [finished] setting preset to disabled for "coreos-metadata.service" Jul 15 11:31:53.631191 ignition[839]: INFO : files: createResultFile: createFiles: op(b): [started] writing file "/sysroot/etc/.ignition-result.json" Jul 15 11:31:53.631191 ignition[839]: INFO : files: createResultFile: createFiles: op(b): [finished] writing file "/sysroot/etc/.ignition-result.json" Jul 15 11:31:53.631191 ignition[839]: INFO : files: files passed Jul 15 11:31:53.631191 ignition[839]: INFO : Ignition finished successfully Jul 15 11:31:53.631000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:53.638000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:53.638000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:53.639000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:53.630911 systemd[1]: Finished ignition-files.service. Jul 15 11:31:53.632673 systemd[1]: Starting initrd-setup-root-after-ignition.service... Jul 15 11:31:53.634233 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Jul 15 11:31:53.646990 initrd-setup-root-after-ignition[865]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Jul 15 11:31:53.634763 systemd[1]: Starting ignition-quench.service... Jul 15 11:31:53.649239 initrd-setup-root-after-ignition[867]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Jul 15 11:31:53.637666 systemd[1]: ignition-quench.service: Deactivated successfully. Jul 15 11:31:53.637730 systemd[1]: Finished ignition-quench.service. Jul 15 11:31:53.639448 systemd[1]: Finished initrd-setup-root-after-ignition.service. Jul 15 11:31:53.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:53.653000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:53.640721 systemd[1]: Reached target ignition-complete.target. Jul 15 11:31:53.642763 systemd[1]: Starting initrd-parse-etc.service... Jul 15 11:31:53.652426 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jul 15 11:31:53.652491 systemd[1]: Finished initrd-parse-etc.service. Jul 15 11:31:53.653388 systemd[1]: Reached target initrd-fs.target. Jul 15 11:31:53.655002 systemd[1]: Reached target initrd.target. Jul 15 11:31:53.655769 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Jul 15 11:31:53.656291 systemd[1]: Starting dracut-pre-pivot.service... Jul 15 11:31:53.664952 systemd[1]: Finished dracut-pre-pivot.service. Jul 15 11:31:53.664000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:53.666267 systemd[1]: Starting initrd-cleanup.service... Jul 15 11:31:53.672893 systemd[1]: Stopped target nss-lookup.target. Jul 15 11:31:53.673756 systemd[1]: Stopped target remote-cryptsetup.target. Jul 15 11:31:53.675307 systemd[1]: Stopped target timers.target. Jul 15 11:31:53.676823 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jul 15 11:31:53.677000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:53.676919 systemd[1]: Stopped dracut-pre-pivot.service. Jul 15 11:31:53.678368 systemd[1]: Stopped target initrd.target. Jul 15 11:31:53.679943 systemd[1]: Stopped target basic.target. Jul 15 11:31:53.681383 systemd[1]: Stopped target ignition-complete.target. Jul 15 11:31:53.682931 systemd[1]: Stopped target ignition-diskful.target. Jul 15 11:31:53.684403 systemd[1]: Stopped target initrd-root-device.target. Jul 15 11:31:53.686052 systemd[1]: Stopped target remote-fs.target. Jul 15 11:31:53.687604 systemd[1]: Stopped target remote-fs-pre.target. Jul 15 11:31:53.689230 systemd[1]: Stopped target sysinit.target. Jul 15 11:31:53.690686 systemd[1]: Stopped target local-fs.target. Jul 15 11:31:53.692169 systemd[1]: Stopped target local-fs-pre.target. Jul 15 11:31:53.693653 systemd[1]: Stopped target swap.target. Jul 15 11:31:53.695000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:53.695043 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jul 15 11:31:53.695125 systemd[1]: Stopped dracut-pre-mount.service. Jul 15 11:31:53.699000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:53.696719 systemd[1]: Stopped target cryptsetup.target. Jul 15 11:31:53.701000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:53.698134 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jul 15 11:31:53.698216 systemd[1]: Stopped dracut-initqueue.service. Jul 15 11:31:53.699913 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Jul 15 11:31:53.699994 systemd[1]: Stopped ignition-fetch-offline.service. Jul 15 11:31:53.701499 systemd[1]: Stopped target paths.target. Jul 15 11:31:53.702879 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jul 15 11:31:53.706875 systemd[1]: Stopped systemd-ask-password-console.path. Jul 15 11:31:53.707914 systemd[1]: Stopped target slices.target. Jul 15 11:31:53.709600 systemd[1]: Stopped target sockets.target. Jul 15 11:31:53.711153 systemd[1]: iscsid.socket: Deactivated successfully. Jul 15 11:31:53.711216 systemd[1]: Closed iscsid.socket. Jul 15 11:31:53.715000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:53.712498 systemd[1]: iscsiuio.socket: Deactivated successfully. Jul 15 11:31:53.716000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:53.712558 systemd[1]: Closed iscsiuio.socket. Jul 15 11:31:53.713868 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Jul 15 11:31:53.719000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:53.713977 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Jul 15 11:31:53.723935 ignition[880]: INFO : Ignition 2.14.0 Jul 15 11:31:53.723935 ignition[880]: INFO : Stage: umount Jul 15 11:31:53.723935 ignition[880]: INFO : no configs at "/usr/lib/ignition/base.d" Jul 15 11:31:53.723935 ignition[880]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 15 11:31:53.723000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:53.725000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:53.715581 systemd[1]: ignition-files.service: Deactivated successfully. Jul 15 11:31:53.729000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:53.731049 ignition[880]: INFO : umount: umount passed Jul 15 11:31:53.731049 ignition[880]: INFO : Ignition finished successfully Jul 15 11:31:53.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:53.731000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:53.734000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:53.715657 systemd[1]: Stopped ignition-files.service. Jul 15 11:31:53.734000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:53.734000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:53.739000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:53.717488 systemd[1]: Stopping ignition-mount.service... Jul 15 11:31:53.718346 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jul 15 11:31:53.718436 systemd[1]: Stopped kmod-static-nodes.service. Jul 15 11:31:53.742000 audit: BPF prog-id=6 op=UNLOAD Jul 15 11:31:53.742000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:53.720999 systemd[1]: Stopping sysroot-boot.service... Jul 15 11:31:53.721996 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jul 15 11:31:53.722125 systemd[1]: Stopped systemd-udev-trigger.service. Jul 15 11:31:53.724056 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jul 15 11:31:53.724182 systemd[1]: Stopped dracut-pre-trigger.service. Jul 15 11:31:53.749000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:53.727506 systemd[1]: ignition-mount.service: Deactivated successfully. Jul 15 11:31:53.750000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:53.727570 systemd[1]: Stopped ignition-mount.service. Jul 15 11:31:53.753000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:53.730130 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jul 15 11:31:53.730191 systemd[1]: Finished initrd-cleanup.service. Jul 15 11:31:53.731649 systemd[1]: Stopped target network.target. Jul 15 11:31:53.732605 systemd[1]: ignition-disks.service: Deactivated successfully. Jul 15 11:31:53.757000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:53.732640 systemd[1]: Stopped ignition-disks.service. Jul 15 11:31:53.734467 systemd[1]: ignition-kargs.service: Deactivated successfully. Jul 15 11:31:53.734498 systemd[1]: Stopped ignition-kargs.service. Jul 15 11:31:53.735149 systemd[1]: ignition-setup.service: Deactivated successfully. Jul 15 11:31:53.735177 systemd[1]: Stopped ignition-setup.service. Jul 15 11:31:53.735401 systemd[1]: Stopping systemd-networkd.service... Jul 15 11:31:53.735517 systemd[1]: Stopping systemd-resolved.service... Jul 15 11:31:53.736452 systemd[1]: sysroot-boot.mount: Deactivated successfully. Jul 15 11:31:53.737692 systemd[1]: systemd-resolved.service: Deactivated successfully. Jul 15 11:31:53.737762 systemd[1]: Stopped systemd-resolved.service. Jul 15 11:31:53.768000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:53.740871 systemd-networkd[725]: eth0: DHCPv6 lease lost Jul 15 11:31:53.768000 audit: BPF prog-id=9 op=UNLOAD Jul 15 11:31:53.741662 systemd[1]: systemd-networkd.service: Deactivated successfully. Jul 15 11:31:53.741749 systemd[1]: Stopped systemd-networkd.service. Jul 15 11:31:53.745052 systemd[1]: systemd-networkd.socket: Deactivated successfully. Jul 15 11:31:53.745077 systemd[1]: Closed systemd-networkd.socket. Jul 15 11:31:53.747226 systemd[1]: Stopping network-cleanup.service... Jul 15 11:31:53.748398 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Jul 15 11:31:53.748441 systemd[1]: Stopped parse-ip-for-networkd.service. Jul 15 11:31:53.750029 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jul 15 11:31:53.750060 systemd[1]: Stopped systemd-sysctl.service. Jul 15 11:31:53.751911 systemd[1]: systemd-modules-load.service: Deactivated successfully. Jul 15 11:31:53.751942 systemd[1]: Stopped systemd-modules-load.service. Jul 15 11:31:53.780000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:53.753538 systemd[1]: Stopping systemd-udevd.service... Jul 15 11:31:53.781000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:53.755877 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jul 15 11:31:53.757917 systemd[1]: network-cleanup.service: Deactivated successfully. Jul 15 11:31:53.757985 systemd[1]: Stopped network-cleanup.service. Jul 15 11:31:53.764088 systemd[1]: systemd-udevd.service: Deactivated successfully. Jul 15 11:31:53.765654 systemd[1]: Stopped systemd-udevd.service. Jul 15 11:31:53.772930 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jul 15 11:31:53.773639 systemd[1]: Closed systemd-udevd-control.socket. Jul 15 11:31:53.775477 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jul 15 11:31:53.776231 systemd[1]: Closed systemd-udevd-kernel.socket. Jul 15 11:31:53.777935 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jul 15 11:31:53.778607 systemd[1]: Stopped dracut-pre-udev.service. Jul 15 11:31:53.781128 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jul 15 11:31:53.781164 systemd[1]: Stopped dracut-cmdline.service. Jul 15 11:31:53.782667 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jul 15 11:31:53.782701 systemd[1]: Stopped dracut-cmdline-ask.service. Jul 15 11:31:53.793000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:53.795384 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Jul 15 11:31:53.797043 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jul 15 11:31:53.797084 systemd[1]: Stopped systemd-vconsole-setup.service. Jul 15 11:31:53.798000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:53.799899 systemd[1]: sysroot-boot.service: Deactivated successfully. Jul 15 11:31:53.800810 systemd[1]: Stopped sysroot-boot.service. Jul 15 11:31:53.802000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:53.802401 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jul 15 11:31:53.803448 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Jul 15 11:31:53.805000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:53.805000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:53.805345 systemd[1]: Reached target initrd-switch-root.target. Jul 15 11:31:53.807102 systemd[1]: initrd-setup-root.service: Deactivated successfully. Jul 15 11:31:53.807139 systemd[1]: Stopped initrd-setup-root.service. Jul 15 11:31:53.809000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:53.810080 systemd[1]: Starting initrd-switch-root.service... Jul 15 11:31:53.825710 systemd[1]: Switching root. Jul 15 11:31:53.844665 iscsid[731]: iscsid shutting down. Jul 15 11:31:53.845356 systemd-journald[197]: Received SIGTERM from PID 1 (systemd). Jul 15 11:31:53.845402 systemd-journald[197]: Journal stopped Jul 15 11:31:56.659923 kernel: SELinux: Class mctp_socket not defined in policy. Jul 15 11:31:56.659962 kernel: SELinux: Class anon_inode not defined in policy. Jul 15 11:31:56.659977 kernel: SELinux: the above unknown classes and permissions will be allowed Jul 15 11:31:56.659987 kernel: SELinux: policy capability network_peer_controls=1 Jul 15 11:31:56.659996 kernel: SELinux: policy capability open_perms=1 Jul 15 11:31:56.660008 kernel: SELinux: policy capability extended_socket_class=1 Jul 15 11:31:56.660018 kernel: SELinux: policy capability always_check_network=0 Jul 15 11:31:56.660027 kernel: SELinux: policy capability cgroup_seclabel=1 Jul 15 11:31:56.660037 kernel: SELinux: policy capability nnp_nosuid_transition=1 Jul 15 11:31:56.660046 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Jul 15 11:31:56.660055 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Jul 15 11:31:56.660067 systemd[1]: Successfully loaded SELinux policy in 37.074ms. Jul 15 11:31:56.660086 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.777ms. Jul 15 11:31:56.660097 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 15 11:31:56.660107 systemd[1]: Detected virtualization kvm. Jul 15 11:31:56.660117 systemd[1]: Detected architecture x86-64. Jul 15 11:31:56.660126 systemd[1]: Detected first boot. Jul 15 11:31:56.660137 systemd[1]: Initializing machine ID from VM UUID. Jul 15 11:31:56.660147 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Jul 15 11:31:56.660165 systemd[1]: Populated /etc with preset unit settings. Jul 15 11:31:56.660176 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 15 11:31:56.660186 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 15 11:31:56.660200 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 15 11:31:56.660211 kernel: kauditd_printk_skb: 80 callbacks suppressed Jul 15 11:31:56.660221 kernel: audit: type=1334 audit(1752579116.507:84): prog-id=12 op=LOAD Jul 15 11:31:56.660230 kernel: audit: type=1334 audit(1752579116.507:85): prog-id=3 op=UNLOAD Jul 15 11:31:56.660240 kernel: audit: type=1334 audit(1752579116.509:86): prog-id=13 op=LOAD Jul 15 11:31:56.660249 kernel: audit: type=1334 audit(1752579116.511:87): prog-id=14 op=LOAD Jul 15 11:31:56.660258 kernel: audit: type=1334 audit(1752579116.511:88): prog-id=4 op=UNLOAD Jul 15 11:31:56.660267 kernel: audit: type=1334 audit(1752579116.511:89): prog-id=5 op=UNLOAD Jul 15 11:31:56.660277 kernel: audit: type=1334 audit(1752579116.512:90): prog-id=15 op=LOAD Jul 15 11:31:56.660286 kernel: audit: type=1334 audit(1752579116.512:91): prog-id=12 op=UNLOAD Jul 15 11:31:56.660295 kernel: audit: type=1334 audit(1752579116.513:92): prog-id=16 op=LOAD Jul 15 11:31:56.660306 kernel: audit: type=1334 audit(1752579116.515:93): prog-id=17 op=LOAD Jul 15 11:31:56.660315 systemd[1]: iscsiuio.service: Deactivated successfully. Jul 15 11:31:56.660325 systemd[1]: Stopped iscsiuio.service. Jul 15 11:31:56.660335 systemd[1]: iscsid.service: Deactivated successfully. Jul 15 11:31:56.660344 systemd[1]: Stopped iscsid.service. Jul 15 11:31:56.660354 systemd[1]: initrd-switch-root.service: Deactivated successfully. Jul 15 11:31:56.660363 systemd[1]: Stopped initrd-switch-root.service. Jul 15 11:31:56.660374 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jul 15 11:31:56.660384 systemd[1]: Created slice system-addon\x2dconfig.slice. Jul 15 11:31:56.660394 systemd[1]: Created slice system-addon\x2drun.slice. Jul 15 11:31:56.660404 systemd[1]: Created slice system-getty.slice. Jul 15 11:31:56.660413 systemd[1]: Created slice system-modprobe.slice. Jul 15 11:31:56.660427 systemd[1]: Created slice system-serial\x2dgetty.slice. Jul 15 11:31:56.660441 systemd[1]: Created slice system-system\x2dcloudinit.slice. Jul 15 11:31:56.660460 systemd[1]: Created slice system-systemd\x2dfsck.slice. Jul 15 11:31:56.660482 systemd[1]: Created slice user.slice. Jul 15 11:31:56.660495 systemd[1]: Started systemd-ask-password-console.path. Jul 15 11:31:56.660505 systemd[1]: Started systemd-ask-password-wall.path. Jul 15 11:31:56.660515 systemd[1]: Set up automount boot.automount. Jul 15 11:31:56.660525 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Jul 15 11:31:56.660535 systemd[1]: Stopped target initrd-switch-root.target. Jul 15 11:31:56.660544 systemd[1]: Stopped target initrd-fs.target. Jul 15 11:31:56.660556 systemd[1]: Stopped target initrd-root-fs.target. Jul 15 11:31:56.660566 systemd[1]: Reached target integritysetup.target. Jul 15 11:31:56.660575 systemd[1]: Reached target remote-cryptsetup.target. Jul 15 11:31:56.660587 systemd[1]: Reached target remote-fs.target. Jul 15 11:31:56.660597 systemd[1]: Reached target slices.target. Jul 15 11:31:56.660607 systemd[1]: Reached target swap.target. Jul 15 11:31:56.660619 systemd[1]: Reached target torcx.target. Jul 15 11:31:56.660632 systemd[1]: Reached target veritysetup.target. Jul 15 11:31:56.660647 systemd[1]: Listening on systemd-coredump.socket. Jul 15 11:31:56.660660 systemd[1]: Listening on systemd-initctl.socket. Jul 15 11:31:56.660673 systemd[1]: Listening on systemd-networkd.socket. Jul 15 11:31:56.660685 systemd[1]: Listening on systemd-udevd-control.socket. Jul 15 11:31:56.660698 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 15 11:31:56.660710 systemd[1]: Listening on systemd-userdbd.socket. Jul 15 11:31:56.660724 systemd[1]: Mounting dev-hugepages.mount... Jul 15 11:31:56.660737 systemd[1]: Mounting dev-mqueue.mount... Jul 15 11:31:56.660749 systemd[1]: Mounting media.mount... Jul 15 11:31:56.660764 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 15 11:31:56.660778 systemd[1]: Mounting sys-kernel-debug.mount... Jul 15 11:31:56.660791 systemd[1]: Mounting sys-kernel-tracing.mount... Jul 15 11:31:56.660804 systemd[1]: Mounting tmp.mount... Jul 15 11:31:56.660817 systemd[1]: Starting flatcar-tmpfiles.service... Jul 15 11:31:56.660830 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 15 11:31:56.660860 systemd[1]: Starting kmod-static-nodes.service... Jul 15 11:31:56.660875 systemd[1]: Starting modprobe@configfs.service... Jul 15 11:31:56.660889 systemd[1]: Starting modprobe@dm_mod.service... Jul 15 11:31:56.660905 systemd[1]: Starting modprobe@drm.service... Jul 15 11:31:56.660919 systemd[1]: Starting modprobe@efi_pstore.service... Jul 15 11:31:56.660932 systemd[1]: Starting modprobe@fuse.service... Jul 15 11:31:56.660945 systemd[1]: Starting modprobe@loop.service... Jul 15 11:31:56.660960 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Jul 15 11:31:56.660973 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jul 15 11:31:56.660986 systemd[1]: Stopped systemd-fsck-root.service. Jul 15 11:31:56.660996 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Jul 15 11:31:56.661005 kernel: loop: module loaded Jul 15 11:31:56.661018 systemd[1]: Stopped systemd-fsck-usr.service. Jul 15 11:31:56.661031 kernel: fuse: init (API version 7.34) Jul 15 11:31:56.661045 systemd[1]: Stopped systemd-journald.service. Jul 15 11:31:56.661058 systemd[1]: Starting systemd-journald.service... Jul 15 11:31:56.661071 systemd[1]: Starting systemd-modules-load.service... Jul 15 11:31:56.661083 systemd[1]: Starting systemd-network-generator.service... Jul 15 11:31:56.661096 systemd[1]: Starting systemd-remount-fs.service... Jul 15 11:31:56.661106 systemd[1]: Starting systemd-udev-trigger.service... Jul 15 11:31:56.661115 systemd[1]: verity-setup.service: Deactivated successfully. Jul 15 11:31:56.661125 systemd[1]: Stopped verity-setup.service. Jul 15 11:31:56.661138 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 15 11:31:56.661149 systemd[1]: Mounted dev-hugepages.mount. Jul 15 11:31:56.661168 systemd[1]: Mounted dev-mqueue.mount. Jul 15 11:31:56.661178 systemd[1]: Mounted media.mount. Jul 15 11:31:56.661188 systemd[1]: Mounted sys-kernel-debug.mount. Jul 15 11:31:56.661200 systemd-journald[991]: Journal started Jul 15 11:31:56.661239 systemd-journald[991]: Runtime Journal (/run/log/journal/3e652486bc3b4363aeb036b5f90ca5e7) is 6.0M, max 48.4M, 42.4M free. Jul 15 11:31:53.901000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Jul 15 11:31:54.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 15 11:31:54.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 15 11:31:54.117000 audit: BPF prog-id=10 op=LOAD Jul 15 11:31:54.117000 audit: BPF prog-id=10 op=UNLOAD Jul 15 11:31:54.117000 audit: BPF prog-id=11 op=LOAD Jul 15 11:31:54.117000 audit: BPF prog-id=11 op=UNLOAD Jul 15 11:31:54.146000 audit[914]: AVC avc: denied { associate } for pid=914 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Jul 15 11:31:54.146000 audit[914]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001c58b4 a1=c000146de0 a2=c00014f040 a3=32 items=0 ppid=897 pid=914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:31:54.146000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 15 11:31:54.148000 audit[914]: AVC avc: denied { associate } for pid=914 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Jul 15 11:31:54.148000 audit[914]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001c5989 a2=1ed a3=0 items=2 ppid=897 pid=914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:31:54.148000 audit: CWD cwd="/" Jul 15 11:31:54.148000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:54.148000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:54.148000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 15 11:31:56.507000 audit: BPF prog-id=12 op=LOAD Jul 15 11:31:56.507000 audit: BPF prog-id=3 op=UNLOAD Jul 15 11:31:56.509000 audit: BPF prog-id=13 op=LOAD Jul 15 11:31:56.511000 audit: BPF prog-id=14 op=LOAD Jul 15 11:31:56.511000 audit: BPF prog-id=4 op=UNLOAD Jul 15 11:31:56.511000 audit: BPF prog-id=5 op=UNLOAD Jul 15 11:31:56.512000 audit: BPF prog-id=15 op=LOAD Jul 15 11:31:56.512000 audit: BPF prog-id=12 op=UNLOAD Jul 15 11:31:56.513000 audit: BPF prog-id=16 op=LOAD Jul 15 11:31:56.515000 audit: BPF prog-id=17 op=LOAD Jul 15 11:31:56.515000 audit: BPF prog-id=13 op=UNLOAD Jul 15 11:31:56.515000 audit: BPF prog-id=14 op=UNLOAD Jul 15 11:31:56.517000 audit: BPF prog-id=18 op=LOAD Jul 15 11:31:56.517000 audit: BPF prog-id=15 op=UNLOAD Jul 15 11:31:56.517000 audit: BPF prog-id=19 op=LOAD Jul 15 11:31:56.517000 audit: BPF prog-id=20 op=LOAD Jul 15 11:31:56.517000 audit: BPF prog-id=16 op=UNLOAD Jul 15 11:31:56.517000 audit: BPF prog-id=17 op=UNLOAD Jul 15 11:31:56.518000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:56.521000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:56.524000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:56.527000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:56.527000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:56.531000 audit: BPF prog-id=18 op=UNLOAD Jul 15 11:31:56.626000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:56.630000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:56.632000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:56.632000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:56.632000 audit: BPF prog-id=21 op=LOAD Jul 15 11:31:56.633000 audit: BPF prog-id=22 op=LOAD Jul 15 11:31:56.633000 audit: BPF prog-id=23 op=LOAD Jul 15 11:31:56.633000 audit: BPF prog-id=19 op=UNLOAD Jul 15 11:31:56.633000 audit: BPF prog-id=20 op=UNLOAD Jul 15 11:31:56.651000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:56.658000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jul 15 11:31:56.658000 audit[991]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffd0ff95290 a2=4000 a3=7ffd0ff9532c items=0 ppid=1 pid=991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:31:56.658000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Jul 15 11:31:56.506924 systemd[1]: Queued start job for default target multi-user.target. Jul 15 11:31:54.145800 /usr/lib/systemd/system-generators/torcx-generator[914]: time="2025-07-15T11:31:54Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" Jul 15 11:31:56.506934 systemd[1]: Unnecessary job was removed for dev-vda6.device. Jul 15 11:31:54.145994 /usr/lib/systemd/system-generators/torcx-generator[914]: time="2025-07-15T11:31:54Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 15 11:31:56.662864 systemd[1]: Started systemd-journald.service. Jul 15 11:31:56.519189 systemd[1]: systemd-journald.service: Deactivated successfully. Jul 15 11:31:54.146009 /usr/lib/systemd/system-generators/torcx-generator[914]: time="2025-07-15T11:31:54Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 15 11:31:54.146034 /usr/lib/systemd/system-generators/torcx-generator[914]: time="2025-07-15T11:31:54Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Jul 15 11:31:54.146043 /usr/lib/systemd/system-generators/torcx-generator[914]: time="2025-07-15T11:31:54Z" level=debug msg="skipped missing lower profile" missing profile=oem Jul 15 11:31:54.146068 /usr/lib/systemd/system-generators/torcx-generator[914]: time="2025-07-15T11:31:54Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Jul 15 11:31:54.146079 /usr/lib/systemd/system-generators/torcx-generator[914]: time="2025-07-15T11:31:54Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Jul 15 11:31:56.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:54.146274 /usr/lib/systemd/system-generators/torcx-generator[914]: time="2025-07-15T11:31:54Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Jul 15 11:31:54.146306 /usr/lib/systemd/system-generators/torcx-generator[914]: time="2025-07-15T11:31:54Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 15 11:31:54.146317 /usr/lib/systemd/system-generators/torcx-generator[914]: time="2025-07-15T11:31:54Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 15 11:31:56.663486 systemd[1]: Mounted sys-kernel-tracing.mount. Jul 15 11:31:54.146848 /usr/lib/systemd/system-generators/torcx-generator[914]: time="2025-07-15T11:31:54Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Jul 15 11:31:54.146879 /usr/lib/systemd/system-generators/torcx-generator[914]: time="2025-07-15T11:31:54Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Jul 15 11:31:54.146894 /usr/lib/systemd/system-generators/torcx-generator[914]: time="2025-07-15T11:31:54Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.100: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.100 Jul 15 11:31:54.146907 /usr/lib/systemd/system-generators/torcx-generator[914]: time="2025-07-15T11:31:54Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Jul 15 11:31:54.146920 /usr/lib/systemd/system-generators/torcx-generator[914]: time="2025-07-15T11:31:54Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.100: no such file or directory" path=/var/lib/torcx/store/3510.3.100 Jul 15 11:31:54.146932 /usr/lib/systemd/system-generators/torcx-generator[914]: time="2025-07-15T11:31:54Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Jul 15 11:31:56.222554 /usr/lib/systemd/system-generators/torcx-generator[914]: time="2025-07-15T11:31:56Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 15 11:31:56.222804 /usr/lib/systemd/system-generators/torcx-generator[914]: time="2025-07-15T11:31:56Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 15 11:31:56.222917 /usr/lib/systemd/system-generators/torcx-generator[914]: time="2025-07-15T11:31:56Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 15 11:31:56.223085 /usr/lib/systemd/system-generators/torcx-generator[914]: time="2025-07-15T11:31:56Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 15 11:31:56.223129 /usr/lib/systemd/system-generators/torcx-generator[914]: time="2025-07-15T11:31:56Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Jul 15 11:31:56.223201 /usr/lib/systemd/system-generators/torcx-generator[914]: time="2025-07-15T11:31:56Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Jul 15 11:31:56.664559 systemd[1]: Mounted tmp.mount. Jul 15 11:31:56.665463 systemd[1]: Finished flatcar-tmpfiles.service. Jul 15 11:31:56.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:56.666572 systemd[1]: Finished kmod-static-nodes.service. Jul 15 11:31:56.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:56.667671 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jul 15 11:31:56.667780 systemd[1]: Finished modprobe@configfs.service. Jul 15 11:31:56.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:56.667000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:56.668874 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 15 11:31:56.668998 systemd[1]: Finished modprobe@dm_mod.service. Jul 15 11:31:56.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:56.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:56.670038 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 15 11:31:56.670143 systemd[1]: Finished modprobe@drm.service. Jul 15 11:31:56.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:56.670000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:56.671166 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 15 11:31:56.671269 systemd[1]: Finished modprobe@efi_pstore.service. Jul 15 11:31:56.671000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:56.671000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:56.672360 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jul 15 11:31:56.672466 systemd[1]: Finished modprobe@fuse.service. Jul 15 11:31:56.672000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:56.672000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:56.673514 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 15 11:31:56.673622 systemd[1]: Finished modprobe@loop.service. Jul 15 11:31:56.673000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:56.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:56.674673 systemd[1]: Finished systemd-modules-load.service. Jul 15 11:31:56.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:56.675805 systemd[1]: Finished systemd-network-generator.service. Jul 15 11:31:56.675000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:56.676998 systemd[1]: Finished systemd-remount-fs.service. Jul 15 11:31:56.677000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:56.678267 systemd[1]: Reached target network-pre.target. Jul 15 11:31:56.680143 systemd[1]: Mounting sys-fs-fuse-connections.mount... Jul 15 11:31:56.681976 systemd[1]: Mounting sys-kernel-config.mount... Jul 15 11:31:56.682848 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Jul 15 11:31:56.684375 systemd[1]: Starting systemd-hwdb-update.service... Jul 15 11:31:56.686430 systemd[1]: Starting systemd-journal-flush.service... Jul 15 11:31:56.687469 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 15 11:31:56.688640 systemd[1]: Starting systemd-random-seed.service... Jul 15 11:31:56.689633 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 15 11:31:56.690700 systemd-journald[991]: Time spent on flushing to /var/log/journal/3e652486bc3b4363aeb036b5f90ca5e7 is 20.820ms for 1149 entries. Jul 15 11:31:56.690700 systemd-journald[991]: System Journal (/var/log/journal/3e652486bc3b4363aeb036b5f90ca5e7) is 8.0M, max 195.6M, 187.6M free. Jul 15 11:31:56.754634 systemd-journald[991]: Received client request to flush runtime journal. Jul 15 11:31:56.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:56.727000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:56.737000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:56.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:56.690930 systemd[1]: Starting systemd-sysctl.service... Jul 15 11:31:56.694150 systemd[1]: Starting systemd-sysusers.service... Jul 15 11:31:56.698992 systemd[1]: Mounted sys-fs-fuse-connections.mount. Jul 15 11:31:56.700063 systemd[1]: Mounted sys-kernel-config.mount. Jul 15 11:31:56.756055 udevadm[1017]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Jul 15 11:31:56.701199 systemd[1]: Finished systemd-random-seed.service. Jul 15 11:31:56.708405 systemd[1]: Finished systemd-udev-trigger.service. Jul 15 11:31:56.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:56.728166 systemd[1]: Reached target first-boot-complete.target. Jul 15 11:31:56.730222 systemd[1]: Starting systemd-udev-settle.service... Jul 15 11:31:56.737294 systemd[1]: Finished systemd-sysusers.service. Jul 15 11:31:56.739268 systemd[1]: Finished systemd-sysctl.service. Jul 15 11:31:56.755319 systemd[1]: Finished systemd-journal-flush.service. Jul 15 11:31:57.204178 systemd[1]: Finished systemd-hwdb-update.service. Jul 15 11:31:57.204000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:57.204000 audit: BPF prog-id=24 op=LOAD Jul 15 11:31:57.204000 audit: BPF prog-id=25 op=LOAD Jul 15 11:31:57.204000 audit: BPF prog-id=7 op=UNLOAD Jul 15 11:31:57.204000 audit: BPF prog-id=8 op=UNLOAD Jul 15 11:31:57.206269 systemd[1]: Starting systemd-udevd.service... Jul 15 11:31:57.222374 systemd-udevd[1020]: Using default interface naming scheme 'v252'. Jul 15 11:31:57.237859 systemd[1]: Started systemd-udevd.service. Jul 15 11:31:57.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:57.238000 audit: BPF prog-id=26 op=LOAD Jul 15 11:31:57.240268 systemd[1]: Starting systemd-networkd.service... Jul 15 11:31:57.244000 audit: BPF prog-id=27 op=LOAD Jul 15 11:31:57.244000 audit: BPF prog-id=28 op=LOAD Jul 15 11:31:57.244000 audit: BPF prog-id=29 op=LOAD Jul 15 11:31:57.245734 systemd[1]: Starting systemd-userdbd.service... Jul 15 11:31:57.276502 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Jul 15 11:31:57.278817 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 15 11:31:57.287713 systemd[1]: Started systemd-userdbd.service. Jul 15 11:31:57.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:57.306876 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Jul 15 11:31:57.311868 kernel: ACPI: button: Power Button [PWRF] Jul 15 11:31:57.325000 audit[1023]: AVC avc: denied { confidentiality } for pid=1023 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Jul 15 11:31:57.325000 audit[1023]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=564deec57a80 a1=338ac a2=7f71c799bbc5 a3=5 items=110 ppid=1020 pid=1023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:31:57.325000 audit: CWD cwd="/" Jul 15 11:31:57.325000 audit: PATH item=0 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=1 name=(null) inode=14548 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=2 name=(null) inode=14548 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=3 name=(null) inode=14549 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=4 name=(null) inode=14548 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=5 name=(null) inode=14550 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=6 name=(null) inode=14548 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=7 name=(null) inode=14551 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=8 name=(null) inode=14551 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=9 name=(null) inode=14552 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=10 name=(null) inode=14551 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=11 name=(null) inode=14553 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=12 name=(null) inode=14551 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=13 name=(null) inode=14554 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=14 name=(null) inode=14551 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=15 name=(null) inode=14555 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=16 name=(null) inode=14551 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=17 name=(null) inode=14556 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=18 name=(null) inode=14548 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=19 name=(null) inode=14557 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=20 name=(null) inode=14557 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=21 name=(null) inode=14558 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=22 name=(null) inode=14557 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=23 name=(null) inode=14559 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=24 name=(null) inode=14557 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=25 name=(null) inode=14560 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=26 name=(null) inode=14557 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=27 name=(null) inode=14561 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=28 name=(null) inode=14557 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=29 name=(null) inode=14562 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=30 name=(null) inode=14548 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=31 name=(null) inode=14563 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=32 name=(null) inode=14563 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=33 name=(null) inode=14564 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=34 name=(null) inode=14563 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=35 name=(null) inode=14565 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=36 name=(null) inode=14563 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=37 name=(null) inode=14566 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=38 name=(null) inode=14563 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=39 name=(null) inode=14567 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=40 name=(null) inode=14563 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=41 name=(null) inode=14568 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=42 name=(null) inode=14548 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=43 name=(null) inode=14569 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=44 name=(null) inode=14569 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=45 name=(null) inode=14570 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=46 name=(null) inode=14569 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=47 name=(null) inode=14571 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=48 name=(null) inode=14569 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=49 name=(null) inode=14572 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=50 name=(null) inode=14569 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=51 name=(null) inode=14573 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=52 name=(null) inode=14569 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=53 name=(null) inode=14574 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=54 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=55 name=(null) inode=14575 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=56 name=(null) inode=14575 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=57 name=(null) inode=14576 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=58 name=(null) inode=14575 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=59 name=(null) inode=14577 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=60 name=(null) inode=14575 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=61 name=(null) inode=14578 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=62 name=(null) inode=14578 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=63 name=(null) inode=14579 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=64 name=(null) inode=14578 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=65 name=(null) inode=14580 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=66 name=(null) inode=14578 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=67 name=(null) inode=14581 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=68 name=(null) inode=14578 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=69 name=(null) inode=14582 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=70 name=(null) inode=14578 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=71 name=(null) inode=14583 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=72 name=(null) inode=14575 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=73 name=(null) inode=14584 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=74 name=(null) inode=14584 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=75 name=(null) inode=14585 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=76 name=(null) inode=14584 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=77 name=(null) inode=14586 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=78 name=(null) inode=14584 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=79 name=(null) inode=14587 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=80 name=(null) inode=14584 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=81 name=(null) inode=14588 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=82 name=(null) inode=14584 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=83 name=(null) inode=14589 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=84 name=(null) inode=14575 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=85 name=(null) inode=14590 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=86 name=(null) inode=14590 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=87 name=(null) inode=14591 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=88 name=(null) inode=14590 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=89 name=(null) inode=14592 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=90 name=(null) inode=14590 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=91 name=(null) inode=14593 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=92 name=(null) inode=14590 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=93 name=(null) inode=14594 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=94 name=(null) inode=14590 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:57.325000 audit: PATH item=95 name=(null) inode=14595 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=96 name=(null) inode=14575 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=97 name=(null) inode=14596 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=98 name=(null) inode=14596 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=99 name=(null) inode=14597 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=100 name=(null) inode=14596 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=101 name=(null) inode=14598 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=102 name=(null) inode=14596 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=103 name=(null) inode=14599 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=104 name=(null) inode=14596 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=105 name=(null) inode=14600 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=106 name=(null) inode=14596 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=107 name=(null) inode=14601 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PATH item=109 name=(null) inode=14602 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:31:57.325000 audit: PROCTITLE proctitle="(udev-worker)" Jul 15 11:31:57.335160 systemd-networkd[1028]: lo: Link UP Jul 15 11:31:57.335167 systemd-networkd[1028]: lo: Gained carrier Jul 15 11:31:57.335495 systemd-networkd[1028]: Enumeration completed Jul 15 11:31:57.335582 systemd-networkd[1028]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 15 11:31:57.335594 systemd[1]: Started systemd-networkd.service. Jul 15 11:31:57.339208 systemd-networkd[1028]: eth0: Link UP Jul 15 11:31:57.339211 systemd-networkd[1028]: eth0: Gained carrier Jul 15 11:31:57.353887 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Jul 15 11:31:57.354100 systemd-networkd[1028]: eth0: DHCPv4 address 10.0.0.87/16, gateway 10.0.0.1 acquired from 10.0.0.1 Jul 15 11:31:57.360414 kernel: i801_smbus 0000:00:1f.3: Enabling SMBus device Jul 15 11:31:57.362703 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Jul 15 11:31:57.362813 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Jul 15 11:31:57.362967 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Jul 15 11:31:57.368862 kernel: mousedev: PS/2 mouse device common for all mice Jul 15 11:31:57.476121 kernel: kvm: Nested Virtualization enabled Jul 15 11:31:57.476282 kernel: SVM: kvm: Nested Paging enabled Jul 15 11:31:57.476298 kernel: SVM: Virtual VMLOAD VMSAVE supported Jul 15 11:31:57.476310 kernel: SVM: Virtual GIF supported Jul 15 11:31:57.489876 kernel: EDAC MC: Ver: 3.0.0 Jul 15 11:31:57.516192 systemd[1]: Finished systemd-udev-settle.service. Jul 15 11:31:57.516000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:57.518019 systemd[1]: Starting lvm2-activation-early.service... Jul 15 11:31:57.525275 lvm[1056]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 15 11:31:57.550581 systemd[1]: Finished lvm2-activation-early.service. Jul 15 11:31:57.550000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:57.551593 systemd[1]: Reached target cryptsetup.target. Jul 15 11:31:57.553280 systemd[1]: Starting lvm2-activation.service... Jul 15 11:31:57.557119 lvm[1057]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 15 11:31:57.583631 systemd[1]: Finished lvm2-activation.service. Jul 15 11:31:57.583000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:57.584589 systemd[1]: Reached target local-fs-pre.target. Jul 15 11:31:57.585509 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Jul 15 11:31:57.585541 systemd[1]: Reached target local-fs.target. Jul 15 11:31:57.586374 systemd[1]: Reached target machines.target. Jul 15 11:31:57.588426 systemd[1]: Starting ldconfig.service... Jul 15 11:31:57.589427 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 15 11:31:57.589485 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 15 11:31:57.590344 systemd[1]: Starting systemd-boot-update.service... Jul 15 11:31:57.592009 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Jul 15 11:31:57.594073 systemd[1]: Starting systemd-machine-id-commit.service... Jul 15 11:31:57.596155 systemd[1]: Starting systemd-sysext.service... Jul 15 11:31:57.598224 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1059 (bootctl) Jul 15 11:31:57.599273 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Jul 15 11:31:57.605582 systemd[1]: Unmounting usr-share-oem.mount... Jul 15 11:31:57.607285 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Jul 15 11:31:57.607000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:57.609876 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 15 11:31:57.610055 systemd[1]: Unmounted usr-share-oem.mount. Jul 15 11:31:57.622866 kernel: loop0: detected capacity change from 0 to 229808 Jul 15 11:31:57.648002 systemd-fsck[1067]: fsck.fat 4.2 (2021-01-31) Jul 15 11:31:57.648002 systemd-fsck[1067]: /dev/vda1: 791 files, 120745/258078 clusters Jul 15 11:31:57.649407 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Jul 15 11:31:57.649000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:57.652200 systemd[1]: Mounting boot.mount... Jul 15 11:31:57.882440 systemd[1]: Mounted boot.mount. Jul 15 11:31:57.892620 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Jul 15 11:31:57.894011 systemd[1]: Finished systemd-machine-id-commit.service. Jul 15 11:31:57.895873 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Jul 15 11:31:57.895000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:57.897921 systemd[1]: Finished systemd-boot-update.service. Jul 15 11:31:57.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:57.912867 kernel: loop1: detected capacity change from 0 to 229808 Jul 15 11:31:57.917405 (sd-sysext)[1073]: Using extensions 'kubernetes'. Jul 15 11:31:57.917770 (sd-sysext)[1073]: Merged extensions into '/usr'. Jul 15 11:31:57.933867 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 15 11:31:57.935557 systemd[1]: Mounting usr-share-oem.mount... Jul 15 11:31:57.936789 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 15 11:31:57.938279 systemd[1]: Starting modprobe@dm_mod.service... Jul 15 11:31:57.940585 systemd[1]: Starting modprobe@efi_pstore.service... Jul 15 11:31:57.943606 systemd[1]: Starting modprobe@loop.service... Jul 15 11:31:57.945919 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 15 11:31:57.946050 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 15 11:31:57.946181 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 15 11:31:57.949343 systemd[1]: Mounted usr-share-oem.mount. Jul 15 11:31:57.950475 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 15 11:31:57.950603 systemd[1]: Finished modprobe@dm_mod.service. Jul 15 11:31:57.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:57.950000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:57.951774 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 15 11:31:57.951913 systemd[1]: Finished modprobe@efi_pstore.service. Jul 15 11:31:57.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:57.952000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:57.953273 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 15 11:31:57.953387 systemd[1]: Finished modprobe@loop.service. Jul 15 11:31:57.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:57.953000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:57.954621 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 15 11:31:57.954716 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 15 11:31:57.955648 systemd[1]: Finished systemd-sysext.service. Jul 15 11:31:57.955000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:57.957803 systemd[1]: Starting ensure-sysext.service... Jul 15 11:31:57.959803 systemd[1]: Starting systemd-tmpfiles-setup.service... Jul 15 11:31:57.969298 systemd[1]: Reloading. Jul 15 11:31:57.989283 ldconfig[1058]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Jul 15 11:31:58.096959 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2025-07-15T11:31:58Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" Jul 15 11:31:58.096983 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2025-07-15T11:31:58Z" level=info msg="torcx already run" Jul 15 11:31:58.168303 systemd-tmpfiles[1080]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Jul 15 11:31:58.170108 systemd-tmpfiles[1080]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Jul 15 11:31:58.172560 systemd-tmpfiles[1080]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Jul 15 11:31:58.239594 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 15 11:31:58.239616 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 15 11:31:58.260848 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 15 11:31:58.321000 audit: BPF prog-id=30 op=LOAD Jul 15 11:31:58.321000 audit: BPF prog-id=26 op=UNLOAD Jul 15 11:31:58.322000 audit: BPF prog-id=31 op=LOAD Jul 15 11:31:58.322000 audit: BPF prog-id=21 op=UNLOAD Jul 15 11:31:58.322000 audit: BPF prog-id=32 op=LOAD Jul 15 11:31:58.322000 audit: BPF prog-id=33 op=LOAD Jul 15 11:31:58.322000 audit: BPF prog-id=22 op=UNLOAD Jul 15 11:31:58.322000 audit: BPF prog-id=23 op=UNLOAD Jul 15 11:31:58.323000 audit: BPF prog-id=34 op=LOAD Jul 15 11:31:58.323000 audit: BPF prog-id=35 op=LOAD Jul 15 11:31:58.323000 audit: BPF prog-id=24 op=UNLOAD Jul 15 11:31:58.323000 audit: BPF prog-id=25 op=UNLOAD Jul 15 11:31:58.325000 audit: BPF prog-id=36 op=LOAD Jul 15 11:31:58.325000 audit: BPF prog-id=27 op=UNLOAD Jul 15 11:31:58.325000 audit: BPF prog-id=37 op=LOAD Jul 15 11:31:58.325000 audit: BPF prog-id=38 op=LOAD Jul 15 11:31:58.325000 audit: BPF prog-id=28 op=UNLOAD Jul 15 11:31:58.325000 audit: BPF prog-id=29 op=UNLOAD Jul 15 11:31:58.328197 systemd[1]: Finished ldconfig.service. Jul 15 11:31:58.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:58.330017 systemd[1]: Finished systemd-tmpfiles-setup.service. Jul 15 11:31:58.330000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:58.333490 systemd[1]: Starting audit-rules.service... Jul 15 11:31:58.335067 systemd[1]: Starting clean-ca-certificates.service... Jul 15 11:31:58.336757 systemd[1]: Starting systemd-journal-catalog-update.service... Jul 15 11:31:58.337000 audit: BPF prog-id=39 op=LOAD Jul 15 11:31:58.339076 systemd[1]: Starting systemd-resolved.service... Jul 15 11:31:58.339000 audit: BPF prog-id=40 op=LOAD Jul 15 11:31:58.341264 systemd[1]: Starting systemd-timesyncd.service... Jul 15 11:31:58.344001 systemd[1]: Starting systemd-update-utmp.service... Jul 15 11:31:58.347000 audit[1153]: SYSTEM_BOOT pid=1153 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jul 15 11:31:58.348977 systemd[1]: Finished clean-ca-certificates.service. Jul 15 11:31:58.349000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:58.354276 systemd[1]: Finished systemd-journal-catalog-update.service. Jul 15 11:31:58.354000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:58.355827 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 15 11:31:58.356056 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 15 11:31:58.357248 systemd[1]: Starting modprobe@dm_mod.service... Jul 15 11:31:58.359027 systemd[1]: Starting modprobe@efi_pstore.service... Jul 15 11:31:58.361145 systemd[1]: Starting modprobe@loop.service... Jul 15 11:31:58.361906 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 15 11:31:58.362029 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 15 11:31:58.363180 systemd[1]: Starting systemd-update-done.service... Jul 15 11:31:58.364132 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 15 11:31:58.364233 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 15 11:31:58.365379 systemd[1]: Finished systemd-update-utmp.service. Jul 15 11:31:58.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:58.366979 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 15 11:31:58.367086 systemd[1]: Finished modprobe@dm_mod.service. Jul 15 11:31:58.367000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:58.367000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:58.368695 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 15 11:31:58.368804 systemd[1]: Finished modprobe@efi_pstore.service. Jul 15 11:31:58.368000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:58.368000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:58.370126 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 15 11:31:58.370231 systemd[1]: Finished modprobe@loop.service. Jul 15 11:31:58.370000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:58.370000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:58.380000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:58.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:58.385000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:58.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:58.385000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:58.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:58.385000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:58.373004 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 15 11:31:58.373097 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 15 11:31:58.374529 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 15 11:31:58.374701 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 15 11:31:58.376051 systemd[1]: Starting modprobe@dm_mod.service... Jul 15 11:31:58.380149 systemd[1]: Starting modprobe@efi_pstore.service... Jul 15 11:31:58.382420 systemd[1]: Starting modprobe@loop.service... Jul 15 11:31:58.383279 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 15 11:31:58.383387 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 15 11:31:58.383471 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 15 11:31:58.383548 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 15 11:31:58.384672 systemd[1]: Finished systemd-update-done.service. Jul 15 11:31:58.386135 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 15 11:31:58.386236 systemd[1]: Finished modprobe@dm_mod.service. Jul 15 11:31:58.387526 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 15 11:31:58.387616 systemd[1]: Finished modprobe@efi_pstore.service. Jul 15 11:31:58.388868 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 15 11:31:58.388967 systemd[1]: Finished modprobe@loop.service. Jul 15 11:31:58.390343 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 15 11:31:58.390423 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 15 11:31:58.392885 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 15 11:31:58.393153 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 15 11:31:58.394882 systemd[1]: Starting modprobe@dm_mod.service... Jul 15 11:31:58.396579 systemd[1]: Starting modprobe@drm.service... Jul 15 11:31:58.398813 systemd[1]: Starting modprobe@efi_pstore.service... Jul 15 11:31:58.401270 systemd[1]: Starting modprobe@loop.service... Jul 15 11:31:58.402459 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 15 11:31:58.402573 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 15 11:31:58.403943 systemd[1]: Starting systemd-networkd-wait-online.service... Jul 15 11:31:58.405175 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 15 11:31:58.405400 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 15 11:31:58.406564 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 15 11:31:58.406753 systemd[1]: Finished modprobe@dm_mod.service. Jul 15 11:31:58.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:58.407000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:58.408407 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 15 11:31:58.408565 systemd[1]: Finished modprobe@drm.service. Jul 15 11:31:58.409000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:58.409000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:58.410402 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 15 11:31:58.410551 systemd[1]: Finished modprobe@efi_pstore.service. Jul 15 11:31:58.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:58.410000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:31:58.412049 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 15 11:31:58.412156 systemd[1]: Finished modprobe@loop.service. Jul 15 11:31:58.412569 augenrules[1174]: No rules Jul 15 11:31:58.411000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jul 15 11:31:58.411000 audit[1174]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdf37261e0 a2=420 a3=0 items=0 ppid=1142 pid=1174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:31:58.411000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Jul 15 11:31:58.413360 systemd[1]: Finished audit-rules.service. Jul 15 11:31:58.414807 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 15 11:31:58.414907 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 15 11:31:58.415955 systemd[1]: Finished ensure-sysext.service. Jul 15 11:31:58.423053 systemd-resolved[1146]: Positive Trust Anchors: Jul 15 11:31:58.423064 systemd-resolved[1146]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 15 11:31:58.423092 systemd-resolved[1146]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 15 11:31:58.431037 systemd[1]: Started systemd-timesyncd.service. Jul 15 11:31:58.431077 systemd-resolved[1146]: Defaulting to hostname 'linux'. Jul 15 11:31:58.432069 systemd[1]: Reached target time-set.target. Jul 15 11:31:58.433067 systemd-timesyncd[1147]: Contacted time server 10.0.0.1:123 (10.0.0.1). Jul 15 11:31:58.433088 systemd[1]: Started systemd-resolved.service. Jul 15 11:31:58.433118 systemd-timesyncd[1147]: Initial clock synchronization to Tue 2025-07-15 11:31:58.789196 UTC. Jul 15 11:31:58.433990 systemd[1]: Reached target network.target. Jul 15 11:31:58.434773 systemd[1]: Reached target nss-lookup.target. Jul 15 11:31:58.435623 systemd[1]: Reached target sysinit.target. Jul 15 11:31:58.436490 systemd[1]: Started motdgen.path. Jul 15 11:31:58.437333 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Jul 15 11:31:58.438572 systemd[1]: Started logrotate.timer. Jul 15 11:31:58.439381 systemd[1]: Started mdadm.timer. Jul 15 11:31:58.440118 systemd[1]: Started systemd-tmpfiles-clean.timer. Jul 15 11:31:58.441002 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 15 11:31:58.441025 systemd[1]: Reached target paths.target. Jul 15 11:31:58.441797 systemd[1]: Reached target timers.target. Jul 15 11:31:58.442833 systemd[1]: Listening on dbus.socket. Jul 15 11:31:58.444445 systemd[1]: Starting docker.socket... Jul 15 11:31:58.447135 systemd[1]: Listening on sshd.socket. Jul 15 11:31:58.447981 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 15 11:31:58.448293 systemd[1]: Listening on docker.socket. Jul 15 11:31:58.449149 systemd[1]: Reached target sockets.target. Jul 15 11:31:58.449984 systemd[1]: Reached target basic.target. Jul 15 11:31:58.450792 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 15 11:31:58.450813 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 15 11:31:58.451778 systemd[1]: Starting containerd.service... Jul 15 11:31:58.453619 systemd[1]: Starting dbus.service... Jul 15 11:31:58.455262 systemd[1]: Starting enable-oem-cloudinit.service... Jul 15 11:31:58.457136 systemd[1]: Starting extend-filesystems.service... Jul 15 11:31:58.458125 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Jul 15 11:31:58.459057 systemd[1]: Starting motdgen.service... Jul 15 11:31:58.460828 systemd[1]: Starting ssh-key-proc-cmdline.service... Jul 15 11:31:58.461551 jq[1184]: false Jul 15 11:31:58.464464 systemd[1]: Starting sshd-keygen.service... Jul 15 11:31:58.467671 systemd[1]: Starting systemd-logind.service... Jul 15 11:31:58.468514 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 15 11:31:58.468615 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Jul 15 11:31:58.469232 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Jul 15 11:31:58.469924 systemd[1]: Starting update-engine.service... Jul 15 11:31:58.472709 systemd[1]: Starting update-ssh-keys-after-ignition.service... Jul 15 11:31:58.475421 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 15 11:31:58.475556 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Jul 15 11:31:58.475924 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 15 11:31:58.476048 systemd[1]: Finished ssh-key-proc-cmdline.service. Jul 15 11:31:58.480676 jq[1201]: true Jul 15 11:31:58.480910 extend-filesystems[1185]: Found loop1 Jul 15 11:31:58.480910 extend-filesystems[1185]: Found sr0 Jul 15 11:31:58.480910 extend-filesystems[1185]: Found vda Jul 15 11:31:58.480910 extend-filesystems[1185]: Found vda1 Jul 15 11:31:58.480910 extend-filesystems[1185]: Found vda2 Jul 15 11:31:58.480910 extend-filesystems[1185]: Found vda3 Jul 15 11:31:58.480910 extend-filesystems[1185]: Found usr Jul 15 11:31:58.480910 extend-filesystems[1185]: Found vda4 Jul 15 11:31:58.480910 extend-filesystems[1185]: Found vda6 Jul 15 11:31:58.480910 extend-filesystems[1185]: Found vda7 Jul 15 11:31:58.480910 extend-filesystems[1185]: Found vda9 Jul 15 11:31:58.480910 extend-filesystems[1185]: Checking size of /dev/vda9 Jul 15 11:31:58.491344 dbus-daemon[1183]: [system] SELinux support is enabled Jul 15 11:31:58.487611 systemd[1]: motdgen.service: Deactivated successfully. Jul 15 11:31:58.498670 jq[1204]: true Jul 15 11:31:58.487735 systemd[1]: Finished motdgen.service. Jul 15 11:31:58.492236 systemd[1]: Started dbus.service. Jul 15 11:31:58.499436 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Jul 15 11:31:58.499461 systemd[1]: Reached target system-config.target. Jul 15 11:31:58.500746 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Jul 15 11:31:58.500764 systemd[1]: Reached target user-config.target. Jul 15 11:31:58.518347 bash[1223]: Updated "/home/core/.ssh/authorized_keys" Jul 15 11:31:58.519310 systemd[1]: Finished update-ssh-keys-after-ignition.service. Jul 15 11:31:58.522303 update_engine[1198]: I0715 11:31:58.522161 1198 main.cc:92] Flatcar Update Engine starting Jul 15 11:31:58.525862 update_engine[1198]: I0715 11:31:58.525480 1198 update_check_scheduler.cc:74] Next update check in 9m55s Jul 15 11:31:58.529178 systemd[1]: Started update-engine.service. Jul 15 11:31:58.529761 env[1205]: time="2025-07-15T11:31:58.529153408Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Jul 15 11:31:58.532405 systemd[1]: Started locksmithd.service. Jul 15 11:31:58.534891 extend-filesystems[1185]: Resized partition /dev/vda9 Jul 15 11:31:58.537203 extend-filesystems[1234]: resize2fs 1.46.5 (30-Dec-2021) Jul 15 11:31:58.540057 systemd-logind[1195]: Watching system buttons on /dev/input/event1 (Power Button) Jul 15 11:31:58.540079 systemd-logind[1195]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Jul 15 11:31:58.541027 systemd-logind[1195]: New seat seat0. Jul 15 11:31:58.547863 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Jul 15 11:31:58.555005 systemd[1]: Started systemd-logind.service. Jul 15 11:31:58.560982 env[1205]: time="2025-07-15T11:31:58.560944935Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Jul 15 11:31:58.561452 env[1205]: time="2025-07-15T11:31:58.561433161Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Jul 15 11:31:58.562916 env[1205]: time="2025-07-15T11:31:58.562753626Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.188-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Jul 15 11:31:58.562916 env[1205]: time="2025-07-15T11:31:58.562797859Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Jul 15 11:31:58.563122 env[1205]: time="2025-07-15T11:31:58.563057566Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 15 11:31:58.563122 env[1205]: time="2025-07-15T11:31:58.563078225Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Jul 15 11:31:58.563122 env[1205]: time="2025-07-15T11:31:58.563091720Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Jul 15 11:31:58.563122 env[1205]: time="2025-07-15T11:31:58.563112509Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Jul 15 11:31:58.563246 env[1205]: time="2025-07-15T11:31:58.563190966Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Jul 15 11:31:58.564778 env[1205]: time="2025-07-15T11:31:58.563417020Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Jul 15 11:31:58.564778 env[1205]: time="2025-07-15T11:31:58.563530112Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 15 11:31:58.564778 env[1205]: time="2025-07-15T11:31:58.563543066Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Jul 15 11:31:58.564778 env[1205]: time="2025-07-15T11:31:58.563591276Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Jul 15 11:31:58.564778 env[1205]: time="2025-07-15T11:31:58.563602658Z" level=info msg="metadata content store policy set" policy=shared Jul 15 11:31:58.574853 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Jul 15 11:31:58.596976 extend-filesystems[1234]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Jul 15 11:31:58.596976 extend-filesystems[1234]: old_desc_blocks = 1, new_desc_blocks = 1 Jul 15 11:31:58.596976 extend-filesystems[1234]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Jul 15 11:31:58.601629 extend-filesystems[1185]: Resized filesystem in /dev/vda9 Jul 15 11:31:58.602571 env[1205]: time="2025-07-15T11:31:58.600328445Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Jul 15 11:31:58.602571 env[1205]: time="2025-07-15T11:31:58.600370494Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Jul 15 11:31:58.602571 env[1205]: time="2025-07-15T11:31:58.600389320Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Jul 15 11:31:58.602571 env[1205]: time="2025-07-15T11:31:58.600432230Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Jul 15 11:31:58.602571 env[1205]: time="2025-07-15T11:31:58.600451837Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Jul 15 11:31:58.602571 env[1205]: time="2025-07-15T11:31:58.600470592Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Jul 15 11:31:58.602571 env[1205]: time="2025-07-15T11:31:58.600487063Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Jul 15 11:31:58.602571 env[1205]: time="2025-07-15T11:31:58.600506539Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Jul 15 11:31:58.602571 env[1205]: time="2025-07-15T11:31:58.600523802Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Jul 15 11:31:58.602571 env[1205]: time="2025-07-15T11:31:58.600541715Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Jul 15 11:31:58.602571 env[1205]: time="2025-07-15T11:31:58.600557966Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Jul 15 11:31:58.602571 env[1205]: time="2025-07-15T11:31:58.600574677Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Jul 15 11:31:58.602571 env[1205]: time="2025-07-15T11:31:58.600686547Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Jul 15 11:31:58.602571 env[1205]: time="2025-07-15T11:31:58.600778639Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Jul 15 11:31:58.597907 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 15 11:31:58.603100 env[1205]: time="2025-07-15T11:31:58.601021555Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Jul 15 11:31:58.603100 env[1205]: time="2025-07-15T11:31:58.601045580Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Jul 15 11:31:58.603100 env[1205]: time="2025-07-15T11:31:58.601063443Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Jul 15 11:31:58.603100 env[1205]: time="2025-07-15T11:31:58.601114840Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Jul 15 11:31:58.603100 env[1205]: time="2025-07-15T11:31:58.601126191Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Jul 15 11:31:58.603100 env[1205]: time="2025-07-15T11:31:58.601138083Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Jul 15 11:31:58.603100 env[1205]: time="2025-07-15T11:31:58.601151158Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Jul 15 11:31:58.603100 env[1205]: time="2025-07-15T11:31:58.601166897Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Jul 15 11:31:58.603100 env[1205]: time="2025-07-15T11:31:58.601181094Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Jul 15 11:31:58.603100 env[1205]: time="2025-07-15T11:31:58.601196373Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Jul 15 11:31:58.603100 env[1205]: time="2025-07-15T11:31:58.601211852Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Jul 15 11:31:58.603100 env[1205]: time="2025-07-15T11:31:58.601227551Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Jul 15 11:31:58.603100 env[1205]: time="2025-07-15T11:31:58.601352866Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Jul 15 11:31:58.603100 env[1205]: time="2025-07-15T11:31:58.601378053Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Jul 15 11:31:58.603100 env[1205]: time="2025-07-15T11:31:58.601392881Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Jul 15 11:31:58.598124 systemd[1]: Finished extend-filesystems.service. Jul 15 11:31:58.603470 env[1205]: time="2025-07-15T11:31:58.601407288Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Jul 15 11:31:58.603470 env[1205]: time="2025-07-15T11:31:58.601425171Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Jul 15 11:31:58.603470 env[1205]: time="2025-07-15T11:31:58.601438907Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Jul 15 11:31:58.603470 env[1205]: time="2025-07-15T11:31:58.601470396Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Jul 15 11:31:58.603470 env[1205]: time="2025-07-15T11:31:58.601517965Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Jul 15 11:31:58.602789 systemd[1]: Started containerd.service. Jul 15 11:31:58.603614 env[1205]: time="2025-07-15T11:31:58.601756182Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Jul 15 11:31:58.603614 env[1205]: time="2025-07-15T11:31:58.601828307Z" level=info msg="Connect containerd service" Jul 15 11:31:58.603614 env[1205]: time="2025-07-15T11:31:58.601918476Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Jul 15 11:31:58.603614 env[1205]: time="2025-07-15T11:31:58.602404948Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 15 11:31:58.603614 env[1205]: time="2025-07-15T11:31:58.602621735Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Jul 15 11:31:58.603614 env[1205]: time="2025-07-15T11:31:58.602666939Z" level=info msg=serving... address=/run/containerd/containerd.sock Jul 15 11:31:58.603614 env[1205]: time="2025-07-15T11:31:58.602713687Z" level=info msg="containerd successfully booted in 0.080552s" Jul 15 11:31:58.603614 env[1205]: time="2025-07-15T11:31:58.602737391Z" level=info msg="Start subscribing containerd event" Jul 15 11:31:58.603614 env[1205]: time="2025-07-15T11:31:58.602857456Z" level=info msg="Start recovering state" Jul 15 11:31:58.603614 env[1205]: time="2025-07-15T11:31:58.602957684Z" level=info msg="Start event monitor" Jul 15 11:31:58.603614 env[1205]: time="2025-07-15T11:31:58.602985647Z" level=info msg="Start snapshots syncer" Jul 15 11:31:58.603614 env[1205]: time="2025-07-15T11:31:58.603001737Z" level=info msg="Start cni network conf syncer for default" Jul 15 11:31:58.603614 env[1205]: time="2025-07-15T11:31:58.603012237Z" level=info msg="Start streaming server" Jul 15 11:31:58.686510 locksmithd[1231]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Jul 15 11:31:59.070192 systemd-networkd[1028]: eth0: Gained IPv6LL Jul 15 11:31:59.072153 systemd[1]: Finished systemd-networkd-wait-online.service. Jul 15 11:31:59.073531 systemd[1]: Reached target network-online.target. Jul 15 11:31:59.075800 systemd[1]: Starting kubelet.service... Jul 15 11:31:59.127522 sshd_keygen[1203]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Jul 15 11:31:59.149203 systemd[1]: Finished sshd-keygen.service. Jul 15 11:31:59.151573 systemd[1]: Starting issuegen.service... Jul 15 11:31:59.156066 systemd[1]: issuegen.service: Deactivated successfully. Jul 15 11:31:59.156187 systemd[1]: Finished issuegen.service. Jul 15 11:31:59.158040 systemd[1]: Starting systemd-user-sessions.service... Jul 15 11:31:59.162763 systemd[1]: Finished systemd-user-sessions.service. Jul 15 11:31:59.165752 systemd[1]: Started getty@tty1.service. Jul 15 11:31:59.168020 systemd[1]: Started serial-getty@ttyS0.service. Jul 15 11:31:59.169162 systemd[1]: Reached target getty.target. Jul 15 11:32:00.387843 systemd[1]: Started kubelet.service. Jul 15 11:32:00.389134 systemd[1]: Reached target multi-user.target. Jul 15 11:32:00.391130 systemd[1]: Starting systemd-update-utmp-runlevel.service... Jul 15 11:32:00.398002 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 15 11:32:00.398172 systemd[1]: Finished systemd-update-utmp-runlevel.service. Jul 15 11:32:00.399411 systemd[1]: Startup finished in 613ms (kernel) + 4.164s (initrd) + 6.536s (userspace) = 11.314s. Jul 15 11:32:00.996751 kubelet[1260]: E0715 11:32:00.996695 1260 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 15 11:32:00.998330 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 15 11:32:00.998440 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 15 11:32:00.998646 systemd[1]: kubelet.service: Consumed 1.734s CPU time. Jul 15 11:32:02.196200 systemd[1]: Created slice system-sshd.slice. Jul 15 11:32:02.197515 systemd[1]: Started sshd@0-10.0.0.87:22-10.0.0.1:34926.service. Jul 15 11:32:02.236507 sshd[1269]: Accepted publickey for core from 10.0.0.1 port 34926 ssh2: RSA SHA256:UAnaMym03FNQ3Em4JmRfExsPnzWeaW932gzAKk7u+5w Jul 15 11:32:02.238554 sshd[1269]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 15 11:32:02.247029 systemd-logind[1195]: New session 1 of user core. Jul 15 11:32:02.247896 systemd[1]: Created slice user-500.slice. Jul 15 11:32:02.248931 systemd[1]: Starting user-runtime-dir@500.service... Jul 15 11:32:02.256417 systemd[1]: Finished user-runtime-dir@500.service. Jul 15 11:32:02.257648 systemd[1]: Starting user@500.service... Jul 15 11:32:02.260122 (systemd)[1272]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Jul 15 11:32:02.335380 systemd[1272]: Queued start job for default target default.target. Jul 15 11:32:02.335886 systemd[1272]: Reached target paths.target. Jul 15 11:32:02.335907 systemd[1272]: Reached target sockets.target. Jul 15 11:32:02.335919 systemd[1272]: Reached target timers.target. Jul 15 11:32:02.335930 systemd[1272]: Reached target basic.target. Jul 15 11:32:02.335966 systemd[1272]: Reached target default.target. Jul 15 11:32:02.335991 systemd[1272]: Startup finished in 70ms. Jul 15 11:32:02.336062 systemd[1]: Started user@500.service. Jul 15 11:32:02.337006 systemd[1]: Started session-1.scope. Jul 15 11:32:02.388655 systemd[1]: Started sshd@1-10.0.0.87:22-10.0.0.1:34940.service. Jul 15 11:32:02.427908 sshd[1281]: Accepted publickey for core from 10.0.0.1 port 34940 ssh2: RSA SHA256:UAnaMym03FNQ3Em4JmRfExsPnzWeaW932gzAKk7u+5w Jul 15 11:32:02.429139 sshd[1281]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 15 11:32:02.432738 systemd-logind[1195]: New session 2 of user core. Jul 15 11:32:02.433975 systemd[1]: Started session-2.scope. Jul 15 11:32:02.489516 sshd[1281]: pam_unix(sshd:session): session closed for user core Jul 15 11:32:02.492669 systemd[1]: sshd@1-10.0.0.87:22-10.0.0.1:34940.service: Deactivated successfully. Jul 15 11:32:02.493323 systemd[1]: session-2.scope: Deactivated successfully. Jul 15 11:32:02.493853 systemd-logind[1195]: Session 2 logged out. Waiting for processes to exit. Jul 15 11:32:02.495040 systemd[1]: Started sshd@2-10.0.0.87:22-10.0.0.1:34944.service. Jul 15 11:32:02.495678 systemd-logind[1195]: Removed session 2. Jul 15 11:32:02.530827 sshd[1287]: Accepted publickey for core from 10.0.0.1 port 34944 ssh2: RSA SHA256:UAnaMym03FNQ3Em4JmRfExsPnzWeaW932gzAKk7u+5w Jul 15 11:32:02.532212 sshd[1287]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 15 11:32:02.535982 systemd-logind[1195]: New session 3 of user core. Jul 15 11:32:02.536693 systemd[1]: Started session-3.scope. Jul 15 11:32:02.588632 sshd[1287]: pam_unix(sshd:session): session closed for user core Jul 15 11:32:02.591990 systemd[1]: Started sshd@3-10.0.0.87:22-10.0.0.1:34952.service. Jul 15 11:32:02.592452 systemd[1]: sshd@2-10.0.0.87:22-10.0.0.1:34944.service: Deactivated successfully. Jul 15 11:32:02.592993 systemd[1]: session-3.scope: Deactivated successfully. Jul 15 11:32:02.593448 systemd-logind[1195]: Session 3 logged out. Waiting for processes to exit. Jul 15 11:32:02.594206 systemd-logind[1195]: Removed session 3. Jul 15 11:32:02.628367 sshd[1293]: Accepted publickey for core from 10.0.0.1 port 34952 ssh2: RSA SHA256:UAnaMym03FNQ3Em4JmRfExsPnzWeaW932gzAKk7u+5w Jul 15 11:32:02.629635 sshd[1293]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 15 11:32:02.632811 systemd-logind[1195]: New session 4 of user core. Jul 15 11:32:02.633733 systemd[1]: Started session-4.scope. Jul 15 11:32:02.687327 sshd[1293]: pam_unix(sshd:session): session closed for user core Jul 15 11:32:02.690471 systemd[1]: sshd@3-10.0.0.87:22-10.0.0.1:34952.service: Deactivated successfully. Jul 15 11:32:02.691058 systemd[1]: session-4.scope: Deactivated successfully. Jul 15 11:32:02.691584 systemd-logind[1195]: Session 4 logged out. Waiting for processes to exit. Jul 15 11:32:02.692684 systemd[1]: Started sshd@4-10.0.0.87:22-10.0.0.1:34968.service. Jul 15 11:32:02.693369 systemd-logind[1195]: Removed session 4. Jul 15 11:32:02.728644 sshd[1300]: Accepted publickey for core from 10.0.0.1 port 34968 ssh2: RSA SHA256:UAnaMym03FNQ3Em4JmRfExsPnzWeaW932gzAKk7u+5w Jul 15 11:32:02.729911 sshd[1300]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 15 11:32:02.733083 systemd-logind[1195]: New session 5 of user core. Jul 15 11:32:02.733885 systemd[1]: Started session-5.scope. Jul 15 11:32:02.790343 sudo[1303]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Jul 15 11:32:02.790522 sudo[1303]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 15 11:32:02.799079 dbus-daemon[1183]: \xd0mG26V: received setenforce notice (enforcing=128365840) Jul 15 11:32:02.801518 sudo[1303]: pam_unix(sudo:session): session closed for user root Jul 15 11:32:02.803275 sshd[1300]: pam_unix(sshd:session): session closed for user core Jul 15 11:32:02.805992 systemd[1]: sshd@4-10.0.0.87:22-10.0.0.1:34968.service: Deactivated successfully. Jul 15 11:32:02.806499 systemd[1]: session-5.scope: Deactivated successfully. Jul 15 11:32:02.807044 systemd-logind[1195]: Session 5 logged out. Waiting for processes to exit. Jul 15 11:32:02.807953 systemd[1]: Started sshd@5-10.0.0.87:22-10.0.0.1:34980.service. Jul 15 11:32:02.808574 systemd-logind[1195]: Removed session 5. Jul 15 11:32:02.846005 sshd[1307]: Accepted publickey for core from 10.0.0.1 port 34980 ssh2: RSA SHA256:UAnaMym03FNQ3Em4JmRfExsPnzWeaW932gzAKk7u+5w Jul 15 11:32:02.847284 sshd[1307]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 15 11:32:02.850605 systemd-logind[1195]: New session 6 of user core. Jul 15 11:32:02.851415 systemd[1]: Started session-6.scope. Jul 15 11:32:02.904649 sudo[1311]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Jul 15 11:32:02.904831 sudo[1311]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 15 11:32:02.907831 sudo[1311]: pam_unix(sudo:session): session closed for user root Jul 15 11:32:02.912807 sudo[1310]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Jul 15 11:32:02.913021 sudo[1310]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 15 11:32:02.921503 systemd[1]: Stopping audit-rules.service... Jul 15 11:32:02.921000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 15 11:32:02.922962 auditctl[1314]: No rules Jul 15 11:32:02.923309 systemd[1]: audit-rules.service: Deactivated successfully. Jul 15 11:32:02.923491 systemd[1]: Stopped audit-rules.service. Jul 15 11:32:02.923593 kernel: kauditd_printk_skb: 238 callbacks suppressed Jul 15 11:32:02.923619 kernel: audit: type=1305 audit(1752579122.921:215): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 15 11:32:02.921000 audit[1314]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffe005fa90 a2=420 a3=0 items=0 ppid=1 pid=1314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:02.924978 systemd[1]: Starting audit-rules.service... Jul 15 11:32:02.929700 kernel: audit: type=1300 audit(1752579122.921:215): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffe005fa90 a2=420 a3=0 items=0 ppid=1 pid=1314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:02.929737 kernel: audit: type=1327 audit(1752579122.921:215): proctitle=2F7362696E2F617564697463746C002D44 Jul 15 11:32:02.921000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Jul 15 11:32:02.922000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:02.933975 kernel: audit: type=1131 audit(1752579122.922:216): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:02.940196 augenrules[1331]: No rules Jul 15 11:32:02.940856 systemd[1]: Finished audit-rules.service. Jul 15 11:32:02.940000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:02.941785 sudo[1310]: pam_unix(sudo:session): session closed for user root Jul 15 11:32:02.943117 sshd[1307]: pam_unix(sshd:session): session closed for user core Jul 15 11:32:02.940000 audit[1310]: USER_END pid=1310 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:32:02.945425 systemd[1]: sshd@5-10.0.0.87:22-10.0.0.1:34980.service: Deactivated successfully. Jul 15 11:32:02.945924 systemd[1]: session-6.scope: Deactivated successfully. Jul 15 11:32:02.946399 systemd-logind[1195]: Session 6 logged out. Waiting for processes to exit. Jul 15 11:32:02.948902 kernel: audit: type=1130 audit(1752579122.940:217): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:02.948966 kernel: audit: type=1106 audit(1752579122.940:218): pid=1310 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:32:02.948983 kernel: audit: type=1104 audit(1752579122.941:219): pid=1310 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:32:02.941000 audit[1310]: CRED_DISP pid=1310 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:32:02.947358 systemd[1]: Started sshd@6-10.0.0.87:22-10.0.0.1:34988.service. Jul 15 11:32:02.948171 systemd-logind[1195]: Removed session 6. Jul 15 11:32:02.943000 audit[1307]: USER_END pid=1307 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:32:02.955395 kernel: audit: type=1106 audit(1752579122.943:220): pid=1307 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:32:02.955462 kernel: audit: type=1104 audit(1752579122.943:221): pid=1307 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:32:02.943000 audit[1307]: CRED_DISP pid=1307 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:32:02.958725 kernel: audit: type=1131 audit(1752579122.944:222): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.87:22-10.0.0.1:34980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:02.944000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.87:22-10.0.0.1:34980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:02.946000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.87:22-10.0.0.1:34988 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:02.988000 audit[1337]: USER_ACCT pid=1337 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:32:02.989526 sshd[1337]: Accepted publickey for core from 10.0.0.1 port 34988 ssh2: RSA SHA256:UAnaMym03FNQ3Em4JmRfExsPnzWeaW932gzAKk7u+5w Jul 15 11:32:02.989000 audit[1337]: CRED_ACQ pid=1337 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:32:02.989000 audit[1337]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd44805040 a2=3 a3=0 items=0 ppid=1 pid=1337 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:02.989000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 15 11:32:02.990421 sshd[1337]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 15 11:32:02.993756 systemd-logind[1195]: New session 7 of user core. Jul 15 11:32:02.994502 systemd[1]: Started session-7.scope. Jul 15 11:32:02.997000 audit[1337]: USER_START pid=1337 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:32:02.998000 audit[1339]: CRED_ACQ pid=1339 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:32:03.046000 audit[1340]: USER_ACCT pid=1340 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:32:03.046000 audit[1340]: CRED_REFR pid=1340 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:32:03.047047 sudo[1340]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Jul 15 11:32:03.047229 sudo[1340]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 15 11:32:03.048000 audit[1340]: USER_START pid=1340 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:32:03.059620 systemd[1]: Starting coreos-metadata.service... Jul 15 11:32:03.067049 systemd[1]: coreos-metadata.service: Deactivated successfully. Jul 15 11:32:03.067215 systemd[1]: Finished coreos-metadata.service. Jul 15 11:32:03.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:03.066000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:03.578372 systemd[1]: Stopped kubelet.service. Jul 15 11:32:03.577000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:03.577000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:03.578521 systemd[1]: kubelet.service: Consumed 1.734s CPU time. Jul 15 11:32:03.580205 systemd[1]: Starting kubelet.service... Jul 15 11:32:03.599018 systemd[1]: Reloading. Jul 15 11:32:03.673913 /usr/lib/systemd/system-generators/torcx-generator[1400]: time="2025-07-15T11:32:03Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" Jul 15 11:32:03.673941 /usr/lib/systemd/system-generators/torcx-generator[1400]: time="2025-07-15T11:32:03Z" level=info msg="torcx already run" Jul 15 11:32:04.265579 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 15 11:32:04.265596 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 15 11:32:04.284956 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 15 11:32:04.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.354000 audit: BPF prog-id=46 op=LOAD Jul 15 11:32:04.354000 audit: BPF prog-id=30 op=UNLOAD Jul 15 11:32:04.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.356000 audit: BPF prog-id=47 op=LOAD Jul 15 11:32:04.356000 audit: BPF prog-id=39 op=UNLOAD Jul 15 11:32:04.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.357000 audit: BPF prog-id=48 op=LOAD Jul 15 11:32:04.357000 audit: BPF prog-id=31 op=UNLOAD Jul 15 11:32:04.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.357000 audit: BPF prog-id=49 op=LOAD Jul 15 11:32:04.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.357000 audit: BPF prog-id=50 op=LOAD Jul 15 11:32:04.357000 audit: BPF prog-id=32 op=UNLOAD Jul 15 11:32:04.357000 audit: BPF prog-id=33 op=UNLOAD Jul 15 11:32:04.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.358000 audit: BPF prog-id=51 op=LOAD Jul 15 11:32:04.358000 audit: BPF prog-id=44 op=UNLOAD Jul 15 11:32:04.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.359000 audit: BPF prog-id=52 op=LOAD Jul 15 11:32:04.359000 audit: BPF prog-id=40 op=UNLOAD Jul 15 11:32:04.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.360000 audit: BPF prog-id=53 op=LOAD Jul 15 11:32:04.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.360000 audit: BPF prog-id=54 op=LOAD Jul 15 11:32:04.360000 audit: BPF prog-id=34 op=UNLOAD Jul 15 11:32:04.360000 audit: BPF prog-id=35 op=UNLOAD Jul 15 11:32:04.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.362000 audit: BPF prog-id=55 op=LOAD Jul 15 11:32:04.362000 audit: BPF prog-id=41 op=UNLOAD Jul 15 11:32:04.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.362000 audit: BPF prog-id=56 op=LOAD Jul 15 11:32:04.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.362000 audit: BPF prog-id=57 op=LOAD Jul 15 11:32:04.362000 audit: BPF prog-id=42 op=UNLOAD Jul 15 11:32:04.362000 audit: BPF prog-id=43 op=UNLOAD Jul 15 11:32:04.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.365000 audit: BPF prog-id=58 op=LOAD Jul 15 11:32:04.365000 audit: BPF prog-id=36 op=UNLOAD Jul 15 11:32:04.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.365000 audit: BPF prog-id=59 op=LOAD Jul 15 11:32:04.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.365000 audit: BPF prog-id=60 op=LOAD Jul 15 11:32:04.365000 audit: BPF prog-id=37 op=UNLOAD Jul 15 11:32:04.365000 audit: BPF prog-id=38 op=UNLOAD Jul 15 11:32:04.377290 systemd[1]: Started kubelet.service. Jul 15 11:32:04.375000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:04.379204 systemd[1]: Stopping kubelet.service... Jul 15 11:32:04.379498 systemd[1]: kubelet.service: Deactivated successfully. Jul 15 11:32:04.379689 systemd[1]: Stopped kubelet.service. Jul 15 11:32:04.378000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:04.381332 systemd[1]: Starting kubelet.service... Jul 15 11:32:04.473633 systemd[1]: Started kubelet.service. Jul 15 11:32:04.473000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:04.510008 kubelet[1448]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 15 11:32:04.510008 kubelet[1448]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Jul 15 11:32:04.510008 kubelet[1448]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 15 11:32:04.510444 kubelet[1448]: I0715 11:32:04.510034 1448 server.go:212] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 15 11:32:04.700082 kubelet[1448]: I0715 11:32:04.699973 1448 server.go:530] "Kubelet version" kubeletVersion="v1.33.0" Jul 15 11:32:04.700082 kubelet[1448]: I0715 11:32:04.699999 1448 server.go:532] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 15 11:32:04.700246 kubelet[1448]: I0715 11:32:04.700209 1448 server.go:956] "Client rotation is on, will bootstrap in background" Jul 15 11:32:04.730383 kubelet[1448]: I0715 11:32:04.730338 1448 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 15 11:32:04.738270 kubelet[1448]: E0715 11:32:04.737370 1448 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Jul 15 11:32:04.738270 kubelet[1448]: I0715 11:32:04.737404 1448 server.go:1423] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Jul 15 11:32:04.744978 kubelet[1448]: I0715 11:32:04.744939 1448 server.go:782] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 15 11:32:04.745315 kubelet[1448]: I0715 11:32:04.745263 1448 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 15 11:32:04.745549 kubelet[1448]: I0715 11:32:04.745304 1448 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.0.0.87","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"MemoryManagerPolicy":"None","MemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Jul 15 11:32:04.745652 kubelet[1448]: I0715 11:32:04.745556 1448 topology_manager.go:138] "Creating topology manager with none policy" Jul 15 11:32:04.745652 kubelet[1448]: I0715 11:32:04.745565 1448 container_manager_linux.go:303] "Creating device plugin manager" Jul 15 11:32:04.745730 kubelet[1448]: I0715 11:32:04.745706 1448 state_mem.go:36] "Initialized new in-memory state store" Jul 15 11:32:04.757570 kubelet[1448]: I0715 11:32:04.757528 1448 kubelet.go:480] "Attempting to sync node with API server" Jul 15 11:32:04.757617 kubelet[1448]: I0715 11:32:04.757601 1448 kubelet.go:375] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 15 11:32:04.757662 kubelet[1448]: I0715 11:32:04.757640 1448 kubelet.go:386] "Adding apiserver pod source" Jul 15 11:32:04.757704 kubelet[1448]: I0715 11:32:04.757672 1448 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 15 11:32:04.757704 kubelet[1448]: E0715 11:32:04.757670 1448 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:04.757827 kubelet[1448]: E0715 11:32:04.757795 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:04.760277 kubelet[1448]: E0715 11:32:04.760250 1448 reflector.go:200] "Failed to watch" err="failed to list *v1.Node: nodes \"10.0.0.87\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Node" Jul 15 11:32:04.760403 kubelet[1448]: E0715 11:32:04.760388 1448 reflector.go:200] "Failed to watch" err="failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" Jul 15 11:32:04.763035 kubelet[1448]: I0715 11:32:04.763014 1448 kuberuntime_manager.go:279] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 15 11:32:04.763462 kubelet[1448]: I0715 11:32:04.763432 1448 kubelet.go:935] "Not starting ClusterTrustBundle informer because we are in static kubelet mode or the ClusterTrustBundleProjection featuregate is disabled" Jul 15 11:32:04.763988 kubelet[1448]: W0715 11:32:04.763967 1448 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Jul 15 11:32:04.765718 kubelet[1448]: I0715 11:32:04.765687 1448 watchdog_linux.go:99] "Systemd watchdog is not enabled" Jul 15 11:32:04.765763 kubelet[1448]: I0715 11:32:04.765738 1448 server.go:1289] "Started kubelet" Jul 15 11:32:04.766285 kubelet[1448]: I0715 11:32:04.766061 1448 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Jul 15 11:32:04.766331 kubelet[1448]: I0715 11:32:04.766250 1448 server.go:180] "Starting to listen" address="0.0.0.0" port=10250 Jul 15 11:32:04.767073 kubelet[1448]: I0715 11:32:04.766536 1448 server.go:255] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 15 11:32:04.766000 audit[1448]: AVC avc: denied { mac_admin } for pid=1448 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.766000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 15 11:32:04.766000 audit[1448]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0006f9e60 a1=c000ac6b10 a2=c0006f9e30 a3=25 items=0 ppid=1 pid=1448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:04.766000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 15 11:32:04.766000 audit[1448]: AVC avc: denied { mac_admin } for pid=1448 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:04.766000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 15 11:32:04.766000 audit[1448]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0003d3160 a1=c000ac6b28 a2=c0006f9ef0 a3=25 items=0 ppid=1 pid=1448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:04.766000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 15 11:32:04.768270 kubelet[1448]: I0715 11:32:04.767341 1448 kubelet.go:1552] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Jul 15 11:32:04.768270 kubelet[1448]: I0715 11:32:04.767374 1448 kubelet.go:1556] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Jul 15 11:32:04.768270 kubelet[1448]: I0715 11:32:04.767427 1448 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 15 11:32:04.768270 kubelet[1448]: I0715 11:32:04.767894 1448 server.go:317] "Adding debug handlers to kubelet server" Jul 15 11:32:04.768905 kubelet[1448]: I0715 11:32:04.768885 1448 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Jul 15 11:32:04.770306 kubelet[1448]: E0715 11:32:04.770286 1448 kubelet.go:1600] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Jul 15 11:32:04.770403 kubelet[1448]: E0715 11:32:04.770355 1448 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.87\" not found" Jul 15 11:32:04.770403 kubelet[1448]: I0715 11:32:04.770387 1448 volume_manager.go:297] "Starting Kubelet Volume Manager" Jul 15 11:32:04.770501 kubelet[1448]: I0715 11:32:04.770480 1448 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Jul 15 11:32:04.770586 kubelet[1448]: I0715 11:32:04.770568 1448 reconciler.go:26] "Reconciler: start to sync state" Jul 15 11:32:04.772085 kubelet[1448]: I0715 11:32:04.772062 1448 factory.go:223] Registration of the containerd container factory successfully Jul 15 11:32:04.772085 kubelet[1448]: I0715 11:32:04.772080 1448 factory.go:223] Registration of the systemd container factory successfully Jul 15 11:32:04.772180 kubelet[1448]: I0715 11:32:04.772151 1448 factory.go:221] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Jul 15 11:32:04.780001 kubelet[1448]: E0715 11:32:04.779970 1448 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.0.0.87\" not found" node="10.0.0.87" Jul 15 11:32:04.780730 kubelet[1448]: I0715 11:32:04.780713 1448 cpu_manager.go:221] "Starting CPU manager" policy="none" Jul 15 11:32:04.780730 kubelet[1448]: I0715 11:32:04.780724 1448 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Jul 15 11:32:04.780826 kubelet[1448]: I0715 11:32:04.780736 1448 state_mem.go:36] "Initialized new in-memory state store" Jul 15 11:32:04.870962 kubelet[1448]: E0715 11:32:04.870908 1448 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.87\" not found" Jul 15 11:32:04.971303 kubelet[1448]: E0715 11:32:04.971158 1448 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.87\" not found" Jul 15 11:32:05.071723 kubelet[1448]: E0715 11:32:05.071680 1448 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.87\" not found" Jul 15 11:32:05.081000 audit[1472]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1472 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:32:05.081000 audit[1472]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffd4a8c600 a2=0 a3=7fffd4a8c5ec items=0 ppid=1448 pid=1472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:05.081000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 15 11:32:05.083201 kubelet[1448]: I0715 11:32:05.083184 1448 policy_none.go:49] "None policy: Start" Jul 15 11:32:05.083286 kubelet[1448]: I0715 11:32:05.083209 1448 memory_manager.go:186] "Starting memorymanager" policy="None" Jul 15 11:32:05.083286 kubelet[1448]: I0715 11:32:05.083230 1448 state_mem.go:35] "Initializing new in-memory state store" Jul 15 11:32:05.082000 audit[1473]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1473 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:32:05.082000 audit[1473]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffce8933c50 a2=0 a3=7ffce8933c3c items=0 ppid=1448 pid=1473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:05.082000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 15 11:32:05.089578 systemd[1]: Created slice kubepods.slice. Jul 15 11:32:05.094741 systemd[1]: Created slice kubepods-burstable.slice. Jul 15 11:32:05.097320 systemd[1]: Created slice kubepods-besteffort.slice. Jul 15 11:32:05.084000 audit[1475]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1475 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:32:05.084000 audit[1475]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffa6005440 a2=0 a3=7fffa600542c items=0 ppid=1448 pid=1475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:05.084000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 15 11:32:05.101000 audit[1480]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1480 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:32:05.101000 audit[1480]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffa69c72d0 a2=0 a3=7fffa69c72bc items=0 ppid=1448 pid=1480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:05.101000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 15 11:32:05.104475 kubelet[1448]: E0715 11:32:05.104450 1448 manager.go:517] "Failed to read data from checkpoint" err="checkpoint is not found" checkpoint="kubelet_internal_checkpoint" Jul 15 11:32:05.104554 kubelet[1448]: E0715 11:32:05.104508 1448 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" path="/var/lib/kubelet/device-plugins/" Jul 15 11:32:05.104621 kubelet[1448]: I0715 11:32:05.104607 1448 eviction_manager.go:189] "Eviction manager: starting control loop" Jul 15 11:32:05.104672 kubelet[1448]: I0715 11:32:05.104619 1448 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Jul 15 11:32:05.105055 kubelet[1448]: I0715 11:32:05.105036 1448 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 15 11:32:05.102000 audit[1448]: AVC avc: denied { mac_admin } for pid=1448 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:05.102000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 15 11:32:05.102000 audit[1448]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e445a0 a1=c000e20d98 a2=c000e44570 a3=25 items=0 ppid=1 pid=1448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:05.102000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 15 11:32:05.106069 kubelet[1448]: E0715 11:32:05.106030 1448 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Jul 15 11:32:05.106069 kubelet[1448]: E0715 11:32:05.106070 1448 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.87\" not found" Jul 15 11:32:05.137000 audit[1485]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1485 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:32:05.137000 audit[1485]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe1eb7e000 a2=0 a3=7ffe1eb7dfec items=0 ppid=1448 pid=1485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:05.137000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Jul 15 11:32:05.138761 kubelet[1448]: I0715 11:32:05.138670 1448 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv4" Jul 15 11:32:05.138000 audit[1486]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1486 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:32:05.138000 audit[1486]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc697353d0 a2=0 a3=7ffc697353bc items=0 ppid=1448 pid=1486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:05.138000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 15 11:32:05.138000 audit[1487]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1487 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:32:05.138000 audit[1487]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffde9a319e0 a2=0 a3=7ffde9a319cc items=0 ppid=1448 pid=1487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:05.138000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 15 11:32:05.139743 kubelet[1448]: I0715 11:32:05.139716 1448 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv6" Jul 15 11:32:05.139743 kubelet[1448]: I0715 11:32:05.139736 1448 status_manager.go:230] "Starting to sync pod status with apiserver" Jul 15 11:32:05.139907 kubelet[1448]: I0715 11:32:05.139754 1448 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Jul 15 11:32:05.139907 kubelet[1448]: I0715 11:32:05.139761 1448 kubelet.go:2436] "Starting kubelet main sync loop" Jul 15 11:32:05.139907 kubelet[1448]: E0715 11:32:05.139880 1448 kubelet.go:2460] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Jul 15 11:32:05.139000 audit[1489]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1489 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:32:05.139000 audit[1489]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff5d27d550 a2=0 a3=7fff5d27d53c items=0 ppid=1448 pid=1489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:05.139000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 15 11:32:05.139000 audit[1488]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1488 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:32:05.139000 audit[1488]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffca8ea8ed0 a2=0 a3=7ffca8ea8ebc items=0 ppid=1448 pid=1488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:05.139000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 15 11:32:05.140000 audit[1491]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1491 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:32:05.140000 audit[1491]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe991222c0 a2=0 a3=7ffe991222ac items=0 ppid=1448 pid=1491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:05.140000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 15 11:32:05.140000 audit[1492]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1492 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:32:05.140000 audit[1492]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc7a115710 a2=0 a3=7ffc7a1156fc items=0 ppid=1448 pid=1492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:05.140000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 15 11:32:05.141000 audit[1493]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1493 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:32:05.141000 audit[1493]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff792da620 a2=0 a3=7fff792da60c items=0 ppid=1448 pid=1493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:05.141000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 15 11:32:05.205813 kubelet[1448]: I0715 11:32:05.205773 1448 kubelet_node_status.go:75] "Attempting to register node" node="10.0.0.87" Jul 15 11:32:05.210143 kubelet[1448]: I0715 11:32:05.210107 1448 kubelet_node_status.go:78] "Successfully registered node" node="10.0.0.87" Jul 15 11:32:05.210143 kubelet[1448]: E0715 11:32:05.210135 1448 kubelet_node_status.go:548] "Error updating node status, will retry" err="error getting node \"10.0.0.87\": node \"10.0.0.87\" not found" Jul 15 11:32:05.220730 kubelet[1448]: E0715 11:32:05.220684 1448 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.87\" not found" Jul 15 11:32:05.321475 kubelet[1448]: E0715 11:32:05.321308 1448 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.87\" not found" Jul 15 11:32:05.421686 kubelet[1448]: E0715 11:32:05.421638 1448 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.87\" not found" Jul 15 11:32:05.497476 sudo[1340]: pam_unix(sudo:session): session closed for user root Jul 15 11:32:05.496000 audit[1340]: USER_END pid=1340 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:32:05.496000 audit[1340]: CRED_DISP pid=1340 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:32:05.498577 sshd[1337]: pam_unix(sshd:session): session closed for user core Jul 15 11:32:05.498000 audit[1337]: USER_END pid=1337 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:32:05.498000 audit[1337]: CRED_DISP pid=1337 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:32:05.500888 systemd[1]: sshd@6-10.0.0.87:22-10.0.0.1:34988.service: Deactivated successfully. Jul 15 11:32:05.500000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.87:22-10.0.0.1:34988 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:05.501499 systemd[1]: session-7.scope: Deactivated successfully. Jul 15 11:32:05.502050 systemd-logind[1195]: Session 7 logged out. Waiting for processes to exit. Jul 15 11:32:05.502735 systemd-logind[1195]: Removed session 7. Jul 15 11:32:05.522363 kubelet[1448]: E0715 11:32:05.522334 1448 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.87\" not found" Jul 15 11:32:05.622952 kubelet[1448]: E0715 11:32:05.622865 1448 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.87\" not found" Jul 15 11:32:05.702339 kubelet[1448]: I0715 11:32:05.702298 1448 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Jul 15 11:32:05.702503 kubelet[1448]: I0715 11:32:05.702468 1448 reflector.go:556] "Warning: watch ended with error" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" err="very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received" Jul 15 11:32:05.702549 kubelet[1448]: I0715 11:32:05.702525 1448 reflector.go:556] "Warning: watch ended with error" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" err="very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received" Jul 15 11:32:05.702600 kubelet[1448]: I0715 11:32:05.702523 1448 reflector.go:556] "Warning: watch ended with error" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" err="very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received" Jul 15 11:32:05.723930 kubelet[1448]: E0715 11:32:05.723890 1448 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.87\" not found" Jul 15 11:32:05.758509 kubelet[1448]: E0715 11:32:05.758477 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:05.824140 kubelet[1448]: E0715 11:32:05.824105 1448 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.87\" not found" Jul 15 11:32:05.924813 kubelet[1448]: E0715 11:32:05.924721 1448 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.87\" not found" Jul 15 11:32:06.025032 kubelet[1448]: E0715 11:32:06.024996 1448 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.87\" not found" Jul 15 11:32:06.126007 kubelet[1448]: I0715 11:32:06.125978 1448 kuberuntime_manager.go:1746] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Jul 15 11:32:06.126295 env[1205]: time="2025-07-15T11:32:06.126235285Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Jul 15 11:32:06.126574 kubelet[1448]: I0715 11:32:06.126419 1448 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Jul 15 11:32:06.758653 kubelet[1448]: I0715 11:32:06.758614 1448 apiserver.go:52] "Watching apiserver" Jul 15 11:32:06.759003 kubelet[1448]: E0715 11:32:06.758661 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:06.769116 kubelet[1448]: E0715 11:32:06.769053 1448 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vtfgv" podUID="532a9ca4-afe0-4bce-901e-f33b2d9c1f64" Jul 15 11:32:06.771081 kubelet[1448]: I0715 11:32:06.771050 1448 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Jul 15 11:32:06.771799 systemd[1]: Created slice kubepods-besteffort-pod1f7fea25_9355_4647_b6e4_d179fec8df01.slice. Jul 15 11:32:06.780551 systemd[1]: Created slice kubepods-besteffort-pod009eca4d_c0f8_4211_bde0_dcfdd8268025.slice. Jul 15 11:32:06.782772 kubelet[1448]: I0715 11:32:06.782752 1448 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/1f7fea25-9355-4647-b6e4-d179fec8df01-cni-bin-dir\") pod \"calico-node-j4tw2\" (UID: \"1f7fea25-9355-4647-b6e4-d179fec8df01\") " pod="calico-system/calico-node-j4tw2" Jul 15 11:32:06.782840 kubelet[1448]: I0715 11:32:06.782778 1448 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/1f7fea25-9355-4647-b6e4-d179fec8df01-policysync\") pod \"calico-node-j4tw2\" (UID: \"1f7fea25-9355-4647-b6e4-d179fec8df01\") " pod="calico-system/calico-node-j4tw2" Jul 15 11:32:06.782840 kubelet[1448]: I0715 11:32:06.782797 1448 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7rrx8\" (UniqueName: \"kubernetes.io/projected/1f7fea25-9355-4647-b6e4-d179fec8df01-kube-api-access-7rrx8\") pod \"calico-node-j4tw2\" (UID: \"1f7fea25-9355-4647-b6e4-d179fec8df01\") " pod="calico-system/calico-node-j4tw2" Jul 15 11:32:06.782840 kubelet[1448]: I0715 11:32:06.782817 1448 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/532a9ca4-afe0-4bce-901e-f33b2d9c1f64-socket-dir\") pod \"csi-node-driver-vtfgv\" (UID: \"532a9ca4-afe0-4bce-901e-f33b2d9c1f64\") " pod="calico-system/csi-node-driver-vtfgv" Jul 15 11:32:06.782840 kubelet[1448]: I0715 11:32:06.782831 1448 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/532a9ca4-afe0-4bce-901e-f33b2d9c1f64-varrun\") pod \"csi-node-driver-vtfgv\" (UID: \"532a9ca4-afe0-4bce-901e-f33b2d9c1f64\") " pod="calico-system/csi-node-driver-vtfgv" Jul 15 11:32:06.782966 kubelet[1448]: I0715 11:32:06.782894 1448 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/009eca4d-c0f8-4211-bde0-dcfdd8268025-kube-proxy\") pod \"kube-proxy-mwckx\" (UID: \"009eca4d-c0f8-4211-bde0-dcfdd8268025\") " pod="kube-system/kube-proxy-mwckx" Jul 15 11:32:06.782966 kubelet[1448]: I0715 11:32:06.782917 1448 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/1f7fea25-9355-4647-b6e4-d179fec8df01-cni-log-dir\") pod \"calico-node-j4tw2\" (UID: \"1f7fea25-9355-4647-b6e4-d179fec8df01\") " pod="calico-system/calico-node-j4tw2" Jul 15 11:32:06.782966 kubelet[1448]: I0715 11:32:06.782937 1448 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/1f7fea25-9355-4647-b6e4-d179fec8df01-flexvol-driver-host\") pod \"calico-node-j4tw2\" (UID: \"1f7fea25-9355-4647-b6e4-d179fec8df01\") " pod="calico-system/calico-node-j4tw2" Jul 15 11:32:06.782966 kubelet[1448]: I0715 11:32:06.782956 1448 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/1f7fea25-9355-4647-b6e4-d179fec8df01-lib-modules\") pod \"calico-node-j4tw2\" (UID: \"1f7fea25-9355-4647-b6e4-d179fec8df01\") " pod="calico-system/calico-node-j4tw2" Jul 15 11:32:06.783073 kubelet[1448]: I0715 11:32:06.782986 1448 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/1f7fea25-9355-4647-b6e4-d179fec8df01-node-certs\") pod \"calico-node-j4tw2\" (UID: \"1f7fea25-9355-4647-b6e4-d179fec8df01\") " pod="calico-system/calico-node-j4tw2" Jul 15 11:32:06.783073 kubelet[1448]: I0715 11:32:06.783021 1448 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/532a9ca4-afe0-4bce-901e-f33b2d9c1f64-kubelet-dir\") pod \"csi-node-driver-vtfgv\" (UID: \"532a9ca4-afe0-4bce-901e-f33b2d9c1f64\") " pod="calico-system/csi-node-driver-vtfgv" Jul 15 11:32:06.783073 kubelet[1448]: I0715 11:32:06.783034 1448 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-c5b9g\" (UniqueName: \"kubernetes.io/projected/009eca4d-c0f8-4211-bde0-dcfdd8268025-kube-api-access-c5b9g\") pod \"kube-proxy-mwckx\" (UID: \"009eca4d-c0f8-4211-bde0-dcfdd8268025\") " pod="kube-system/kube-proxy-mwckx" Jul 15 11:32:06.783139 kubelet[1448]: I0715 11:32:06.783085 1448 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/532a9ca4-afe0-4bce-901e-f33b2d9c1f64-registration-dir\") pod \"csi-node-driver-vtfgv\" (UID: \"532a9ca4-afe0-4bce-901e-f33b2d9c1f64\") " pod="calico-system/csi-node-driver-vtfgv" Jul 15 11:32:06.783163 kubelet[1448]: I0715 11:32:06.783139 1448 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/1f7fea25-9355-4647-b6e4-d179fec8df01-cni-net-dir\") pod \"calico-node-j4tw2\" (UID: \"1f7fea25-9355-4647-b6e4-d179fec8df01\") " pod="calico-system/calico-node-j4tw2" Jul 15 11:32:06.783163 kubelet[1448]: I0715 11:32:06.783155 1448 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1f7fea25-9355-4647-b6e4-d179fec8df01-tigera-ca-bundle\") pod \"calico-node-j4tw2\" (UID: \"1f7fea25-9355-4647-b6e4-d179fec8df01\") " pod="calico-system/calico-node-j4tw2" Jul 15 11:32:06.783223 kubelet[1448]: I0715 11:32:06.783170 1448 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/1f7fea25-9355-4647-b6e4-d179fec8df01-var-lib-calico\") pod \"calico-node-j4tw2\" (UID: \"1f7fea25-9355-4647-b6e4-d179fec8df01\") " pod="calico-system/calico-node-j4tw2" Jul 15 11:32:06.783223 kubelet[1448]: I0715 11:32:06.783188 1448 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/1f7fea25-9355-4647-b6e4-d179fec8df01-var-run-calico\") pod \"calico-node-j4tw2\" (UID: \"1f7fea25-9355-4647-b6e4-d179fec8df01\") " pod="calico-system/calico-node-j4tw2" Jul 15 11:32:06.783223 kubelet[1448]: I0715 11:32:06.783203 1448 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/1f7fea25-9355-4647-b6e4-d179fec8df01-xtables-lock\") pod \"calico-node-j4tw2\" (UID: \"1f7fea25-9355-4647-b6e4-d179fec8df01\") " pod="calico-system/calico-node-j4tw2" Jul 15 11:32:06.783223 kubelet[1448]: I0715 11:32:06.783217 1448 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jtxsj\" (UniqueName: \"kubernetes.io/projected/532a9ca4-afe0-4bce-901e-f33b2d9c1f64-kube-api-access-jtxsj\") pod \"csi-node-driver-vtfgv\" (UID: \"532a9ca4-afe0-4bce-901e-f33b2d9c1f64\") " pod="calico-system/csi-node-driver-vtfgv" Jul 15 11:32:06.783334 kubelet[1448]: I0715 11:32:06.783236 1448 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/009eca4d-c0f8-4211-bde0-dcfdd8268025-xtables-lock\") pod \"kube-proxy-mwckx\" (UID: \"009eca4d-c0f8-4211-bde0-dcfdd8268025\") " pod="kube-system/kube-proxy-mwckx" Jul 15 11:32:06.783334 kubelet[1448]: I0715 11:32:06.783287 1448 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/009eca4d-c0f8-4211-bde0-dcfdd8268025-lib-modules\") pod \"kube-proxy-mwckx\" (UID: \"009eca4d-c0f8-4211-bde0-dcfdd8268025\") " pod="kube-system/kube-proxy-mwckx" Jul 15 11:32:06.884602 kubelet[1448]: I0715 11:32:06.884573 1448 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Jul 15 11:32:06.885355 kubelet[1448]: E0715 11:32:06.885331 1448 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:32:06.885355 kubelet[1448]: W0715 11:32:06.885347 1448 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:32:06.885439 kubelet[1448]: E0715 11:32:06.885360 1448 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:32:06.885571 kubelet[1448]: E0715 11:32:06.885555 1448 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:32:06.885571 kubelet[1448]: W0715 11:32:06.885567 1448 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:32:06.885679 kubelet[1448]: E0715 11:32:06.885575 1448 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:32:06.888193 kubelet[1448]: E0715 11:32:06.888147 1448 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:32:06.888193 kubelet[1448]: W0715 11:32:06.888173 1448 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:32:06.888193 kubelet[1448]: E0715 11:32:06.888195 1448 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:32:06.894740 kubelet[1448]: E0715 11:32:06.894700 1448 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:32:06.894740 kubelet[1448]: W0715 11:32:06.894717 1448 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:32:06.894740 kubelet[1448]: E0715 11:32:06.894734 1448 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:32:06.898670 kubelet[1448]: E0715 11:32:06.898636 1448 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:32:06.898670 kubelet[1448]: W0715 11:32:06.898651 1448 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:32:06.898670 kubelet[1448]: E0715 11:32:06.898662 1448 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:32:06.901096 kubelet[1448]: E0715 11:32:06.901066 1448 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:32:06.901183 kubelet[1448]: W0715 11:32:06.901120 1448 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:32:06.901183 kubelet[1448]: E0715 11:32:06.901143 1448 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:32:07.080181 env[1205]: time="2025-07-15T11:32:07.080059975Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-j4tw2,Uid:1f7fea25-9355-4647-b6e4-d179fec8df01,Namespace:calico-system,Attempt:0,}" Jul 15 11:32:07.082224 kubelet[1448]: E0715 11:32:07.082200 1448 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 15 11:32:07.082656 env[1205]: time="2025-07-15T11:32:07.082607731Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-mwckx,Uid:009eca4d-c0f8-4211-bde0-dcfdd8268025,Namespace:kube-system,Attempt:0,}" Jul 15 11:32:07.759728 kubelet[1448]: E0715 11:32:07.759696 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:08.140992 kubelet[1448]: E0715 11:32:08.140867 1448 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vtfgv" podUID="532a9ca4-afe0-4bce-901e-f33b2d9c1f64" Jul 15 11:32:08.759985 kubelet[1448]: E0715 11:32:08.759939 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:08.904482 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1516246221.mount: Deactivated successfully. Jul 15 11:32:08.916024 env[1205]: time="2025-07-15T11:32:08.915970008Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:32:08.917037 env[1205]: time="2025-07-15T11:32:08.916983054Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:32:08.920031 env[1205]: time="2025-07-15T11:32:08.919985958Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:32:08.921084 env[1205]: time="2025-07-15T11:32:08.921043433Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:32:08.922350 env[1205]: time="2025-07-15T11:32:08.922317602Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:32:08.923481 env[1205]: time="2025-07-15T11:32:08.923455225Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:32:08.924683 env[1205]: time="2025-07-15T11:32:08.924637124Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:32:08.925906 env[1205]: time="2025-07-15T11:32:08.925881301Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:32:08.947362 env[1205]: time="2025-07-15T11:32:08.947176769Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 15 11:32:08.947362 env[1205]: time="2025-07-15T11:32:08.947218132Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 15 11:32:08.947362 env[1205]: time="2025-07-15T11:32:08.947228011Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 15 11:32:08.947553 env[1205]: time="2025-07-15T11:32:08.947373065Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5400784806b719b5fc39463ce55e25b8580bfa67df267459dee0bb0dc4c22340 pid=1516 runtime=io.containerd.runc.v2 Jul 15 11:32:08.951926 env[1205]: time="2025-07-15T11:32:08.950521622Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 15 11:32:08.951926 env[1205]: time="2025-07-15T11:32:08.950558640Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 15 11:32:08.951926 env[1205]: time="2025-07-15T11:32:08.950568539Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 15 11:32:08.951926 env[1205]: time="2025-07-15T11:32:08.950664505Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f35c62c739e4599cdba12b17d808461362a45c31aabb8ac1b8777db7c637ccb3 pid=1530 runtime=io.containerd.runc.v2 Jul 15 11:32:08.962459 systemd[1]: Started cri-containerd-f35c62c739e4599cdba12b17d808461362a45c31aabb8ac1b8777db7c637ccb3.scope. Jul 15 11:32:08.965821 systemd[1]: Started cri-containerd-5400784806b719b5fc39463ce55e25b8580bfa67df267459dee0bb0dc4c22340.scope. Jul 15 11:32:08.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.975672 kernel: kauditd_printk_skb: 243 callbacks suppressed Jul 15 11:32:08.975720 kernel: audit: type=1400 audit(1752579128.973:431): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.985599 kernel: audit: type=1400 audit(1752579128.973:432): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.985686 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Jul 15 11:32:08.985715 kernel: audit: type=1400 audit(1752579128.973:433): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.985738 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Jul 15 11:32:08.985755 kernel: audit: backlog limit exceeded Jul 15 11:32:08.985773 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Jul 15 11:32:08.985796 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Jul 15 11:32:08.985812 kernel: audit: backlog limit exceeded Jul 15 11:32:08.985826 kernel: audit: type=1400 audit(1752579128.973:434): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.974000 audit: BPF prog-id=61 op=LOAD Jul 15 11:32:08.975000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.975000 audit[1541]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1530 pid=1541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:08.975000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633356336326337333965343539396364626131326231376438303834 Jul 15 11:32:08.975000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.975000 audit[1541]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=1530 pid=1541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:08.975000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633356336326337333965343539396364626131326231376438303834 Jul 15 11:32:08.975000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.975000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.975000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.975000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.975000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.975000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.975000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.975000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.975000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.975000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.975000 audit: BPF prog-id=62 op=LOAD Jul 15 11:32:08.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.978000 audit: BPF prog-id=63 op=LOAD Jul 15 11:32:08.975000 audit[1541]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000321010 items=0 ppid=1530 pid=1541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:08.975000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633356336326337333965343539396364626131326231376438303834 Jul 15 11:32:08.978000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.978000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.978000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.978000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.978000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.978000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.978000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.978000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.978000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.978000 audit[1538]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1516 pid=1538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:08.978000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534303037383438303662373139623566633339343633636535356532 Jul 15 11:32:08.978000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.978000 audit[1538]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=1516 pid=1538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:08.978000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534303037383438303662373139623566633339343633636535356532 Jul 15 11:32:08.978000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.978000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.978000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.978000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.978000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.978000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.978000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.978000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.978000 audit[1541]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000321058 items=0 ppid=1530 pid=1541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:08.978000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633356336326337333965343539396364626131326231376438303834 Jul 15 11:32:08.984000 audit: BPF prog-id=64 op=UNLOAD Jul 15 11:32:08.984000 audit: BPF prog-id=62 op=UNLOAD Jul 15 11:32:08.984000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.984000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.984000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.984000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.984000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.984000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.984000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.984000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.984000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.984000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.984000 audit: BPF prog-id=65 op=LOAD Jul 15 11:32:08.984000 audit[1541]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000321468 items=0 ppid=1530 pid=1541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:08.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633356336326337333965343539396364626131326231376438303834 Jul 15 11:32:08.978000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.978000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.978000 audit: BPF prog-id=66 op=LOAD Jul 15 11:32:08.978000 audit[1538]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0001a1550 items=0 ppid=1516 pid=1538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:08.978000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534303037383438303662373139623566633339343633636535356532 Jul 15 11:32:08.992000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.992000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.992000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.992000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.992000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.992000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.992000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.992000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.992000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.992000 audit: BPF prog-id=67 op=LOAD Jul 15 11:32:08.992000 audit[1538]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0001a1598 items=0 ppid=1516 pid=1538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:08.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534303037383438303662373139623566633339343633636535356532 Jul 15 11:32:08.992000 audit: BPF prog-id=67 op=UNLOAD Jul 15 11:32:08.992000 audit: BPF prog-id=66 op=UNLOAD Jul 15 11:32:08.992000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.992000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.992000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.992000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.992000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.992000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.992000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.992000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.992000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.992000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:08.992000 audit: BPF prog-id=68 op=LOAD Jul 15 11:32:08.992000 audit[1538]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0001a19a8 items=0 ppid=1516 pid=1538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:08.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534303037383438303662373139623566633339343633636535356532 Jul 15 11:32:09.003993 env[1205]: time="2025-07-15T11:32:09.003938648Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-j4tw2,Uid:1f7fea25-9355-4647-b6e4-d179fec8df01,Namespace:calico-system,Attempt:0,} returns sandbox id \"5400784806b719b5fc39463ce55e25b8580bfa67df267459dee0bb0dc4c22340\"" Jul 15 11:32:09.005061 env[1205]: time="2025-07-15T11:32:09.005032976Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-mwckx,Uid:009eca4d-c0f8-4211-bde0-dcfdd8268025,Namespace:kube-system,Attempt:0,} returns sandbox id \"f35c62c739e4599cdba12b17d808461362a45c31aabb8ac1b8777db7c637ccb3\"" Jul 15 11:32:09.006035 kubelet[1448]: E0715 11:32:09.006009 1448 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 15 11:32:09.006123 env[1205]: time="2025-07-15T11:32:09.006031994Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2\"" Jul 15 11:32:09.760248 kubelet[1448]: E0715 11:32:09.760187 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:10.140834 kubelet[1448]: E0715 11:32:10.140699 1448 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vtfgv" podUID="532a9ca4-afe0-4bce-901e-f33b2d9c1f64" Jul 15 11:32:10.324662 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4079026407.mount: Deactivated successfully. Jul 15 11:32:10.430855 env[1205]: time="2025-07-15T11:32:10.430730128Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:32:10.433458 env[1205]: time="2025-07-15T11:32:10.433303045Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:639615519fa6f7bc4b4756066ba9780068fd291eacc36c120f6c555e62f2b00e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:32:10.434917 env[1205]: time="2025-07-15T11:32:10.434887339Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:32:10.436166 env[1205]: time="2025-07-15T11:32:10.436140943Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:972be127eaecd7d1a2d5393b8d14f1ae8f88550bee83e0519e9590c7e15eb41b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:32:10.436539 env[1205]: time="2025-07-15T11:32:10.436511045Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2\" returns image reference \"sha256:639615519fa6f7bc4b4756066ba9780068fd291eacc36c120f6c555e62f2b00e\"" Jul 15 11:32:10.437430 env[1205]: time="2025-07-15T11:32:10.437412705Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.2\"" Jul 15 11:32:10.440984 env[1205]: time="2025-07-15T11:32:10.440950077Z" level=info msg="CreateContainer within sandbox \"5400784806b719b5fc39463ce55e25b8580bfa67df267459dee0bb0dc4c22340\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Jul 15 11:32:10.453446 env[1205]: time="2025-07-15T11:32:10.453411041Z" level=info msg="CreateContainer within sandbox \"5400784806b719b5fc39463ce55e25b8580bfa67df267459dee0bb0dc4c22340\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"fded986956fd6b6a10f2c4c4608530280a46c81a148fb1a6bcbc987af3006520\"" Jul 15 11:32:10.453936 env[1205]: time="2025-07-15T11:32:10.453914260Z" level=info msg="StartContainer for \"fded986956fd6b6a10f2c4c4608530280a46c81a148fb1a6bcbc987af3006520\"" Jul 15 11:32:10.467260 systemd[1]: Started cri-containerd-fded986956fd6b6a10f2c4c4608530280a46c81a148fb1a6bcbc987af3006520.scope. Jul 15 11:32:10.478000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:10.478000 audit[1596]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001956b0 a2=3c a3=7efcb0279b18 items=0 ppid=1516 pid=1596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:10.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664656439383639353666643662366131306632633463343630383533 Jul 15 11:32:10.478000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:10.478000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:10.478000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:10.478000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:10.478000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:10.478000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:10.478000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:10.478000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:10.478000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:10.478000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:10.478000 audit: BPF prog-id=69 op=LOAD Jul 15 11:32:10.478000 audit[1596]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001959d8 a2=78 a3=c0003304b8 items=0 ppid=1516 pid=1596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:10.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664656439383639353666643662366131306632633463343630383533 Jul 15 11:32:10.478000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:10.478000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:10.478000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:10.478000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:10.478000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:10.478000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:10.478000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:10.478000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:10.478000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:10.478000 audit: BPF prog-id=70 op=LOAD Jul 15 11:32:10.478000 audit[1596]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000195770 a2=78 a3=c000330508 items=0 ppid=1516 pid=1596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:10.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664656439383639353666643662366131306632633463343630383533 Jul 15 11:32:10.478000 audit: BPF prog-id=70 op=UNLOAD Jul 15 11:32:10.478000 audit: BPF prog-id=69 op=UNLOAD Jul 15 11:32:10.478000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:10.478000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:10.478000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:10.478000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:10.478000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:10.478000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:10.478000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:10.478000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:10.478000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:10.478000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:10.478000 audit: BPF prog-id=71 op=LOAD Jul 15 11:32:10.478000 audit[1596]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000195c30 a2=78 a3=c000330598 items=0 ppid=1516 pid=1596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:10.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664656439383639353666643662366131306632633463343630383533 Jul 15 11:32:10.488934 env[1205]: time="2025-07-15T11:32:10.488880610Z" level=info msg="StartContainer for \"fded986956fd6b6a10f2c4c4608530280a46c81a148fb1a6bcbc987af3006520\" returns successfully" Jul 15 11:32:10.495172 systemd[1]: cri-containerd-fded986956fd6b6a10f2c4c4608530280a46c81a148fb1a6bcbc987af3006520.scope: Deactivated successfully. Jul 15 11:32:10.498000 audit: BPF prog-id=71 op=UNLOAD Jul 15 11:32:10.555335 env[1205]: time="2025-07-15T11:32:10.555286404Z" level=info msg="shim disconnected" id=fded986956fd6b6a10f2c4c4608530280a46c81a148fb1a6bcbc987af3006520 Jul 15 11:32:10.555335 env[1205]: time="2025-07-15T11:32:10.555333490Z" level=warning msg="cleaning up after shim disconnected" id=fded986956fd6b6a10f2c4c4608530280a46c81a148fb1a6bcbc987af3006520 namespace=k8s.io Jul 15 11:32:10.555335 env[1205]: time="2025-07-15T11:32:10.555342225Z" level=info msg="cleaning up dead shim" Jul 15 11:32:10.560292 env[1205]: time="2025-07-15T11:32:10.560238545Z" level=warning msg="cleanup warnings time=\"2025-07-15T11:32:10Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1633 runtime=io.containerd.runc.v2\n" Jul 15 11:32:10.760874 kubelet[1448]: E0715 11:32:10.760769 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:11.596577 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1492219755.mount: Deactivated successfully. Jul 15 11:32:11.761097 kubelet[1448]: E0715 11:32:11.761063 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:12.140979 kubelet[1448]: E0715 11:32:12.140950 1448 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vtfgv" podUID="532a9ca4-afe0-4bce-901e-f33b2d9c1f64" Jul 15 11:32:12.311959 env[1205]: time="2025-07-15T11:32:12.311905200Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.33.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:32:12.313616 env[1205]: time="2025-07-15T11:32:12.313586044Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:661d404f36f01cd854403fd3540f18dcf0342d22bd9c6516bb9de234ac183b19,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:32:12.314880 env[1205]: time="2025-07-15T11:32:12.314816311Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.33.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:32:12.316221 env[1205]: time="2025-07-15T11:32:12.316192385Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:4796ef3e43efa5ed2a5b015c18f81d3c2fe3aea36f555ea643cc01827eb65e51,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:32:12.316507 env[1205]: time="2025-07-15T11:32:12.316470013Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.2\" returns image reference \"sha256:661d404f36f01cd854403fd3540f18dcf0342d22bd9c6516bb9de234ac183b19\"" Jul 15 11:32:12.317517 env[1205]: time="2025-07-15T11:32:12.317492526Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.2\"" Jul 15 11:32:12.320788 env[1205]: time="2025-07-15T11:32:12.320741143Z" level=info msg="CreateContainer within sandbox \"f35c62c739e4599cdba12b17d808461362a45c31aabb8ac1b8777db7c637ccb3\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Jul 15 11:32:12.334427 env[1205]: time="2025-07-15T11:32:12.334373573Z" level=info msg="CreateContainer within sandbox \"f35c62c739e4599cdba12b17d808461362a45c31aabb8ac1b8777db7c637ccb3\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"c34c6e178b1665e38c369183321f8e046c56e93285c0fbe0a4ccc176abee4e43\"" Jul 15 11:32:12.334729 env[1205]: time="2025-07-15T11:32:12.334703899Z" level=info msg="StartContainer for \"c34c6e178b1665e38c369183321f8e046c56e93285c0fbe0a4ccc176abee4e43\"" Jul 15 11:32:12.350819 systemd[1]: Started cri-containerd-c34c6e178b1665e38c369183321f8e046c56e93285c0fbe0a4ccc176abee4e43.scope. Jul 15 11:32:12.360000 audit[1658]: AVC avc: denied { perfmon } for pid=1658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:12.360000 audit[1658]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001196b0 a2=3c a3=7fd4e0fa4608 items=0 ppid=1530 pid=1658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.360000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333346336653137386231363635653338633336393138333332316638 Jul 15 11:32:12.360000 audit[1658]: AVC avc: denied { bpf } for pid=1658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:12.360000 audit[1658]: AVC avc: denied { bpf } for pid=1658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:12.360000 audit[1658]: AVC avc: denied { bpf } for pid=1658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:12.360000 audit[1658]: AVC avc: denied { perfmon } for pid=1658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:12.360000 audit[1658]: AVC avc: denied { perfmon } for pid=1658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:12.360000 audit[1658]: AVC avc: denied { perfmon } for pid=1658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:12.360000 audit[1658]: AVC avc: denied { perfmon } for pid=1658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:12.360000 audit[1658]: AVC avc: denied { perfmon } for pid=1658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:12.360000 audit[1658]: AVC avc: denied { bpf } for pid=1658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:12.360000 audit[1658]: AVC avc: denied { bpf } for pid=1658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:12.360000 audit: BPF prog-id=72 op=LOAD Jul 15 11:32:12.360000 audit[1658]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001199d8 a2=78 a3=c00038beb8 items=0 ppid=1530 pid=1658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.360000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333346336653137386231363635653338633336393138333332316638 Jul 15 11:32:12.360000 audit[1658]: AVC avc: denied { bpf } for pid=1658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:12.360000 audit[1658]: AVC avc: denied { bpf } for pid=1658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:12.360000 audit[1658]: AVC avc: denied { perfmon } for pid=1658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:12.360000 audit[1658]: AVC avc: denied { perfmon } for pid=1658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:12.360000 audit[1658]: AVC avc: denied { perfmon } for pid=1658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:12.360000 audit[1658]: AVC avc: denied { perfmon } for pid=1658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:12.360000 audit[1658]: AVC avc: denied { perfmon } for pid=1658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:12.360000 audit[1658]: AVC avc: denied { bpf } for pid=1658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:12.360000 audit[1658]: AVC avc: denied { bpf } for pid=1658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:12.360000 audit: BPF prog-id=73 op=LOAD Jul 15 11:32:12.360000 audit[1658]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000119770 a2=78 a3=c00038bf08 items=0 ppid=1530 pid=1658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.360000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333346336653137386231363635653338633336393138333332316638 Jul 15 11:32:12.360000 audit: BPF prog-id=73 op=UNLOAD Jul 15 11:32:12.360000 audit: BPF prog-id=72 op=UNLOAD Jul 15 11:32:12.360000 audit[1658]: AVC avc: denied { bpf } for pid=1658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:12.360000 audit[1658]: AVC avc: denied { bpf } for pid=1658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:12.360000 audit[1658]: AVC avc: denied { bpf } for pid=1658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:12.360000 audit[1658]: AVC avc: denied { perfmon } for pid=1658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:12.360000 audit[1658]: AVC avc: denied { perfmon } for pid=1658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:12.360000 audit[1658]: AVC avc: denied { perfmon } for pid=1658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:12.360000 audit[1658]: AVC avc: denied { perfmon } for pid=1658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:12.360000 audit[1658]: AVC avc: denied { perfmon } for pid=1658 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:12.360000 audit[1658]: AVC avc: denied { bpf } for pid=1658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:12.360000 audit[1658]: AVC avc: denied { bpf } for pid=1658 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:12.360000 audit: BPF prog-id=74 op=LOAD Jul 15 11:32:12.360000 audit[1658]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000119c30 a2=78 a3=c00038bf98 items=0 ppid=1530 pid=1658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.360000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333346336653137386231363635653338633336393138333332316638 Jul 15 11:32:12.372578 env[1205]: time="2025-07-15T11:32:12.372533779Z" level=info msg="StartContainer for \"c34c6e178b1665e38c369183321f8e046c56e93285c0fbe0a4ccc176abee4e43\" returns successfully" Jul 15 11:32:12.459000 audit[1720]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1720 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:32:12.459000 audit[1720]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe3469a6e0 a2=0 a3=7ffe3469a6cc items=0 ppid=1669 pid=1720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.459000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 15 11:32:12.460000 audit[1721]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1721 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:32:12.460000 audit[1721]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd17ddd450 a2=0 a3=7ffd17ddd43c items=0 ppid=1669 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.460000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 15 11:32:12.461000 audit[1722]: NETFILTER_CFG table=nat:16 family=10 entries=1 op=nft_register_chain pid=1722 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:32:12.461000 audit[1722]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcd30f4880 a2=0 a3=7ffcd30f486c items=0 ppid=1669 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.461000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 15 11:32:12.461000 audit[1725]: NETFILTER_CFG table=filter:17 family=10 entries=1 op=nft_register_chain pid=1725 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:32:12.461000 audit[1725]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff44cdfe90 a2=0 a3=7fff44cdfe7c items=0 ppid=1669 pid=1725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.461000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 15 11:32:12.462000 audit[1726]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_chain pid=1726 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:32:12.462000 audit[1726]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc0b518720 a2=0 a3=7ffc0b51870c items=0 ppid=1669 pid=1726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.462000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 15 11:32:12.463000 audit[1727]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=1727 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:32:12.463000 audit[1727]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffc5b3e440 a2=0 a3=7fffc5b3e42c items=0 ppid=1669 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.463000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 15 11:32:12.562000 audit[1729]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1729 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:32:12.562000 audit[1729]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffda1f3fc10 a2=0 a3=7ffda1f3fbfc items=0 ppid=1669 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.562000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 15 11:32:12.564000 audit[1731]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1731 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:32:12.564000 audit[1731]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffff9252a20 a2=0 a3=7ffff9252a0c items=0 ppid=1669 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.564000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Jul 15 11:32:12.567000 audit[1734]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1734 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:32:12.567000 audit[1734]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffff7b383e0 a2=0 a3=7ffff7b383cc items=0 ppid=1669 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.567000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Jul 15 11:32:12.568000 audit[1735]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1735 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:32:12.568000 audit[1735]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe6842df60 a2=0 a3=7ffe6842df4c items=0 ppid=1669 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.568000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 15 11:32:12.570000 audit[1737]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1737 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:32:12.570000 audit[1737]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc6bcc7460 a2=0 a3=7ffc6bcc744c items=0 ppid=1669 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.570000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 15 11:32:12.571000 audit[1738]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1738 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:32:12.571000 audit[1738]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd5d3caf10 a2=0 a3=7ffd5d3caefc items=0 ppid=1669 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.571000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 15 11:32:12.573000 audit[1740]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1740 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:32:12.573000 audit[1740]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc782b63d0 a2=0 a3=7ffc782b63bc items=0 ppid=1669 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.573000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 15 11:32:12.575000 audit[1743]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1743 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:32:12.575000 audit[1743]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd33c3fa30 a2=0 a3=7ffd33c3fa1c items=0 ppid=1669 pid=1743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.575000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Jul 15 11:32:12.576000 audit[1744]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1744 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:32:12.576000 audit[1744]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc0d4fb450 a2=0 a3=7ffc0d4fb43c items=0 ppid=1669 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.576000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 15 11:32:12.578000 audit[1746]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1746 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:32:12.578000 audit[1746]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdef765da0 a2=0 a3=7ffdef765d8c items=0 ppid=1669 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.578000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 15 11:32:12.579000 audit[1747]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1747 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:32:12.579000 audit[1747]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc9d4b7580 a2=0 a3=7ffc9d4b756c items=0 ppid=1669 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.579000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 15 11:32:12.581000 audit[1749]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1749 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:32:12.581000 audit[1749]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd5eeb7170 a2=0 a3=7ffd5eeb715c items=0 ppid=1669 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.581000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 15 11:32:12.583000 audit[1752]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1752 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:32:12.583000 audit[1752]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff5d0871e0 a2=0 a3=7fff5d0871cc items=0 ppid=1669 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.583000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 15 11:32:12.586000 audit[1755]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1755 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:32:12.586000 audit[1755]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffe7d6e6e0 a2=0 a3=7fffe7d6e6cc items=0 ppid=1669 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.586000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 15 11:32:12.587000 audit[1756]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1756 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:32:12.587000 audit[1756]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffeb12e8920 a2=0 a3=7ffeb12e890c items=0 ppid=1669 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.587000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 15 11:32:12.589000 audit[1758]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1758 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:32:12.589000 audit[1758]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc9f5c3540 a2=0 a3=7ffc9f5c352c items=0 ppid=1669 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.589000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 15 11:32:12.609000 audit[1762]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1762 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:32:12.609000 audit[1762]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff2b497e70 a2=0 a3=7fff2b497e5c items=0 ppid=1669 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.609000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 15 11:32:12.610000 audit[1763]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1763 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:32:12.610000 audit[1763]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd05b00ea0 a2=0 a3=7ffd05b00e8c items=0 ppid=1669 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.610000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 15 11:32:12.612000 audit[1765]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1765 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:32:12.612000 audit[1765]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff7c016f90 a2=0 a3=7fff7c016f7c items=0 ppid=1669 pid=1765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.612000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 15 11:32:12.631000 audit[1771]: NETFILTER_CFG table=filter:39 family=2 entries=11 op=nft_register_rule pid=1771 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:32:12.631000 audit[1771]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffded8f7410 a2=0 a3=7ffded8f73fc items=0 ppid=1669 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.631000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:32:12.648000 audit[1771]: NETFILTER_CFG table=nat:40 family=2 entries=21 op=nft_register_chain pid=1771 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:32:12.648000 audit[1771]: SYSCALL arch=c000003e syscall=46 success=yes exit=9084 a0=3 a1=7ffded8f7410 a2=0 a3=7ffded8f73fc items=0 ppid=1669 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.648000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:32:12.649000 audit[1778]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1778 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:32:12.649000 audit[1778]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffdd71b0320 a2=0 a3=7ffdd71b030c items=0 ppid=1669 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.649000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 15 11:32:12.651000 audit[1780]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1780 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:32:12.651000 audit[1780]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc013c5950 a2=0 a3=7ffc013c593c items=0 ppid=1669 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.651000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Jul 15 11:32:12.653000 audit[1783]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1783 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:32:12.653000 audit[1783]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe64148850 a2=0 a3=7ffe6414883c items=0 ppid=1669 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.653000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Jul 15 11:32:12.654000 audit[1784]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1784 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:32:12.654000 audit[1784]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeb06445e0 a2=0 a3=7ffeb06445cc items=0 ppid=1669 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.654000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 15 11:32:12.656000 audit[1786]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1786 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:32:12.656000 audit[1786]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc08696880 a2=0 a3=7ffc0869686c items=0 ppid=1669 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.656000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 15 11:32:12.657000 audit[1787]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1787 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:32:12.657000 audit[1787]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdc1326230 a2=0 a3=7ffdc132621c items=0 ppid=1669 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.657000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 15 11:32:12.659000 audit[1789]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1789 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:32:12.659000 audit[1789]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffed7656fd0 a2=0 a3=7ffed7656fbc items=0 ppid=1669 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.659000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Jul 15 11:32:12.662000 audit[1792]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1792 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:32:12.662000 audit[1792]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fffd30a00e0 a2=0 a3=7fffd30a00cc items=0 ppid=1669 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.662000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 15 11:32:12.662000 audit[1793]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1793 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:32:12.662000 audit[1793]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd1ef335d0 a2=0 a3=7ffd1ef335bc items=0 ppid=1669 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.662000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 15 11:32:12.664000 audit[1795]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1795 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:32:12.664000 audit[1795]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdab0d49f0 a2=0 a3=7ffdab0d49dc items=0 ppid=1669 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.664000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 15 11:32:12.665000 audit[1796]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1796 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:32:12.665000 audit[1796]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdb3241f60 a2=0 a3=7ffdb3241f4c items=0 ppid=1669 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.665000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 15 11:32:12.666000 audit[1798]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1798 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:32:12.666000 audit[1798]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffefe4fc320 a2=0 a3=7ffefe4fc30c items=0 ppid=1669 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.666000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 15 11:32:12.669000 audit[1801]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1801 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:32:12.669000 audit[1801]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff6121a9c0 a2=0 a3=7fff6121a9ac items=0 ppid=1669 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.669000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 15 11:32:12.672000 audit[1804]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1804 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:32:12.672000 audit[1804]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffea33367d0 a2=0 a3=7ffea33367bc items=0 ppid=1669 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.672000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Jul 15 11:32:12.673000 audit[1805]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1805 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:32:12.673000 audit[1805]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc2cf23930 a2=0 a3=7ffc2cf2391c items=0 ppid=1669 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.673000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 15 11:32:12.674000 audit[1807]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1807 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:32:12.674000 audit[1807]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc216241a0 a2=0 a3=7ffc2162418c items=0 ppid=1669 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.674000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 15 11:32:12.677000 audit[1810]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1810 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:32:12.677000 audit[1810]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd4c459b30 a2=0 a3=7ffd4c459b1c items=0 ppid=1669 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.677000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 15 11:32:12.678000 audit[1811]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1811 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:32:12.678000 audit[1811]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdc5d3c250 a2=0 a3=7ffdc5d3c23c items=0 ppid=1669 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.678000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 15 11:32:12.680000 audit[1813]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1813 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:32:12.680000 audit[1813]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fffd9fef650 a2=0 a3=7fffd9fef63c items=0 ppid=1669 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.680000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 15 11:32:12.681000 audit[1814]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1814 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:32:12.681000 audit[1814]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff1d18b1c0 a2=0 a3=7fff1d18b1ac items=0 ppid=1669 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.681000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 15 11:32:12.682000 audit[1816]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1816 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:32:12.682000 audit[1816]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffda29706f0 a2=0 a3=7ffda29706dc items=0 ppid=1669 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.682000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 15 11:32:12.685000 audit[1819]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1819 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:32:12.685000 audit[1819]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffeae78ff10 a2=0 a3=7ffeae78fefc items=0 ppid=1669 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.685000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 15 11:32:12.688000 audit[1821]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1821 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 15 11:32:12.688000 audit[1821]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffd67c93e90 a2=0 a3=7ffd67c93e7c items=0 ppid=1669 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.688000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:32:12.689000 audit[1821]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1821 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 15 11:32:12.689000 audit[1821]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffd67c93e90 a2=0 a3=7ffd67c93e7c items=0 ppid=1669 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:12.689000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:32:12.761428 kubelet[1448]: E0715 11:32:12.761336 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:13.156189 kubelet[1448]: E0715 11:32:13.156072 1448 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 15 11:32:13.761444 kubelet[1448]: E0715 11:32:13.761410 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:14.140414 kubelet[1448]: E0715 11:32:14.140287 1448 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vtfgv" podUID="532a9ca4-afe0-4bce-901e-f33b2d9c1f64" Jul 15 11:32:14.157258 kubelet[1448]: E0715 11:32:14.157220 1448 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 15 11:32:14.761637 kubelet[1448]: E0715 11:32:14.761574 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:15.547000 audit[1824]: NETFILTER_CFG table=filter:65 family=2 entries=19 op=nft_register_rule pid=1824 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:32:15.549618 kernel: kauditd_printk_skb: 348 callbacks suppressed Jul 15 11:32:15.549706 kernel: audit: type=1325 audit(1752579135.547:531): table=filter:65 family=2 entries=19 op=nft_register_rule pid=1824 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:32:15.547000 audit[1824]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffc8c081300 a2=0 a3=7ffc8c0812ec items=0 ppid=1669 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:15.557203 kernel: audit: type=1300 audit(1752579135.547:531): arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffc8c081300 a2=0 a3=7ffc8c0812ec items=0 ppid=1669 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:15.557311 kernel: audit: type=1327 audit(1752579135.547:531): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:32:15.547000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:32:15.559000 audit[1824]: NETFILTER_CFG table=nat:66 family=2 entries=21 op=nft_register_chain pid=1824 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:32:15.559000 audit[1824]: SYSCALL arch=c000003e syscall=46 success=yes exit=7044 a0=3 a1=7ffc8c081300 a2=0 a3=7ffc8c0812ec items=0 ppid=1669 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:15.568031 kernel: audit: type=1325 audit(1752579135.559:532): table=nat:66 family=2 entries=21 op=nft_register_chain pid=1824 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:32:15.568085 kernel: audit: type=1300 audit(1752579135.559:532): arch=c000003e syscall=46 success=yes exit=7044 a0=3 a1=7ffc8c081300 a2=0 a3=7ffc8c0812ec items=0 ppid=1669 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:15.568102 kernel: audit: type=1327 audit(1752579135.559:532): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:32:15.559000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:32:15.762766 kubelet[1448]: E0715 11:32:15.762703 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:16.140949 kubelet[1448]: E0715 11:32:16.140886 1448 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vtfgv" podUID="532a9ca4-afe0-4bce-901e-f33b2d9c1f64" Jul 15 11:32:16.562000 audit[1826]: NETFILTER_CFG table=filter:67 family=2 entries=18 op=nft_register_rule pid=1826 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:32:16.562000 audit[1826]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffdaed32c20 a2=0 a3=7ffdaed32c0c items=0 ppid=1669 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:16.570783 kernel: audit: type=1325 audit(1752579136.562:533): table=filter:67 family=2 entries=18 op=nft_register_rule pid=1826 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:32:16.570859 kernel: audit: type=1300 audit(1752579136.562:533): arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffdaed32c20 a2=0 a3=7ffdaed32c0c items=0 ppid=1669 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:16.570905 kernel: audit: type=1327 audit(1752579136.562:533): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:32:16.562000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:32:16.576000 audit[1826]: NETFILTER_CFG table=nat:68 family=2 entries=16 op=nft_register_rule pid=1826 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:32:16.576000 audit[1826]: SYSCALL arch=c000003e syscall=46 success=yes exit=4236 a0=3 a1=7ffdaed32c20 a2=0 a3=0 items=0 ppid=1669 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:16.576000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:32:16.580868 kernel: audit: type=1325 audit(1752579136.576:534): table=nat:68 family=2 entries=16 op=nft_register_rule pid=1826 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:32:16.592000 audit[1830]: NETFILTER_CFG table=filter:69 family=2 entries=15 op=nft_register_rule pid=1830 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:32:16.592000 audit[1830]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffe37f53800 a2=0 a3=7ffe37f537ec items=0 ppid=1669 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:16.592000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:32:16.597000 audit[1830]: NETFILTER_CFG table=nat:70 family=2 entries=37 op=nft_register_chain pid=1830 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:32:16.597000 audit[1830]: SYSCALL arch=c000003e syscall=46 success=yes exit=14964 a0=3 a1=7ffe37f53800 a2=0 a3=7ffe37f537ec items=0 ppid=1669 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:16.597000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:32:16.763706 kubelet[1448]: E0715 11:32:16.763647 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:17.122210 env[1205]: time="2025-07-15T11:32:17.122157547Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:32:17.123872 env[1205]: time="2025-07-15T11:32:17.123799184Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:77a357d0d33e3016e61153f7d2b7de72371579c4aaeb767fb7ef0af606fe1630,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:32:17.126617 env[1205]: time="2025-07-15T11:32:17.126582669Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:32:17.128219 env[1205]: time="2025-07-15T11:32:17.128189188Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:50686775cc60acb78bd92a66fa2d84e1700b2d8e43a718fbadbf35e59baefb4d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:32:17.128685 env[1205]: time="2025-07-15T11:32:17.128642965Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.2\" returns image reference \"sha256:77a357d0d33e3016e61153f7d2b7de72371579c4aaeb767fb7ef0af606fe1630\"" Jul 15 11:32:17.132506 env[1205]: time="2025-07-15T11:32:17.132480162Z" level=info msg="CreateContainer within sandbox \"5400784806b719b5fc39463ce55e25b8580bfa67df267459dee0bb0dc4c22340\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Jul 15 11:32:17.145619 env[1205]: time="2025-07-15T11:32:17.145550008Z" level=info msg="CreateContainer within sandbox \"5400784806b719b5fc39463ce55e25b8580bfa67df267459dee0bb0dc4c22340\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"3195e38cc42472de318b69387fdead29a4b0246e21da5383f3b3e96539b636df\"" Jul 15 11:32:17.146116 env[1205]: time="2025-07-15T11:32:17.146086168Z" level=info msg="StartContainer for \"3195e38cc42472de318b69387fdead29a4b0246e21da5383f3b3e96539b636df\"" Jul 15 11:32:17.169347 systemd[1]: run-containerd-runc-k8s.io-3195e38cc42472de318b69387fdead29a4b0246e21da5383f3b3e96539b636df-runc.O7j7ds.mount: Deactivated successfully. Jul 15 11:32:17.171304 systemd[1]: Started cri-containerd-3195e38cc42472de318b69387fdead29a4b0246e21da5383f3b3e96539b636df.scope. Jul 15 11:32:17.196000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:17.196000 audit[1838]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f20827a8588 items=0 ppid=1516 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:17.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331393565333863633432343732646533313862363933383766646561 Jul 15 11:32:17.196000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:17.196000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:17.196000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:17.196000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:17.196000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:17.196000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:17.196000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:17.196000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:17.196000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:17.196000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:17.196000 audit: BPF prog-id=75 op=LOAD Jul 15 11:32:17.196000 audit[1838]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003fe0b8 items=0 ppid=1516 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:17.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331393565333863633432343732646533313862363933383766646561 Jul 15 11:32:17.196000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:17.196000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:17.196000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:17.196000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:17.196000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:17.196000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:17.196000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:17.196000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:17.196000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:17.196000 audit: BPF prog-id=76 op=LOAD Jul 15 11:32:17.196000 audit[1838]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003fe108 items=0 ppid=1516 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:17.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331393565333863633432343732646533313862363933383766646561 Jul 15 11:32:17.196000 audit: BPF prog-id=76 op=UNLOAD Jul 15 11:32:17.196000 audit: BPF prog-id=75 op=UNLOAD Jul 15 11:32:17.196000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:17.196000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:17.196000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:17.196000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:17.196000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:17.196000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:17.196000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:17.196000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:17.196000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:17.196000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:17.196000 audit: BPF prog-id=77 op=LOAD Jul 15 11:32:17.196000 audit[1838]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003fe198 items=0 ppid=1516 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:17.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331393565333863633432343732646533313862363933383766646561 Jul 15 11:32:17.208276 env[1205]: time="2025-07-15T11:32:17.208223730Z" level=info msg="StartContainer for \"3195e38cc42472de318b69387fdead29a4b0246e21da5383f3b3e96539b636df\" returns successfully" Jul 15 11:32:17.763883 kubelet[1448]: E0715 11:32:17.763829 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:18.140406 kubelet[1448]: E0715 11:32:18.140250 1448 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vtfgv" podUID="532a9ca4-afe0-4bce-901e-f33b2d9c1f64" Jul 15 11:32:18.589650 kubelet[1448]: I0715 11:32:18.589410 1448 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-mwckx" podStartSLOduration=10.278518953 podStartE2EDuration="13.589384725s" podCreationTimestamp="2025-07-15 11:32:05 +0000 UTC" firstStartedPulling="2025-07-15 11:32:09.006371169 +0000 UTC m=+4.529410879" lastFinishedPulling="2025-07-15 11:32:12.317236941 +0000 UTC m=+7.840276651" observedRunningTime="2025-07-15 11:32:13.433028811 +0000 UTC m=+8.956068521" watchObservedRunningTime="2025-07-15 11:32:18.589384725 +0000 UTC m=+14.112424435" Jul 15 11:32:18.698989 env[1205]: time="2025-07-15T11:32:18.698928654Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 15 11:32:18.701228 systemd[1]: cri-containerd-3195e38cc42472de318b69387fdead29a4b0246e21da5383f3b3e96539b636df.scope: Deactivated successfully. Jul 15 11:32:18.701497 systemd[1]: cri-containerd-3195e38cc42472de318b69387fdead29a4b0246e21da5383f3b3e96539b636df.scope: Consumed 1.005s CPU time. Jul 15 11:32:18.705000 audit: BPF prog-id=77 op=UNLOAD Jul 15 11:32:18.725204 kubelet[1448]: I0715 11:32:18.725163 1448 kubelet_node_status.go:501] "Fast updating node status as it just became ready" Jul 15 11:32:18.764426 kubelet[1448]: E0715 11:32:18.764351 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:18.771810 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-3195e38cc42472de318b69387fdead29a4b0246e21da5383f3b3e96539b636df-rootfs.mount: Deactivated successfully. Jul 15 11:32:19.721862 env[1205]: time="2025-07-15T11:32:19.721785281Z" level=info msg="shim disconnected" id=3195e38cc42472de318b69387fdead29a4b0246e21da5383f3b3e96539b636df Jul 15 11:32:19.721862 env[1205]: time="2025-07-15T11:32:19.721851448Z" level=warning msg="cleaning up after shim disconnected" id=3195e38cc42472de318b69387fdead29a4b0246e21da5383f3b3e96539b636df namespace=k8s.io Jul 15 11:32:19.721862 env[1205]: time="2025-07-15T11:32:19.721861226Z" level=info msg="cleaning up dead shim" Jul 15 11:32:19.728916 env[1205]: time="2025-07-15T11:32:19.728869644Z" level=warning msg="cleanup warnings time=\"2025-07-15T11:32:19Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1879 runtime=io.containerd.runc.v2\n" Jul 15 11:32:19.731000 audit[1892]: NETFILTER_CFG table=filter:71 family=2 entries=12 op=nft_register_rule pid=1892 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:32:19.731000 audit[1892]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffc9716aa80 a2=0 a3=7ffc9716aa6c items=0 ppid=1669 pid=1892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:19.731000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:32:19.735000 audit[1892]: NETFILTER_CFG table=nat:72 family=2 entries=46 op=nft_register_rule pid=1892 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:32:19.735000 audit[1892]: SYSCALL arch=c000003e syscall=46 success=yes exit=14964 a0=3 a1=7ffc9716aa80 a2=0 a3=7ffc9716aa6c items=0 ppid=1669 pid=1892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:19.735000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:32:19.749000 audit[1894]: NETFILTER_CFG table=filter:73 family=2 entries=12 op=nft_register_rule pid=1894 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:32:19.749000 audit[1894]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffe93314360 a2=0 a3=7ffe9331434c items=0 ppid=1669 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:19.749000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:32:19.760000 audit[1894]: NETFILTER_CFG table=nat:74 family=2 entries=58 op=nft_register_chain pid=1894 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:32:19.760000 audit[1894]: SYSCALL arch=c000003e syscall=46 success=yes exit=20628 a0=3 a1=7ffe93314360 a2=0 a3=7ffe9331434c items=0 ppid=1669 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:19.760000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:32:19.765478 kubelet[1448]: E0715 11:32:19.765409 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:20.144523 systemd[1]: Created slice kubepods-besteffort-pod532a9ca4_afe0_4bce_901e_f33b2d9c1f64.slice. Jul 15 11:32:20.146422 env[1205]: time="2025-07-15T11:32:20.146385226Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-vtfgv,Uid:532a9ca4-afe0-4bce-901e-f33b2d9c1f64,Namespace:calico-system,Attempt:0,}" Jul 15 11:32:20.171343 env[1205]: time="2025-07-15T11:32:20.171301271Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.2\"" Jul 15 11:32:20.199952 env[1205]: time="2025-07-15T11:32:20.199876828Z" level=error msg="Failed to destroy network for sandbox \"b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 15 11:32:20.200263 env[1205]: time="2025-07-15T11:32:20.200225769Z" level=error msg="encountered an error cleaning up failed sandbox \"b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 15 11:32:20.200306 env[1205]: time="2025-07-15T11:32:20.200278981Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-vtfgv,Uid:532a9ca4-afe0-4bce-901e-f33b2d9c1f64,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 15 11:32:20.200562 kubelet[1448]: E0715 11:32:20.200522 1448 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 15 11:32:20.200640 kubelet[1448]: E0715 11:32:20.200606 1448 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-vtfgv" Jul 15 11:32:20.200697 kubelet[1448]: E0715 11:32:20.200640 1448 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-vtfgv" Jul 15 11:32:20.200735 kubelet[1448]: E0715 11:32:20.200712 1448 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-vtfgv_calico-system(532a9ca4-afe0-4bce-901e-f33b2d9c1f64)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-vtfgv_calico-system(532a9ca4-afe0-4bce-901e-f33b2d9c1f64)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-vtfgv" podUID="532a9ca4-afe0-4bce-901e-f33b2d9c1f64" Jul 15 11:32:20.201342 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9-shm.mount: Deactivated successfully. Jul 15 11:32:20.765938 kubelet[1448]: E0715 11:32:20.765893 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:20.775000 audit[1931]: NETFILTER_CFG table=filter:75 family=2 entries=12 op=nft_register_rule pid=1931 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:32:20.777401 kernel: kauditd_printk_skb: 64 callbacks suppressed Jul 15 11:32:20.777449 kernel: audit: type=1325 audit(1752579140.775:548): table=filter:75 family=2 entries=12 op=nft_register_rule pid=1931 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:32:20.775000 audit[1931]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffe24fd3280 a2=0 a3=7ffe24fd326c items=0 ppid=1669 pid=1931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:20.784538 kernel: audit: type=1300 audit(1752579140.775:548): arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffe24fd3280 a2=0 a3=7ffe24fd326c items=0 ppid=1669 pid=1931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:20.784592 kernel: audit: type=1327 audit(1752579140.775:548): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:32:20.775000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:32:20.787000 audit[1931]: NETFILTER_CFG table=nat:76 family=2 entries=22 op=nft_register_rule pid=1931 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:32:20.787000 audit[1931]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe24fd3280 a2=0 a3=7ffe24fd326c items=0 ppid=1669 pid=1931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:20.795821 kernel: audit: type=1325 audit(1752579140.787:549): table=nat:76 family=2 entries=22 op=nft_register_rule pid=1931 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:32:20.795964 kernel: audit: type=1300 audit(1752579140.787:549): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe24fd3280 a2=0 a3=7ffe24fd326c items=0 ppid=1669 pid=1931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:20.795985 kernel: audit: type=1327 audit(1752579140.787:549): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:32:20.787000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:32:21.171993 kubelet[1448]: I0715 11:32:21.171882 1448 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9" Jul 15 11:32:21.172488 env[1205]: time="2025-07-15T11:32:21.172449551Z" level=info msg="StopPodSandbox for \"b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9\"" Jul 15 11:32:21.191624 env[1205]: time="2025-07-15T11:32:21.191557944Z" level=error msg="StopPodSandbox for \"b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9\" failed" error="failed to destroy network for sandbox \"b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 15 11:32:21.191820 kubelet[1448]: E0715 11:32:21.191787 1448 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9" Jul 15 11:32:21.191894 kubelet[1448]: E0715 11:32:21.191856 1448 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9"} Jul 15 11:32:21.191925 kubelet[1448]: E0715 11:32:21.191909 1448 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"532a9ca4-afe0-4bce-901e-f33b2d9c1f64\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 15 11:32:21.191998 kubelet[1448]: E0715 11:32:21.191932 1448 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"532a9ca4-afe0-4bce-901e-f33b2d9c1f64\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-vtfgv" podUID="532a9ca4-afe0-4bce-901e-f33b2d9c1f64" Jul 15 11:32:21.766520 kubelet[1448]: E0715 11:32:21.766469 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:21.954661 systemd[1]: Created slice kubepods-besteffort-pod7bd665c1_2b80_453a_a57e_1124e3eace1d.slice. Jul 15 11:32:21.981090 kubelet[1448]: I0715 11:32:21.981042 1448 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bw9g8\" (UniqueName: \"kubernetes.io/projected/7bd665c1-2b80-453a-a57e-1124e3eace1d-kube-api-access-bw9g8\") pod \"nginx-deployment-7fcdb87857-p8fsg\" (UID: \"7bd665c1-2b80-453a-a57e-1124e3eace1d\") " pod="default/nginx-deployment-7fcdb87857-p8fsg" Jul 15 11:32:22.257168 env[1205]: time="2025-07-15T11:32:22.257057556Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-p8fsg,Uid:7bd665c1-2b80-453a-a57e-1124e3eace1d,Namespace:default,Attempt:0,}" Jul 15 11:32:22.766859 kubelet[1448]: E0715 11:32:22.766810 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:23.122000 audit[1952]: NETFILTER_CFG table=filter:77 family=2 entries=12 op=nft_register_rule pid=1952 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:32:23.122000 audit[1952]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffc674fce90 a2=0 a3=7ffc674fce7c items=0 ppid=1669 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:23.132855 kernel: audit: type=1325 audit(1752579143.122:550): table=filter:77 family=2 entries=12 op=nft_register_rule pid=1952 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:32:23.132926 kernel: audit: type=1300 audit(1752579143.122:550): arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffc674fce90 a2=0 a3=7ffc674fce7c items=0 ppid=1669 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:23.132957 kernel: audit: type=1327 audit(1752579143.122:550): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:32:23.122000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:32:23.131000 audit[1952]: NETFILTER_CFG table=nat:78 family=2 entries=22 op=nft_register_rule pid=1952 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:32:23.139600 kernel: audit: type=1325 audit(1752579143.131:551): table=nat:78 family=2 entries=22 op=nft_register_rule pid=1952 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:32:23.131000 audit[1952]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc674fce90 a2=0 a3=7ffc674fce7c items=0 ppid=1669 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:23.131000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:32:23.201825 env[1205]: time="2025-07-15T11:32:23.201756681Z" level=error msg="Failed to destroy network for sandbox \"015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 15 11:32:23.203413 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b-shm.mount: Deactivated successfully. Jul 15 11:32:23.204823 env[1205]: time="2025-07-15T11:32:23.204757236Z" level=error msg="encountered an error cleaning up failed sandbox \"015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 15 11:32:23.204908 env[1205]: time="2025-07-15T11:32:23.204831599Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-p8fsg,Uid:7bd665c1-2b80-453a-a57e-1124e3eace1d,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 15 11:32:23.205152 kubelet[1448]: E0715 11:32:23.205106 1448 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 15 11:32:23.205229 kubelet[1448]: E0715 11:32:23.205179 1448 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-p8fsg" Jul 15 11:32:23.205229 kubelet[1448]: E0715 11:32:23.205210 1448 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-p8fsg" Jul 15 11:32:23.205301 kubelet[1448]: E0715 11:32:23.205260 1448 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-7fcdb87857-p8fsg_default(7bd665c1-2b80-453a-a57e-1124e3eace1d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-7fcdb87857-p8fsg_default(7bd665c1-2b80-453a-a57e-1124e3eace1d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-p8fsg" podUID="7bd665c1-2b80-453a-a57e-1124e3eace1d" Jul 15 11:32:23.767774 kubelet[1448]: E0715 11:32:23.767696 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:24.177217 kubelet[1448]: I0715 11:32:24.177106 1448 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b" Jul 15 11:32:24.177773 env[1205]: time="2025-07-15T11:32:24.177719509Z" level=info msg="StopPodSandbox for \"015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b\"" Jul 15 11:32:24.205629 env[1205]: time="2025-07-15T11:32:24.205557653Z" level=error msg="StopPodSandbox for \"015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b\" failed" error="failed to destroy network for sandbox \"015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 15 11:32:24.205821 kubelet[1448]: E0715 11:32:24.205771 1448 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b" Jul 15 11:32:24.205893 kubelet[1448]: E0715 11:32:24.205831 1448 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b"} Jul 15 11:32:24.205893 kubelet[1448]: E0715 11:32:24.205879 1448 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"7bd665c1-2b80-453a-a57e-1124e3eace1d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 15 11:32:24.205992 kubelet[1448]: E0715 11:32:24.205903 1448 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"7bd665c1-2b80-453a-a57e-1124e3eace1d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-p8fsg" podUID="7bd665c1-2b80-453a-a57e-1124e3eace1d" Jul 15 11:32:24.758308 kubelet[1448]: E0715 11:32:24.758250 1448 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:24.767799 kubelet[1448]: E0715 11:32:24.767770 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:25.768245 kubelet[1448]: E0715 11:32:25.768188 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:26.768413 kubelet[1448]: E0715 11:32:26.768345 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:27.769424 kubelet[1448]: E0715 11:32:27.769356 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:27.920902 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount918459891.mount: Deactivated successfully. Jul 15 11:32:28.769680 kubelet[1448]: E0715 11:32:28.769628 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:29.770686 kubelet[1448]: E0715 11:32:29.770638 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:29.798079 env[1205]: time="2025-07-15T11:32:29.798030066Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:32:29.800911 env[1205]: time="2025-07-15T11:32:29.800884344Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cc52550d767f73458fee2ee68db9db5de30d175e8fa4569ebdb43610127b6d20,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:32:29.802515 env[1205]: time="2025-07-15T11:32:29.802480808Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:32:29.803972 env[1205]: time="2025-07-15T11:32:29.803936173Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e94d49349cc361ef2216d27dda4a097278984d778279f66e79b0616c827c6760,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:32:29.804318 env[1205]: time="2025-07-15T11:32:29.804284547Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.2\" returns image reference \"sha256:cc52550d767f73458fee2ee68db9db5de30d175e8fa4569ebdb43610127b6d20\"" Jul 15 11:32:29.815336 env[1205]: time="2025-07-15T11:32:29.815287379Z" level=info msg="CreateContainer within sandbox \"5400784806b719b5fc39463ce55e25b8580bfa67df267459dee0bb0dc4c22340\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Jul 15 11:32:29.844706 env[1205]: time="2025-07-15T11:32:29.844652129Z" level=info msg="CreateContainer within sandbox \"5400784806b719b5fc39463ce55e25b8580bfa67df267459dee0bb0dc4c22340\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"571ab9edd203c9ebfd03de2affe7937db189b72a3127988501f1a0b75b6667bb\"" Jul 15 11:32:29.845200 env[1205]: time="2025-07-15T11:32:29.845166670Z" level=info msg="StartContainer for \"571ab9edd203c9ebfd03de2affe7937db189b72a3127988501f1a0b75b6667bb\"" Jul 15 11:32:29.872578 systemd[1]: Started cri-containerd-571ab9edd203c9ebfd03de2affe7937db189b72a3127988501f1a0b75b6667bb.scope. Jul 15 11:32:29.883000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:29.884890 kernel: kauditd_printk_skb: 2 callbacks suppressed Jul 15 11:32:29.885043 kernel: audit: type=1400 audit(1752579149.883:552): avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:29.883000 audit[2016]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f4f9d0ad4d8 items=0 ppid=1516 pid=2016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:29.892155 kernel: audit: type=1300 audit(1752579149.883:552): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f4f9d0ad4d8 items=0 ppid=1516 pid=2016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:29.892195 kernel: audit: type=1327 audit(1752579149.883:552): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537316162396564643230336339656266643033646532616666653739 Jul 15 11:32:29.883000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537316162396564643230336339656266643033646532616666653739 Jul 15 11:32:29.895899 kernel: audit: type=1400 audit(1752579149.884:553): avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:29.884000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:29.898628 kernel: audit: type=1400 audit(1752579149.884:553): avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:29.884000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:29.884000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:29.904186 kernel: audit: type=1400 audit(1752579149.884:553): avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:29.904225 kernel: audit: type=1400 audit(1752579149.884:553): avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:29.884000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:29.907004 kernel: audit: type=1400 audit(1752579149.884:553): avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:29.884000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:29.884000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:29.912513 kernel: audit: type=1400 audit(1752579149.884:553): avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:29.912554 kernel: audit: type=1400 audit(1752579149.884:553): avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:29.884000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:29.884000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:29.884000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:29.884000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:29.884000 audit: BPF prog-id=78 op=LOAD Jul 15 11:32:29.884000 audit[2016]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002350c8 items=0 ppid=1516 pid=2016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:29.884000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537316162396564643230336339656266643033646532616666653739 Jul 15 11:32:29.891000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:29.891000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:29.891000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:29.891000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:29.891000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:29.891000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:29.891000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:29.891000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:29.891000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:29.891000 audit: BPF prog-id=79 op=LOAD Jul 15 11:32:29.891000 audit[2016]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000235118 items=0 ppid=1516 pid=2016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:29.891000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537316162396564643230336339656266643033646532616666653739 Jul 15 11:32:29.897000 audit: BPF prog-id=79 op=UNLOAD Jul 15 11:32:29.897000 audit: BPF prog-id=78 op=UNLOAD Jul 15 11:32:29.897000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:29.897000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:29.897000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:29.897000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:29.897000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:29.897000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:29.897000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:29.897000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:29.897000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:29.897000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:29.897000 audit: BPF prog-id=80 op=LOAD Jul 15 11:32:29.897000 audit[2016]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002351a8 items=0 ppid=1516 pid=2016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:29.897000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537316162396564643230336339656266643033646532616666653739 Jul 15 11:32:29.991266 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Jul 15 11:32:29.991412 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Jul 15 11:32:30.293650 env[1205]: time="2025-07-15T11:32:30.293610776Z" level=info msg="StartContainer for \"571ab9edd203c9ebfd03de2affe7937db189b72a3127988501f1a0b75b6667bb\" returns successfully" Jul 15 11:32:30.644000 audit[2076]: NETFILTER_CFG table=filter:79 family=2 entries=12 op=nft_register_rule pid=2076 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:32:30.644000 audit[2076]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffeced32140 a2=0 a3=7ffeced3212c items=0 ppid=1669 pid=2076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:30.644000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:32:30.650000 audit[2076]: NETFILTER_CFG table=nat:80 family=2 entries=22 op=nft_register_rule pid=2076 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:32:30.650000 audit[2076]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffeced32140 a2=0 a3=7ffeced3212c items=0 ppid=1669 pid=2076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:30.650000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:32:30.744000 audit[2078]: NETFILTER_CFG table=filter:81 family=2 entries=11 op=nft_register_rule pid=2078 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:32:30.744000 audit[2078]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fffd5b0d9d0 a2=0 a3=7fffd5b0d9bc items=0 ppid=1669 pid=2078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:30.744000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:32:30.748000 audit[2078]: NETFILTER_CFG table=nat:82 family=2 entries=29 op=nft_register_chain pid=2078 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:32:30.748000 audit[2078]: SYSCALL arch=c000003e syscall=46 success=yes exit=10116 a0=3 a1=7fffd5b0d9d0 a2=0 a3=7fffd5b0d9bc items=0 ppid=1669 pid=2078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:30.748000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:32:30.770950 kubelet[1448]: E0715 11:32:30.770913 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:31.309583 kubelet[1448]: I0715 11:32:31.309526 1448 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-j4tw2" podStartSLOduration=5.509839214 podStartE2EDuration="26.309513723s" podCreationTimestamp="2025-07-15 11:32:05 +0000 UTC" firstStartedPulling="2025-07-15 11:32:09.005421586 +0000 UTC m=+4.528461296" lastFinishedPulling="2025-07-15 11:32:29.805096095 +0000 UTC m=+25.328135805" observedRunningTime="2025-07-15 11:32:31.309253796 +0000 UTC m=+26.832293506" watchObservedRunningTime="2025-07-15 11:32:31.309513723 +0000 UTC m=+26.832553433" Jul 15 11:32:31.619000 audit[2146]: AVC avc: denied { write } for pid=2146 comm="tee" name="fd" dev="proc" ino=21565 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 15 11:32:31.619000 audit[2146]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffee68097ee a2=241 a3=1b6 items=1 ppid=2094 pid=2146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.619000 audit: CWD cwd="/etc/service/enabled/bird/log" Jul 15 11:32:31.619000 audit: PATH item=0 name="/dev/fd/63" inode=19021 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:31.619000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 15 11:32:31.622000 audit[2126]: AVC avc: denied { write } for pid=2126 comm="tee" name="fd" dev="proc" ino=19030 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 15 11:32:31.622000 audit[2126]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff3210d7ed a2=241 a3=1b6 items=1 ppid=2087 pid=2126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.622000 audit: CWD cwd="/etc/service/enabled/felix/log" Jul 15 11:32:31.622000 audit: PATH item=0 name="/dev/fd/63" inode=21557 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:31.622000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 15 11:32:31.625000 audit[2152]: AVC avc: denied { write } for pid=2152 comm="tee" name="fd" dev="proc" ino=19034 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 15 11:32:31.627000 audit[2148]: AVC avc: denied { write } for pid=2148 comm="tee" name="fd" dev="proc" ino=20930 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 15 11:32:31.627000 audit[2148]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffff504e7dd a2=241 a3=1b6 items=1 ppid=2097 pid=2148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.627000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Jul 15 11:32:31.627000 audit: PATH item=0 name="/dev/fd/63" inode=20924 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:31.627000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 15 11:32:31.634000 audit[2154]: AVC avc: denied { write } for pid=2154 comm="tee" name="fd" dev="proc" ino=19038 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 15 11:32:31.634000 audit[2154]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffdfe5a7de a2=241 a3=1b6 items=1 ppid=2089 pid=2154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.634000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Jul 15 11:32:31.634000 audit: PATH item=0 name="/dev/fd/63" inode=19027 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:31.634000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 15 11:32:31.625000 audit[2152]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffda34177ed a2=241 a3=1b6 items=1 ppid=2096 pid=2152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.625000 audit: CWD cwd="/etc/service/enabled/bird6/log" Jul 15 11:32:31.625000 audit: PATH item=0 name="/dev/fd/63" inode=19024 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:31.625000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 15 11:32:31.647000 audit[2150]: AVC avc: denied { write } for pid=2150 comm="tee" name="fd" dev="proc" ino=20934 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 15 11:32:31.647000 audit[2150]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe2e9ae7ef a2=241 a3=1b6 items=1 ppid=2090 pid=2150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.647000 audit: CWD cwd="/etc/service/enabled/cni/log" Jul 15 11:32:31.647000 audit: PATH item=0 name="/dev/fd/63" inode=20927 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:31.659000 audit[2168]: AVC avc: denied { write } for pid=2168 comm="tee" name="fd" dev="proc" ino=19949 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 15 11:32:31.659000 audit[2168]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe319d07ed a2=241 a3=1b6 items=1 ppid=2093 pid=2168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.659000 audit: CWD cwd="/etc/service/enabled/confd/log" Jul 15 11:32:31.659000 audit: PATH item=0 name="/dev/fd/63" inode=19946 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:31.659000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 15 11:32:31.647000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 15 11:32:31.768000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.768000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.768000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.768000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.768000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.768000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.768000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.768000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.768000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.768000 audit: BPF prog-id=81 op=LOAD Jul 15 11:32:31.768000 audit[2207]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcf06652a0 a2=98 a3=1fffffffffffffff items=0 ppid=2088 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.768000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 15 11:32:31.768000 audit: BPF prog-id=81 op=UNLOAD Jul 15 11:32:31.768000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.768000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.768000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.768000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.768000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.768000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.768000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.768000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.768000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.768000 audit: BPF prog-id=82 op=LOAD Jul 15 11:32:31.768000 audit[2207]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcf0665180 a2=94 a3=3 items=0 ppid=2088 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.768000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 15 11:32:31.768000 audit: BPF prog-id=82 op=UNLOAD Jul 15 11:32:31.768000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.768000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.768000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.768000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.768000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.768000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.768000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.768000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.768000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.768000 audit: BPF prog-id=83 op=LOAD Jul 15 11:32:31.768000 audit[2207]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcf06651c0 a2=94 a3=7ffcf06653a0 items=0 ppid=2088 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.768000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 15 11:32:31.768000 audit: BPF prog-id=83 op=UNLOAD Jul 15 11:32:31.768000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.768000 audit[2207]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffcf0665290 a2=50 a3=a000000085 items=0 ppid=2088 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.768000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 15 11:32:31.770000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.770000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.770000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.770000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.770000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.770000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.770000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.770000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.770000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.770000 audit: BPF prog-id=84 op=LOAD Jul 15 11:32:31.770000 audit[2208]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc0110ffb0 a2=98 a3=3 items=0 ppid=2088 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.770000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:32:31.770000 audit: BPF prog-id=84 op=UNLOAD Jul 15 11:32:31.770000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.770000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.770000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.770000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.770000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.770000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.770000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.770000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.770000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.770000 audit: BPF prog-id=85 op=LOAD Jul 15 11:32:31.770000 audit[2208]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc0110fda0 a2=94 a3=54428f items=0 ppid=2088 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.770000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:32:31.770000 audit: BPF prog-id=85 op=UNLOAD Jul 15 11:32:31.770000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.770000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.770000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.770000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.770000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.770000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.770000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.770000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.770000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.770000 audit: BPF prog-id=86 op=LOAD Jul 15 11:32:31.770000 audit[2208]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc0110fdd0 a2=94 a3=2 items=0 ppid=2088 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.770000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:32:31.771000 audit: BPF prog-id=86 op=UNLOAD Jul 15 11:32:31.772492 kubelet[1448]: E0715 11:32:31.771279 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:31.877000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.877000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.877000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.877000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.877000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.877000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.877000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.877000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.877000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.877000 audit: BPF prog-id=87 op=LOAD Jul 15 11:32:31.877000 audit[2208]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc0110fc90 a2=94 a3=1 items=0 ppid=2088 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.877000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:32:31.877000 audit: BPF prog-id=87 op=UNLOAD Jul 15 11:32:31.877000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.877000 audit[2208]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc0110fd60 a2=50 a3=7ffc0110fe40 items=0 ppid=2088 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.877000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:32:31.886000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.886000 audit[2208]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc0110fca0 a2=28 a3=0 items=0 ppid=2088 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.886000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:32:31.886000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.886000 audit[2208]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc0110fcd0 a2=28 a3=0 items=0 ppid=2088 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.886000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:32:31.886000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.886000 audit[2208]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc0110fbe0 a2=28 a3=0 items=0 ppid=2088 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.886000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:32:31.886000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.886000 audit[2208]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc0110fcf0 a2=28 a3=0 items=0 ppid=2088 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.886000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:32:31.886000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.886000 audit[2208]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc0110fcd0 a2=28 a3=0 items=0 ppid=2088 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.886000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:32:31.886000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.886000 audit[2208]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc0110fcc0 a2=28 a3=0 items=0 ppid=2088 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.886000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:32:31.886000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.886000 audit[2208]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc0110fcf0 a2=28 a3=0 items=0 ppid=2088 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.886000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:32:31.886000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.886000 audit[2208]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc0110fcd0 a2=28 a3=0 items=0 ppid=2088 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.886000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:32:31.886000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.886000 audit[2208]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc0110fcf0 a2=28 a3=0 items=0 ppid=2088 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.886000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:32:31.886000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.886000 audit[2208]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc0110fcc0 a2=28 a3=0 items=0 ppid=2088 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.886000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:32:31.886000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.886000 audit[2208]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc0110fd30 a2=28 a3=0 items=0 ppid=2088 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.886000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:32:31.886000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.886000 audit[2208]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc0110fae0 a2=50 a3=1 items=0 ppid=2088 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.886000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:32:31.886000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.886000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.886000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.886000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.886000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.886000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.886000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.886000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.886000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.886000 audit: BPF prog-id=88 op=LOAD Jul 15 11:32:31.886000 audit[2208]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc0110fae0 a2=94 a3=5 items=0 ppid=2088 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.886000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:32:31.886000 audit: BPF prog-id=88 op=UNLOAD Jul 15 11:32:31.886000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.886000 audit[2208]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc0110fb90 a2=50 a3=1 items=0 ppid=2088 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.886000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:32:31.886000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.886000 audit[2208]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc0110fcb0 a2=4 a3=38 items=0 ppid=2088 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.886000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:32:31.887000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.887000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.887000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.887000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.887000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.887000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.887000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.887000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.887000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.887000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.887000 audit[2208]: AVC avc: denied { confidentiality } for pid=2208 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:32:31.887000 audit[2208]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc0110fd00 a2=94 a3=6 items=0 ppid=2088 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.887000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:32:31.887000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.887000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.887000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.887000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.887000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.887000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.887000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.887000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.887000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.887000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.887000 audit[2208]: AVC avc: denied { confidentiality } for pid=2208 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:32:31.887000 audit[2208]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc0110f4b0 a2=94 a3=88 items=0 ppid=2088 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.887000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:32:31.887000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.887000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.887000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.887000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.887000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.887000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.887000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.887000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.887000 audit[2208]: AVC avc: denied { perfmon } for pid=2208 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.887000 audit[2208]: AVC avc: denied { bpf } for pid=2208 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.887000 audit[2208]: AVC avc: denied { confidentiality } for pid=2208 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:32:31.887000 audit[2208]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc0110f4b0 a2=94 a3=88 items=0 ppid=2088 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.887000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:32:31.894000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.894000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.894000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.894000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.894000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.894000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.894000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.894000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.894000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.894000 audit: BPF prog-id=89 op=LOAD Jul 15 11:32:31.894000 audit[2211]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd1a927a40 a2=98 a3=1999999999999999 items=0 ppid=2088 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.894000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Jul 15 11:32:31.894000 audit: BPF prog-id=89 op=UNLOAD Jul 15 11:32:31.894000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.894000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.894000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.894000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.894000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.894000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.894000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.894000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.894000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.894000 audit: BPF prog-id=90 op=LOAD Jul 15 11:32:31.894000 audit[2211]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd1a927920 a2=94 a3=ffff items=0 ppid=2088 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.894000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Jul 15 11:32:31.894000 audit: BPF prog-id=90 op=UNLOAD Jul 15 11:32:31.894000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.894000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.894000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.894000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.894000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.894000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.894000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.894000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.894000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.894000 audit: BPF prog-id=91 op=LOAD Jul 15 11:32:31.894000 audit[2211]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd1a927960 a2=94 a3=7ffd1a927b40 items=0 ppid=2088 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.894000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Jul 15 11:32:31.894000 audit: BPF prog-id=91 op=UNLOAD Jul 15 11:32:31.950475 systemd-networkd[1028]: vxlan.calico: Link UP Jul 15 11:32:31.950485 systemd-networkd[1028]: vxlan.calico: Gained carrier Jul 15 11:32:31.962000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.962000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.962000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.962000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.962000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.962000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.962000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.962000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.962000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.962000 audit: BPF prog-id=92 op=LOAD Jul 15 11:32:31.962000 audit[2238]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff9baddce0 a2=98 a3=0 items=0 ppid=2088 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.962000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:32:31.962000 audit: BPF prog-id=92 op=UNLOAD Jul 15 11:32:31.962000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.962000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.962000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.962000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.962000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.962000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.962000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.962000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.962000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.962000 audit: BPF prog-id=93 op=LOAD Jul 15 11:32:31.962000 audit[2238]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff9baddaf0 a2=94 a3=54428f items=0 ppid=2088 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.962000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:32:31.962000 audit: BPF prog-id=93 op=UNLOAD Jul 15 11:32:31.962000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.962000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.962000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.962000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.962000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.962000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.962000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.962000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.962000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.962000 audit: BPF prog-id=94 op=LOAD Jul 15 11:32:31.962000 audit[2238]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff9baddb20 a2=94 a3=2 items=0 ppid=2088 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.962000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:32:31.962000 audit: BPF prog-id=94 op=UNLOAD Jul 15 11:32:31.962000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.962000 audit[2238]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff9badd9f0 a2=28 a3=0 items=0 ppid=2088 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.962000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:32:31.962000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.962000 audit[2238]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff9badda20 a2=28 a3=0 items=0 ppid=2088 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.962000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:32:31.962000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.962000 audit[2238]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff9badd930 a2=28 a3=0 items=0 ppid=2088 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.962000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:32:31.962000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.962000 audit[2238]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff9badda40 a2=28 a3=0 items=0 ppid=2088 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.962000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:32:31.962000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.962000 audit[2238]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff9badda20 a2=28 a3=0 items=0 ppid=2088 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.962000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:32:31.962000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.962000 audit[2238]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff9badda10 a2=28 a3=0 items=0 ppid=2088 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.962000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:32:31.962000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.962000 audit[2238]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff9badda40 a2=28 a3=0 items=0 ppid=2088 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.962000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:32:31.962000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.962000 audit[2238]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff9badda20 a2=28 a3=0 items=0 ppid=2088 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.962000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:32:31.963000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.963000 audit[2238]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff9badda40 a2=28 a3=0 items=0 ppid=2088 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.963000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:32:31.963000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.963000 audit[2238]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff9badda10 a2=28 a3=0 items=0 ppid=2088 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.963000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:32:31.963000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.963000 audit[2238]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff9badda80 a2=28 a3=0 items=0 ppid=2088 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.963000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:32:31.963000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.963000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.963000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.963000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.963000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.963000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.963000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.963000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.963000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.963000 audit: BPF prog-id=95 op=LOAD Jul 15 11:32:31.963000 audit[2238]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff9badd8f0 a2=94 a3=0 items=0 ppid=2088 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.963000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:32:31.963000 audit: BPF prog-id=95 op=UNLOAD Jul 15 11:32:31.963000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.963000 audit[2238]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fff9badd8e0 a2=50 a3=2800 items=0 ppid=2088 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.963000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:32:31.964000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.964000 audit[2238]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fff9badd8e0 a2=50 a3=2800 items=0 ppid=2088 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.964000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:32:31.964000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.964000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.964000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.964000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.964000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.964000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.964000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.964000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.964000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.964000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.964000 audit: BPF prog-id=96 op=LOAD Jul 15 11:32:31.964000 audit[2238]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff9badd100 a2=94 a3=2 items=0 ppid=2088 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.964000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:32:31.964000 audit: BPF prog-id=96 op=UNLOAD Jul 15 11:32:31.964000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.964000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.964000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.964000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.964000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.964000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.964000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.964000 audit[2238]: AVC avc: denied { perfmon } for pid=2238 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.964000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.964000 audit[2238]: AVC avc: denied { bpf } for pid=2238 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.964000 audit: BPF prog-id=97 op=LOAD Jul 15 11:32:31.964000 audit[2238]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff9badd200 a2=94 a3=30 items=0 ppid=2088 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.964000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:32:31.967000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.967000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.967000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.967000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.967000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.967000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.967000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.967000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.967000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.967000 audit: BPF prog-id=98 op=LOAD Jul 15 11:32:31.967000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff6a639de0 a2=98 a3=0 items=0 ppid=2088 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.967000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:32:31.967000 audit: BPF prog-id=98 op=UNLOAD Jul 15 11:32:31.967000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.967000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.967000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.967000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.967000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.967000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.967000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.967000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.967000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.967000 audit: BPF prog-id=99 op=LOAD Jul 15 11:32:31.967000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff6a639bd0 a2=94 a3=54428f items=0 ppid=2088 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.967000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:32:31.967000 audit: BPF prog-id=99 op=UNLOAD Jul 15 11:32:31.967000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.967000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.967000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.967000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.967000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.967000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.967000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.967000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.967000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:31.967000 audit: BPF prog-id=100 op=LOAD Jul 15 11:32:31.967000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff6a639c00 a2=94 a3=2 items=0 ppid=2088 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:31.967000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:32:31.967000 audit: BPF prog-id=100 op=UNLOAD Jul 15 11:32:32.072000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.072000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.072000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.072000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.072000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.072000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.072000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.072000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.072000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.072000 audit: BPF prog-id=101 op=LOAD Jul 15 11:32:32.072000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff6a639ac0 a2=94 a3=1 items=0 ppid=2088 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:32.072000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:32:32.072000 audit: BPF prog-id=101 op=UNLOAD Jul 15 11:32:32.072000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.072000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff6a639b90 a2=50 a3=7fff6a639c70 items=0 ppid=2088 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:32.072000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:32:32.080000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.080000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff6a639ad0 a2=28 a3=0 items=0 ppid=2088 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:32.080000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:32:32.080000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.080000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff6a639b00 a2=28 a3=0 items=0 ppid=2088 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:32.080000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:32:32.080000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.080000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff6a639a10 a2=28 a3=0 items=0 ppid=2088 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:32.080000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:32:32.080000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.080000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff6a639b20 a2=28 a3=0 items=0 ppid=2088 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:32.080000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:32:32.080000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.080000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff6a639b00 a2=28 a3=0 items=0 ppid=2088 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:32.080000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:32:32.080000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.080000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff6a639af0 a2=28 a3=0 items=0 ppid=2088 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:32.080000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:32:32.080000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.080000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff6a639b20 a2=28 a3=0 items=0 ppid=2088 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:32.080000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:32:32.080000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.080000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff6a639b00 a2=28 a3=0 items=0 ppid=2088 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:32.080000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:32:32.080000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.080000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff6a639b20 a2=28 a3=0 items=0 ppid=2088 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:32.080000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:32:32.080000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.080000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff6a639af0 a2=28 a3=0 items=0 ppid=2088 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:32.080000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:32:32.080000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.080000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff6a639b60 a2=28 a3=0 items=0 ppid=2088 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:32.080000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:32:32.080000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.080000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff6a639910 a2=50 a3=1 items=0 ppid=2088 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:32.080000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:32:32.080000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.080000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.080000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.080000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.080000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.080000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.080000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.080000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.080000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.080000 audit: BPF prog-id=102 op=LOAD Jul 15 11:32:32.080000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff6a639910 a2=94 a3=5 items=0 ppid=2088 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:32.080000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:32:32.080000 audit: BPF prog-id=102 op=UNLOAD Jul 15 11:32:32.080000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.080000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff6a6399c0 a2=50 a3=1 items=0 ppid=2088 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:32.080000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:32:32.080000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.080000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff6a639ae0 a2=4 a3=38 items=0 ppid=2088 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:32.080000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:32:32.080000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.080000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.080000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.080000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.080000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.080000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.080000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.080000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.080000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.080000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.080000 audit[2242]: AVC avc: denied { confidentiality } for pid=2242 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:32:32.080000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff6a639b30 a2=94 a3=6 items=0 ppid=2088 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:32.080000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:32:32.081000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.081000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.081000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.081000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.081000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.081000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.081000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.081000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.081000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.081000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.081000 audit[2242]: AVC avc: denied { confidentiality } for pid=2242 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:32:32.081000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff6a6392e0 a2=94 a3=88 items=0 ppid=2088 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:32.081000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:32:32.081000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.081000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.081000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.081000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.081000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.081000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.081000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.081000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.081000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.081000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.081000 audit[2242]: AVC avc: denied { confidentiality } for pid=2242 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:32:32.081000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff6a6392e0 a2=94 a3=88 items=0 ppid=2088 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:32.081000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:32:32.081000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.081000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff6a63ad10 a2=10 a3=208 items=0 ppid=2088 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:32.081000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:32:32.081000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.081000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff6a63abb0 a2=10 a3=3 items=0 ppid=2088 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:32.081000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:32:32.081000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.081000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff6a63ab50 a2=10 a3=3 items=0 ppid=2088 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:32.081000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:32:32.081000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:32.081000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff6a63ab50 a2=10 a3=7 items=0 ppid=2088 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:32.081000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:32:32.088000 audit: BPF prog-id=97 op=UNLOAD Jul 15 11:32:32.125000 audit[2271]: NETFILTER_CFG table=mangle:83 family=2 entries=16 op=nft_register_chain pid=2271 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 15 11:32:32.125000 audit[2271]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffcb7ca1600 a2=0 a3=7ffcb7ca15ec items=0 ppid=2088 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:32.125000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 15 11:32:32.130000 audit[2270]: NETFILTER_CFG table=nat:84 family=2 entries=15 op=nft_register_chain pid=2270 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 15 11:32:32.130000 audit[2270]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffc6ba30270 a2=0 a3=7ffc6ba3025c items=0 ppid=2088 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:32.130000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 15 11:32:32.137000 audit[2269]: NETFILTER_CFG table=raw:85 family=2 entries=21 op=nft_register_chain pid=2269 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 15 11:32:32.137000 audit[2269]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7fffcc5bdac0 a2=0 a3=7fffcc5bdaac items=0 ppid=2088 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:32.137000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 15 11:32:32.142000 audit[2274]: NETFILTER_CFG table=filter:86 family=2 entries=39 op=nft_register_chain pid=2274 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 15 11:32:32.142000 audit[2274]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7fff8a13f7e0 a2=0 a3=7fff8a13f7cc items=0 ppid=2088 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:32.142000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 15 11:32:32.772051 kubelet[1448]: E0715 11:32:32.772001 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:33.054057 systemd-networkd[1028]: vxlan.calico: Gained IPv6LL Jul 15 11:32:33.141814 env[1205]: time="2025-07-15T11:32:33.141738605Z" level=info msg="StopPodSandbox for \"b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9\"" Jul 15 11:32:33.265909 env[1205]: 2025-07-15 11:32:33.237 [INFO][2292] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9" Jul 15 11:32:33.265909 env[1205]: 2025-07-15 11:32:33.237 [INFO][2292] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9" iface="eth0" netns="/var/run/netns/cni-9190ab65-ac30-d6c6-2c61-fa9b6b1b6731" Jul 15 11:32:33.265909 env[1205]: 2025-07-15 11:32:33.237 [INFO][2292] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9" iface="eth0" netns="/var/run/netns/cni-9190ab65-ac30-d6c6-2c61-fa9b6b1b6731" Jul 15 11:32:33.265909 env[1205]: 2025-07-15 11:32:33.237 [INFO][2292] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9" iface="eth0" netns="/var/run/netns/cni-9190ab65-ac30-d6c6-2c61-fa9b6b1b6731" Jul 15 11:32:33.265909 env[1205]: 2025-07-15 11:32:33.237 [INFO][2292] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9" Jul 15 11:32:33.265909 env[1205]: 2025-07-15 11:32:33.237 [INFO][2292] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9" Jul 15 11:32:33.265909 env[1205]: 2025-07-15 11:32:33.253 [INFO][2301] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9" HandleID="k8s-pod-network.b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9" Workload="10.0.0.87-k8s-csi--node--driver--vtfgv-eth0" Jul 15 11:32:33.265909 env[1205]: 2025-07-15 11:32:33.253 [INFO][2301] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 15 11:32:33.265909 env[1205]: 2025-07-15 11:32:33.253 [INFO][2301] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 15 11:32:33.265909 env[1205]: 2025-07-15 11:32:33.260 [WARNING][2301] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9" HandleID="k8s-pod-network.b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9" Workload="10.0.0.87-k8s-csi--node--driver--vtfgv-eth0" Jul 15 11:32:33.265909 env[1205]: 2025-07-15 11:32:33.260 [INFO][2301] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9" HandleID="k8s-pod-network.b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9" Workload="10.0.0.87-k8s-csi--node--driver--vtfgv-eth0" Jul 15 11:32:33.265909 env[1205]: 2025-07-15 11:32:33.262 [INFO][2301] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 15 11:32:33.265909 env[1205]: 2025-07-15 11:32:33.264 [INFO][2292] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9" Jul 15 11:32:33.266364 env[1205]: time="2025-07-15T11:32:33.266044442Z" level=info msg="TearDown network for sandbox \"b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9\" successfully" Jul 15 11:32:33.266364 env[1205]: time="2025-07-15T11:32:33.266077514Z" level=info msg="StopPodSandbox for \"b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9\" returns successfully" Jul 15 11:32:33.266766 env[1205]: time="2025-07-15T11:32:33.266743748Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-vtfgv,Uid:532a9ca4-afe0-4bce-901e-f33b2d9c1f64,Namespace:calico-system,Attempt:1,}" Jul 15 11:32:33.267644 systemd[1]: run-netns-cni\x2d9190ab65\x2dac30\x2dd6c6\x2d2c61\x2dfa9b6b1b6731.mount: Deactivated successfully. Jul 15 11:32:33.365663 systemd-networkd[1028]: cali70bb8d9b7df: Link UP Jul 15 11:32:33.367930 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 15 11:32:33.367988 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali70bb8d9b7df: link becomes ready Jul 15 11:32:33.368247 systemd-networkd[1028]: cali70bb8d9b7df: Gained carrier Jul 15 11:32:33.379005 env[1205]: 2025-07-15 11:32:33.313 [INFO][2310] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.87-k8s-csi--node--driver--vtfgv-eth0 csi-node-driver- calico-system 532a9ca4-afe0-4bce-901e-f33b2d9c1f64 1207 0 2025-07-15 11:32:05 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:8967bcb6f k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.0.0.87 csi-node-driver-vtfgv eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali70bb8d9b7df [] [] }} ContainerID="b845b6d2b54f1a1fbebda708d6d276cfbb294eab05a063febab84cfd3f25de51" Namespace="calico-system" Pod="csi-node-driver-vtfgv" WorkloadEndpoint="10.0.0.87-k8s-csi--node--driver--vtfgv-" Jul 15 11:32:33.379005 env[1205]: 2025-07-15 11:32:33.314 [INFO][2310] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="b845b6d2b54f1a1fbebda708d6d276cfbb294eab05a063febab84cfd3f25de51" Namespace="calico-system" Pod="csi-node-driver-vtfgv" WorkloadEndpoint="10.0.0.87-k8s-csi--node--driver--vtfgv-eth0" Jul 15 11:32:33.379005 env[1205]: 2025-07-15 11:32:33.334 [INFO][2324] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b845b6d2b54f1a1fbebda708d6d276cfbb294eab05a063febab84cfd3f25de51" HandleID="k8s-pod-network.b845b6d2b54f1a1fbebda708d6d276cfbb294eab05a063febab84cfd3f25de51" Workload="10.0.0.87-k8s-csi--node--driver--vtfgv-eth0" Jul 15 11:32:33.379005 env[1205]: 2025-07-15 11:32:33.334 [INFO][2324] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b845b6d2b54f1a1fbebda708d6d276cfbb294eab05a063febab84cfd3f25de51" HandleID="k8s-pod-network.b845b6d2b54f1a1fbebda708d6d276cfbb294eab05a063febab84cfd3f25de51" Workload="10.0.0.87-k8s-csi--node--driver--vtfgv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000135b80), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.87", "pod":"csi-node-driver-vtfgv", "timestamp":"2025-07-15 11:32:33.33451357 +0000 UTC"}, Hostname:"10.0.0.87", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 15 11:32:33.379005 env[1205]: 2025-07-15 11:32:33.334 [INFO][2324] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 15 11:32:33.379005 env[1205]: 2025-07-15 11:32:33.334 [INFO][2324] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 15 11:32:33.379005 env[1205]: 2025-07-15 11:32:33.334 [INFO][2324] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.87' Jul 15 11:32:33.379005 env[1205]: 2025-07-15 11:32:33.341 [INFO][2324] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.b845b6d2b54f1a1fbebda708d6d276cfbb294eab05a063febab84cfd3f25de51" host="10.0.0.87" Jul 15 11:32:33.379005 env[1205]: 2025-07-15 11:32:33.345 [INFO][2324] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.87" Jul 15 11:32:33.379005 env[1205]: 2025-07-15 11:32:33.349 [INFO][2324] ipam/ipam.go 511: Trying affinity for 192.168.45.0/26 host="10.0.0.87" Jul 15 11:32:33.379005 env[1205]: 2025-07-15 11:32:33.351 [INFO][2324] ipam/ipam.go 158: Attempting to load block cidr=192.168.45.0/26 host="10.0.0.87" Jul 15 11:32:33.379005 env[1205]: 2025-07-15 11:32:33.353 [INFO][2324] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.45.0/26 host="10.0.0.87" Jul 15 11:32:33.379005 env[1205]: 2025-07-15 11:32:33.353 [INFO][2324] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.45.0/26 handle="k8s-pod-network.b845b6d2b54f1a1fbebda708d6d276cfbb294eab05a063febab84cfd3f25de51" host="10.0.0.87" Jul 15 11:32:33.379005 env[1205]: 2025-07-15 11:32:33.355 [INFO][2324] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.b845b6d2b54f1a1fbebda708d6d276cfbb294eab05a063febab84cfd3f25de51 Jul 15 11:32:33.379005 env[1205]: 2025-07-15 11:32:33.358 [INFO][2324] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.45.0/26 handle="k8s-pod-network.b845b6d2b54f1a1fbebda708d6d276cfbb294eab05a063febab84cfd3f25de51" host="10.0.0.87" Jul 15 11:32:33.379005 env[1205]: 2025-07-15 11:32:33.361 [INFO][2324] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.45.1/26] block=192.168.45.0/26 handle="k8s-pod-network.b845b6d2b54f1a1fbebda708d6d276cfbb294eab05a063febab84cfd3f25de51" host="10.0.0.87" Jul 15 11:32:33.379005 env[1205]: 2025-07-15 11:32:33.361 [INFO][2324] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.45.1/26] handle="k8s-pod-network.b845b6d2b54f1a1fbebda708d6d276cfbb294eab05a063febab84cfd3f25de51" host="10.0.0.87" Jul 15 11:32:33.379005 env[1205]: 2025-07-15 11:32:33.361 [INFO][2324] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 15 11:32:33.379005 env[1205]: 2025-07-15 11:32:33.361 [INFO][2324] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.45.1/26] IPv6=[] ContainerID="b845b6d2b54f1a1fbebda708d6d276cfbb294eab05a063febab84cfd3f25de51" HandleID="k8s-pod-network.b845b6d2b54f1a1fbebda708d6d276cfbb294eab05a063febab84cfd3f25de51" Workload="10.0.0.87-k8s-csi--node--driver--vtfgv-eth0" Jul 15 11:32:33.379679 env[1205]: 2025-07-15 11:32:33.363 [INFO][2310] cni-plugin/k8s.go 418: Populated endpoint ContainerID="b845b6d2b54f1a1fbebda708d6d276cfbb294eab05a063febab84cfd3f25de51" Namespace="calico-system" Pod="csi-node-driver-vtfgv" WorkloadEndpoint="10.0.0.87-k8s-csi--node--driver--vtfgv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.87-k8s-csi--node--driver--vtfgv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"532a9ca4-afe0-4bce-901e-f33b2d9c1f64", ResourceVersion:"1207", Generation:0, CreationTimestamp:time.Date(2025, time.July, 15, 11, 32, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"8967bcb6f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.87", ContainerID:"", Pod:"csi-node-driver-vtfgv", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.45.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali70bb8d9b7df", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 15 11:32:33.379679 env[1205]: 2025-07-15 11:32:33.363 [INFO][2310] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.45.1/32] ContainerID="b845b6d2b54f1a1fbebda708d6d276cfbb294eab05a063febab84cfd3f25de51" Namespace="calico-system" Pod="csi-node-driver-vtfgv" WorkloadEndpoint="10.0.0.87-k8s-csi--node--driver--vtfgv-eth0" Jul 15 11:32:33.379679 env[1205]: 2025-07-15 11:32:33.363 [INFO][2310] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali70bb8d9b7df ContainerID="b845b6d2b54f1a1fbebda708d6d276cfbb294eab05a063febab84cfd3f25de51" Namespace="calico-system" Pod="csi-node-driver-vtfgv" WorkloadEndpoint="10.0.0.87-k8s-csi--node--driver--vtfgv-eth0" Jul 15 11:32:33.379679 env[1205]: 2025-07-15 11:32:33.368 [INFO][2310] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b845b6d2b54f1a1fbebda708d6d276cfbb294eab05a063febab84cfd3f25de51" Namespace="calico-system" Pod="csi-node-driver-vtfgv" WorkloadEndpoint="10.0.0.87-k8s-csi--node--driver--vtfgv-eth0" Jul 15 11:32:33.379679 env[1205]: 2025-07-15 11:32:33.369 [INFO][2310] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="b845b6d2b54f1a1fbebda708d6d276cfbb294eab05a063febab84cfd3f25de51" Namespace="calico-system" Pod="csi-node-driver-vtfgv" WorkloadEndpoint="10.0.0.87-k8s-csi--node--driver--vtfgv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.87-k8s-csi--node--driver--vtfgv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"532a9ca4-afe0-4bce-901e-f33b2d9c1f64", ResourceVersion:"1207", Generation:0, CreationTimestamp:time.Date(2025, time.July, 15, 11, 32, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"8967bcb6f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.87", ContainerID:"b845b6d2b54f1a1fbebda708d6d276cfbb294eab05a063febab84cfd3f25de51", Pod:"csi-node-driver-vtfgv", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.45.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali70bb8d9b7df", MAC:"66:01:41:e6:82:90", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 15 11:32:33.379679 env[1205]: 2025-07-15 11:32:33.376 [INFO][2310] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="b845b6d2b54f1a1fbebda708d6d276cfbb294eab05a063febab84cfd3f25de51" Namespace="calico-system" Pod="csi-node-driver-vtfgv" WorkloadEndpoint="10.0.0.87-k8s-csi--node--driver--vtfgv-eth0" Jul 15 11:32:33.387627 env[1205]: time="2025-07-15T11:32:33.387571008Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 15 11:32:33.387714 env[1205]: time="2025-07-15T11:32:33.387628677Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 15 11:32:33.387714 env[1205]: time="2025-07-15T11:32:33.387639698Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 15 11:32:33.387909 env[1205]: time="2025-07-15T11:32:33.387810861Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b845b6d2b54f1a1fbebda708d6d276cfbb294eab05a063febab84cfd3f25de51 pid=2349 runtime=io.containerd.runc.v2 Jul 15 11:32:33.401254 systemd[1]: Started cri-containerd-b845b6d2b54f1a1fbebda708d6d276cfbb294eab05a063febab84cfd3f25de51.scope. Jul 15 11:32:33.390000 audit[2345]: NETFILTER_CFG table=filter:87 family=2 entries=38 op=nft_register_chain pid=2345 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 15 11:32:33.390000 audit[2345]: SYSCALL arch=c000003e syscall=46 success=yes exit=21364 a0=3 a1=7ffc664f02a0 a2=0 a3=7ffc664f028c items=0 ppid=2088 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:33.390000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 15 11:32:33.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:33.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:33.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:33.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:33.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:33.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:33.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:33.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:33.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:33.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:33.409000 audit: BPF prog-id=103 op=LOAD Jul 15 11:32:33.409000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:33.409000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2349 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:33.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238343562366432623534663161316662656264613730386436643237 Jul 15 11:32:33.409000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:33.409000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2349 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:33.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238343562366432623534663161316662656264613730386436643237 Jul 15 11:32:33.409000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:33.409000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:33.409000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:33.409000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:33.409000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:33.409000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:33.409000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:33.409000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:33.409000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:33.409000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:33.409000 audit: BPF prog-id=104 op=LOAD Jul 15 11:32:33.409000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00021eec0 items=0 ppid=2349 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:33.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238343562366432623534663161316662656264613730386436643237 Jul 15 11:32:33.409000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:33.409000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:33.409000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:33.409000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:33.409000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:33.409000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:33.409000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:33.409000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:33.409000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:33.409000 audit: BPF prog-id=105 op=LOAD Jul 15 11:32:33.409000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00021ef08 items=0 ppid=2349 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:33.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238343562366432623534663161316662656264613730386436643237 Jul 15 11:32:33.409000 audit: BPF prog-id=105 op=UNLOAD Jul 15 11:32:33.409000 audit: BPF prog-id=104 op=UNLOAD Jul 15 11:32:33.409000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:33.409000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:33.409000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:33.409000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:33.409000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:33.409000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:33.409000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:33.409000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:33.409000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:33.409000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:33.409000 audit: BPF prog-id=106 op=LOAD Jul 15 11:32:33.409000 audit[2360]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00021f318 items=0 ppid=2349 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:33.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238343562366432623534663161316662656264613730386436643237 Jul 15 11:32:33.411203 systemd-resolved[1146]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 15 11:32:33.420257 env[1205]: time="2025-07-15T11:32:33.420227333Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-vtfgv,Uid:532a9ca4-afe0-4bce-901e-f33b2d9c1f64,Namespace:calico-system,Attempt:1,} returns sandbox id \"b845b6d2b54f1a1fbebda708d6d276cfbb294eab05a063febab84cfd3f25de51\"" Jul 15 11:32:33.421642 env[1205]: time="2025-07-15T11:32:33.421625182Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.2\"" Jul 15 11:32:33.772761 kubelet[1448]: E0715 11:32:33.772720 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:34.215634 kubelet[1448]: I0715 11:32:34.215509 1448 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 15 11:32:34.337786 systemd[1]: run-containerd-runc-k8s.io-571ab9edd203c9ebfd03de2affe7937db189b72a3127988501f1a0b75b6667bb-runc.1lfxZK.mount: Deactivated successfully. Jul 15 11:32:34.773513 kubelet[1448]: E0715 11:32:34.773474 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:34.782031 systemd-networkd[1028]: cali70bb8d9b7df: Gained IPv6LL Jul 15 11:32:35.274357 env[1205]: time="2025-07-15T11:32:35.274308863Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:32:35.276055 env[1205]: time="2025-07-15T11:32:35.276003915Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c7fd1cc652979d89a51bbcc125e28e90c9815c0bd8f922a5bd36eed4e1927c6d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:32:35.277413 env[1205]: time="2025-07-15T11:32:35.277372513Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:32:35.278763 env[1205]: time="2025-07-15T11:32:35.278735136Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e570128aa8067a2f06b96d3cc98afa2e0a4b9790b435ee36ca051c8e72aeb8d0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:32:35.279166 env[1205]: time="2025-07-15T11:32:35.279127626Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.2\" returns image reference \"sha256:c7fd1cc652979d89a51bbcc125e28e90c9815c0bd8f922a5bd36eed4e1927c6d\"" Jul 15 11:32:35.284798 env[1205]: time="2025-07-15T11:32:35.284683449Z" level=info msg="CreateContainer within sandbox \"b845b6d2b54f1a1fbebda708d6d276cfbb294eab05a063febab84cfd3f25de51\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Jul 15 11:32:35.298208 env[1205]: time="2025-07-15T11:32:35.298167437Z" level=info msg="CreateContainer within sandbox \"b845b6d2b54f1a1fbebda708d6d276cfbb294eab05a063febab84cfd3f25de51\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"21cedb62ce6d7290861c538f18ab18b98321ca772c62e9c170871e3ebeafa034\"" Jul 15 11:32:35.298714 env[1205]: time="2025-07-15T11:32:35.298670673Z" level=info msg="StartContainer for \"21cedb62ce6d7290861c538f18ab18b98321ca772c62e9c170871e3ebeafa034\"" Jul 15 11:32:35.313574 systemd[1]: Started cri-containerd-21cedb62ce6d7290861c538f18ab18b98321ca772c62e9c170871e3ebeafa034.scope. Jul 15 11:32:35.325000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:35.327029 kernel: kauditd_printk_skb: 662 callbacks suppressed Jul 15 11:32:35.327085 kernel: audit: type=1400 audit(1752579155.325:690): avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:35.340489 kernel: audit: type=1300 audit(1752579155.325:690): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f1592994a18 items=0 ppid=2349 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:35.340534 kernel: audit: type=1327 audit(1752579155.325:690): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231636564623632636536643732393038363163353338663138616231 Jul 15 11:32:35.340551 kernel: audit: type=1400 audit(1752579155.325:691): avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:35.325000 audit[2440]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f1592994a18 items=0 ppid=2349 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:35.325000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231636564623632636536643732393038363163353338663138616231 Jul 15 11:32:35.325000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:35.325000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:35.343495 kernel: audit: type=1400 audit(1752579155.325:691): avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:35.343528 kernel: audit: type=1400 audit(1752579155.325:691): avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:35.325000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:35.349140 kernel: audit: type=1400 audit(1752579155.325:691): avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:35.325000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:35.352050 kernel: audit: type=1400 audit(1752579155.325:691): avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:35.325000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:35.355305 kernel: audit: type=1400 audit(1752579155.325:691): avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:35.325000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:35.355391 env[1205]: time="2025-07-15T11:32:35.355267371Z" level=info msg="StartContainer for \"21cedb62ce6d7290861c538f18ab18b98321ca772c62e9c170871e3ebeafa034\" returns successfully" Jul 15 11:32:35.325000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:35.325000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:35.359373 env[1205]: time="2025-07-15T11:32:35.359304383Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2\"" Jul 15 11:32:35.325000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:35.325000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:35.325000 audit: BPF prog-id=107 op=LOAD Jul 15 11:32:35.325000 audit[2440]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000d9ba8 items=0 ppid=2349 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:35.325000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231636564623632636536643732393038363163353338663138616231 Jul 15 11:32:35.328000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:35.359863 kernel: audit: type=1400 audit(1752579155.325:691): avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:35.328000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:35.328000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:35.328000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:35.328000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:35.328000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:35.328000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:35.328000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:35.328000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:35.328000 audit: BPF prog-id=108 op=LOAD Jul 15 11:32:35.328000 audit[2440]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000d9bf8 items=0 ppid=2349 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:35.328000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231636564623632636536643732393038363163353338663138616231 Jul 15 11:32:35.333000 audit: BPF prog-id=108 op=UNLOAD Jul 15 11:32:35.333000 audit: BPF prog-id=107 op=UNLOAD Jul 15 11:32:35.333000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:35.333000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:35.333000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:35.333000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:35.333000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:35.333000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:35.333000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:35.333000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:35.333000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:35.333000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:35.333000 audit: BPF prog-id=109 op=LOAD Jul 15 11:32:35.333000 audit[2440]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000d9c88 items=0 ppid=2349 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:35.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231636564623632636536643732393038363163353338663138616231 Jul 15 11:32:35.774116 kubelet[1448]: E0715 11:32:35.774078 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:36.775157 kubelet[1448]: E0715 11:32:36.775115 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:37.775517 kubelet[1448]: E0715 11:32:37.775467 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:38.141199 env[1205]: time="2025-07-15T11:32:38.141057793Z" level=info msg="StopPodSandbox for \"015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b\"" Jul 15 11:32:38.220110 env[1205]: 2025-07-15 11:32:38.183 [INFO][2484] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b" Jul 15 11:32:38.220110 env[1205]: 2025-07-15 11:32:38.184 [INFO][2484] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b" iface="eth0" netns="/var/run/netns/cni-57a52a6a-b90f-9dd0-6f20-e04e9641b8c4" Jul 15 11:32:38.220110 env[1205]: 2025-07-15 11:32:38.184 [INFO][2484] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b" iface="eth0" netns="/var/run/netns/cni-57a52a6a-b90f-9dd0-6f20-e04e9641b8c4" Jul 15 11:32:38.220110 env[1205]: 2025-07-15 11:32:38.184 [INFO][2484] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b" iface="eth0" netns="/var/run/netns/cni-57a52a6a-b90f-9dd0-6f20-e04e9641b8c4" Jul 15 11:32:38.220110 env[1205]: 2025-07-15 11:32:38.184 [INFO][2484] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b" Jul 15 11:32:38.220110 env[1205]: 2025-07-15 11:32:38.184 [INFO][2484] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b" Jul 15 11:32:38.220110 env[1205]: 2025-07-15 11:32:38.207 [INFO][2493] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b" HandleID="k8s-pod-network.015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b" Workload="10.0.0.87-k8s-nginx--deployment--7fcdb87857--p8fsg-eth0" Jul 15 11:32:38.220110 env[1205]: 2025-07-15 11:32:38.208 [INFO][2493] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 15 11:32:38.220110 env[1205]: 2025-07-15 11:32:38.208 [INFO][2493] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 15 11:32:38.220110 env[1205]: 2025-07-15 11:32:38.215 [WARNING][2493] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b" HandleID="k8s-pod-network.015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b" Workload="10.0.0.87-k8s-nginx--deployment--7fcdb87857--p8fsg-eth0" Jul 15 11:32:38.220110 env[1205]: 2025-07-15 11:32:38.215 [INFO][2493] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b" HandleID="k8s-pod-network.015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b" Workload="10.0.0.87-k8s-nginx--deployment--7fcdb87857--p8fsg-eth0" Jul 15 11:32:38.220110 env[1205]: 2025-07-15 11:32:38.216 [INFO][2493] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 15 11:32:38.220110 env[1205]: 2025-07-15 11:32:38.218 [INFO][2484] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b" Jul 15 11:32:38.220594 env[1205]: time="2025-07-15T11:32:38.220296740Z" level=info msg="TearDown network for sandbox \"015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b\" successfully" Jul 15 11:32:38.220594 env[1205]: time="2025-07-15T11:32:38.220337134Z" level=info msg="StopPodSandbox for \"015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b\" returns successfully" Jul 15 11:32:38.221277 env[1205]: time="2025-07-15T11:32:38.221217390Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-p8fsg,Uid:7bd665c1-2b80-453a-a57e-1124e3eace1d,Namespace:default,Attempt:1,}" Jul 15 11:32:38.222308 systemd[1]: run-netns-cni\x2d57a52a6a\x2db90f\x2d9dd0\x2d6f20\x2de04e9641b8c4.mount: Deactivated successfully. Jul 15 11:32:38.329557 systemd-networkd[1028]: calid9d13a115e7: Link UP Jul 15 11:32:38.330393 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 15 11:32:38.330469 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid9d13a115e7: link becomes ready Jul 15 11:32:38.330732 systemd-networkd[1028]: calid9d13a115e7: Gained carrier Jul 15 11:32:38.341071 env[1205]: 2025-07-15 11:32:38.273 [INFO][2501] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.87-k8s-nginx--deployment--7fcdb87857--p8fsg-eth0 nginx-deployment-7fcdb87857- default 7bd665c1-2b80-453a-a57e-1124e3eace1d 1230 0 2025-07-15 11:32:21 +0000 UTC map[app:nginx pod-template-hash:7fcdb87857 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.87 nginx-deployment-7fcdb87857-p8fsg eth0 default [] [] [kns.default ksa.default.default] calid9d13a115e7 [] [] }} ContainerID="f136364e3e5b4ee390a0a8aae7bc8dd984e97d6345e89b5a5b941389228641e9" Namespace="default" Pod="nginx-deployment-7fcdb87857-p8fsg" WorkloadEndpoint="10.0.0.87-k8s-nginx--deployment--7fcdb87857--p8fsg-" Jul 15 11:32:38.341071 env[1205]: 2025-07-15 11:32:38.273 [INFO][2501] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="f136364e3e5b4ee390a0a8aae7bc8dd984e97d6345e89b5a5b941389228641e9" Namespace="default" Pod="nginx-deployment-7fcdb87857-p8fsg" WorkloadEndpoint="10.0.0.87-k8s-nginx--deployment--7fcdb87857--p8fsg-eth0" Jul 15 11:32:38.341071 env[1205]: 2025-07-15 11:32:38.293 [INFO][2516] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f136364e3e5b4ee390a0a8aae7bc8dd984e97d6345e89b5a5b941389228641e9" HandleID="k8s-pod-network.f136364e3e5b4ee390a0a8aae7bc8dd984e97d6345e89b5a5b941389228641e9" Workload="10.0.0.87-k8s-nginx--deployment--7fcdb87857--p8fsg-eth0" Jul 15 11:32:38.341071 env[1205]: 2025-07-15 11:32:38.294 [INFO][2516] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f136364e3e5b4ee390a0a8aae7bc8dd984e97d6345e89b5a5b941389228641e9" HandleID="k8s-pod-network.f136364e3e5b4ee390a0a8aae7bc8dd984e97d6345e89b5a5b941389228641e9" Workload="10.0.0.87-k8s-nginx--deployment--7fcdb87857--p8fsg-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002c90f0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.87", "pod":"nginx-deployment-7fcdb87857-p8fsg", "timestamp":"2025-07-15 11:32:38.293882287 +0000 UTC"}, Hostname:"10.0.0.87", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 15 11:32:38.341071 env[1205]: 2025-07-15 11:32:38.294 [INFO][2516] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 15 11:32:38.341071 env[1205]: 2025-07-15 11:32:38.294 [INFO][2516] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 15 11:32:38.341071 env[1205]: 2025-07-15 11:32:38.294 [INFO][2516] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.87' Jul 15 11:32:38.341071 env[1205]: 2025-07-15 11:32:38.301 [INFO][2516] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.f136364e3e5b4ee390a0a8aae7bc8dd984e97d6345e89b5a5b941389228641e9" host="10.0.0.87" Jul 15 11:32:38.341071 env[1205]: 2025-07-15 11:32:38.306 [INFO][2516] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.87" Jul 15 11:32:38.341071 env[1205]: 2025-07-15 11:32:38.310 [INFO][2516] ipam/ipam.go 511: Trying affinity for 192.168.45.0/26 host="10.0.0.87" Jul 15 11:32:38.341071 env[1205]: 2025-07-15 11:32:38.312 [INFO][2516] ipam/ipam.go 158: Attempting to load block cidr=192.168.45.0/26 host="10.0.0.87" Jul 15 11:32:38.341071 env[1205]: 2025-07-15 11:32:38.314 [INFO][2516] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.45.0/26 host="10.0.0.87" Jul 15 11:32:38.341071 env[1205]: 2025-07-15 11:32:38.314 [INFO][2516] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.45.0/26 handle="k8s-pod-network.f136364e3e5b4ee390a0a8aae7bc8dd984e97d6345e89b5a5b941389228641e9" host="10.0.0.87" Jul 15 11:32:38.341071 env[1205]: 2025-07-15 11:32:38.316 [INFO][2516] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.f136364e3e5b4ee390a0a8aae7bc8dd984e97d6345e89b5a5b941389228641e9 Jul 15 11:32:38.341071 env[1205]: 2025-07-15 11:32:38.319 [INFO][2516] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.45.0/26 handle="k8s-pod-network.f136364e3e5b4ee390a0a8aae7bc8dd984e97d6345e89b5a5b941389228641e9" host="10.0.0.87" Jul 15 11:32:38.341071 env[1205]: 2025-07-15 11:32:38.324 [INFO][2516] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.45.2/26] block=192.168.45.0/26 handle="k8s-pod-network.f136364e3e5b4ee390a0a8aae7bc8dd984e97d6345e89b5a5b941389228641e9" host="10.0.0.87" Jul 15 11:32:38.341071 env[1205]: 2025-07-15 11:32:38.324 [INFO][2516] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.45.2/26] handle="k8s-pod-network.f136364e3e5b4ee390a0a8aae7bc8dd984e97d6345e89b5a5b941389228641e9" host="10.0.0.87" Jul 15 11:32:38.341071 env[1205]: 2025-07-15 11:32:38.324 [INFO][2516] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 15 11:32:38.341071 env[1205]: 2025-07-15 11:32:38.324 [INFO][2516] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.45.2/26] IPv6=[] ContainerID="f136364e3e5b4ee390a0a8aae7bc8dd984e97d6345e89b5a5b941389228641e9" HandleID="k8s-pod-network.f136364e3e5b4ee390a0a8aae7bc8dd984e97d6345e89b5a5b941389228641e9" Workload="10.0.0.87-k8s-nginx--deployment--7fcdb87857--p8fsg-eth0" Jul 15 11:32:38.341672 env[1205]: 2025-07-15 11:32:38.326 [INFO][2501] cni-plugin/k8s.go 418: Populated endpoint ContainerID="f136364e3e5b4ee390a0a8aae7bc8dd984e97d6345e89b5a5b941389228641e9" Namespace="default" Pod="nginx-deployment-7fcdb87857-p8fsg" WorkloadEndpoint="10.0.0.87-k8s-nginx--deployment--7fcdb87857--p8fsg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.87-k8s-nginx--deployment--7fcdb87857--p8fsg-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"7bd665c1-2b80-453a-a57e-1124e3eace1d", ResourceVersion:"1230", Generation:0, CreationTimestamp:time.Date(2025, time.July, 15, 11, 32, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.87", ContainerID:"", Pod:"nginx-deployment-7fcdb87857-p8fsg", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.45.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calid9d13a115e7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 15 11:32:38.341672 env[1205]: 2025-07-15 11:32:38.326 [INFO][2501] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.45.2/32] ContainerID="f136364e3e5b4ee390a0a8aae7bc8dd984e97d6345e89b5a5b941389228641e9" Namespace="default" Pod="nginx-deployment-7fcdb87857-p8fsg" WorkloadEndpoint="10.0.0.87-k8s-nginx--deployment--7fcdb87857--p8fsg-eth0" Jul 15 11:32:38.341672 env[1205]: 2025-07-15 11:32:38.326 [INFO][2501] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calid9d13a115e7 ContainerID="f136364e3e5b4ee390a0a8aae7bc8dd984e97d6345e89b5a5b941389228641e9" Namespace="default" Pod="nginx-deployment-7fcdb87857-p8fsg" WorkloadEndpoint="10.0.0.87-k8s-nginx--deployment--7fcdb87857--p8fsg-eth0" Jul 15 11:32:38.341672 env[1205]: 2025-07-15 11:32:38.331 [INFO][2501] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f136364e3e5b4ee390a0a8aae7bc8dd984e97d6345e89b5a5b941389228641e9" Namespace="default" Pod="nginx-deployment-7fcdb87857-p8fsg" WorkloadEndpoint="10.0.0.87-k8s-nginx--deployment--7fcdb87857--p8fsg-eth0" Jul 15 11:32:38.341672 env[1205]: 2025-07-15 11:32:38.332 [INFO][2501] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="f136364e3e5b4ee390a0a8aae7bc8dd984e97d6345e89b5a5b941389228641e9" Namespace="default" Pod="nginx-deployment-7fcdb87857-p8fsg" WorkloadEndpoint="10.0.0.87-k8s-nginx--deployment--7fcdb87857--p8fsg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.87-k8s-nginx--deployment--7fcdb87857--p8fsg-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"7bd665c1-2b80-453a-a57e-1124e3eace1d", ResourceVersion:"1230", Generation:0, CreationTimestamp:time.Date(2025, time.July, 15, 11, 32, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.87", ContainerID:"f136364e3e5b4ee390a0a8aae7bc8dd984e97d6345e89b5a5b941389228641e9", Pod:"nginx-deployment-7fcdb87857-p8fsg", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.45.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calid9d13a115e7", MAC:"66:e5:f1:76:92:84", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 15 11:32:38.341672 env[1205]: 2025-07-15 11:32:38.339 [INFO][2501] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="f136364e3e5b4ee390a0a8aae7bc8dd984e97d6345e89b5a5b941389228641e9" Namespace="default" Pod="nginx-deployment-7fcdb87857-p8fsg" WorkloadEndpoint="10.0.0.87-k8s-nginx--deployment--7fcdb87857--p8fsg-eth0" Jul 15 11:32:38.348000 audit[2540]: NETFILTER_CFG table=filter:88 family=2 entries=42 op=nft_register_chain pid=2540 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 15 11:32:38.348000 audit[2540]: SYSCALL arch=c000003e syscall=46 success=yes exit=22512 a0=3 a1=7fff1a20acf0 a2=0 a3=7fff1a20acdc items=0 ppid=2088 pid=2540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:38.348000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 15 11:32:38.350583 env[1205]: time="2025-07-15T11:32:38.350503362Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 15 11:32:38.350583 env[1205]: time="2025-07-15T11:32:38.350543224Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 15 11:32:38.350583 env[1205]: time="2025-07-15T11:32:38.350554824Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 15 11:32:38.350816 env[1205]: time="2025-07-15T11:32:38.350702951Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f136364e3e5b4ee390a0a8aae7bc8dd984e97d6345e89b5a5b941389228641e9 pid=2543 runtime=io.containerd.runc.v2 Jul 15 11:32:38.362907 systemd[1]: Started cri-containerd-f136364e3e5b4ee390a0a8aae7bc8dd984e97d6345e89b5a5b941389228641e9.scope. Jul 15 11:32:38.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:38.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:38.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:38.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:38.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:38.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:38.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:38.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:38.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:38.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:38.370000 audit: BPF prog-id=110 op=LOAD Jul 15 11:32:38.370000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:38.370000 audit[2552]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c7c48 a2=10 a3=1c items=0 ppid=2543 pid=2552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:38.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631333633363465336535623465653339306130613861616537626338 Jul 15 11:32:38.371000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:38.371000 audit[2552]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c76b0 a2=3c a3=c items=0 ppid=2543 pid=2552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:38.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631333633363465336535623465653339306130613861616537626338 Jul 15 11:32:38.371000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:38.371000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:38.371000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:38.371000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:38.371000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:38.371000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:38.371000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:38.371000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:38.371000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:38.371000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:38.371000 audit: BPF prog-id=111 op=LOAD Jul 15 11:32:38.371000 audit[2552]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c79d8 a2=78 a3=c0002c1dc0 items=0 ppid=2543 pid=2552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:38.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631333633363465336535623465653339306130613861616537626338 Jul 15 11:32:38.371000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:38.371000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:38.371000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:38.371000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:38.371000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:38.371000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:38.371000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:38.371000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:38.371000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:38.371000 audit: BPF prog-id=112 op=LOAD Jul 15 11:32:38.371000 audit[2552]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c7770 a2=78 a3=c0002c1e08 items=0 ppid=2543 pid=2552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:38.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631333633363465336535623465653339306130613861616537626338 Jul 15 11:32:38.371000 audit: BPF prog-id=112 op=UNLOAD Jul 15 11:32:38.371000 audit: BPF prog-id=111 op=UNLOAD Jul 15 11:32:38.371000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:38.371000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:38.371000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:38.371000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:38.371000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:38.371000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:38.371000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:38.371000 audit[2552]: AVC avc: denied { perfmon } for pid=2552 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:38.371000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:38.371000 audit[2552]: AVC avc: denied { bpf } for pid=2552 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:38.371000 audit: BPF prog-id=113 op=LOAD Jul 15 11:32:38.371000 audit[2552]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c7c30 a2=78 a3=c0003b8218 items=0 ppid=2543 pid=2552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:38.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631333633363465336535623465653339306130613861616537626338 Jul 15 11:32:38.372731 systemd-resolved[1146]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 15 11:32:38.395708 env[1205]: time="2025-07-15T11:32:38.395619671Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-p8fsg,Uid:7bd665c1-2b80-453a-a57e-1124e3eace1d,Namespace:default,Attempt:1,} returns sandbox id \"f136364e3e5b4ee390a0a8aae7bc8dd984e97d6345e89b5a5b941389228641e9\"" Jul 15 11:32:38.776173 kubelet[1448]: E0715 11:32:38.776138 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:39.688494 env[1205]: time="2025-07-15T11:32:39.688438809Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:32:39.690271 env[1205]: time="2025-07-15T11:32:39.690233175Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9e48822a4fe26f4ed9231b361fdd1357ea3567f1fc0a8db4d616622fe570a866,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:32:39.691734 env[1205]: time="2025-07-15T11:32:39.691700779Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:32:39.693079 env[1205]: time="2025-07-15T11:32:39.693047258Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:8fec2de12dfa51bae89d941938a07af2598eb8bfcab55d0dded1d9c193d7b99f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:32:39.693613 env[1205]: time="2025-07-15T11:32:39.693586656Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2\" returns image reference \"sha256:9e48822a4fe26f4ed9231b361fdd1357ea3567f1fc0a8db4d616622fe570a866\"" Jul 15 11:32:39.694533 env[1205]: time="2025-07-15T11:32:39.694340062Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Jul 15 11:32:39.697283 env[1205]: time="2025-07-15T11:32:39.697248102Z" level=info msg="CreateContainer within sandbox \"b845b6d2b54f1a1fbebda708d6d276cfbb294eab05a063febab84cfd3f25de51\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Jul 15 11:32:39.710141 env[1205]: time="2025-07-15T11:32:39.710100814Z" level=info msg="CreateContainer within sandbox \"b845b6d2b54f1a1fbebda708d6d276cfbb294eab05a063febab84cfd3f25de51\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"eb10c5e67cadf9b558610cf7eafe83ab1cbe6859ce87fadb6b94eedec39be8f1\"" Jul 15 11:32:39.710507 env[1205]: time="2025-07-15T11:32:39.710476320Z" level=info msg="StartContainer for \"eb10c5e67cadf9b558610cf7eafe83ab1cbe6859ce87fadb6b94eedec39be8f1\"" Jul 15 11:32:39.724140 systemd[1]: Started cri-containerd-eb10c5e67cadf9b558610cf7eafe83ab1cbe6859ce87fadb6b94eedec39be8f1.scope. Jul 15 11:32:39.736000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:39.736000 audit[2584]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f26f6679d58 items=0 ppid=2349 pid=2584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:39.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562313063356536376361646639623535383631306366376561666538 Jul 15 11:32:39.736000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:39.736000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:39.736000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:39.736000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:39.736000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:39.736000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:39.736000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:39.736000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:39.736000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:39.736000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:39.736000 audit: BPF prog-id=114 op=LOAD Jul 15 11:32:39.736000 audit[2584]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00038fc58 items=0 ppid=2349 pid=2584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:39.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562313063356536376361646639623535383631306366376561666538 Jul 15 11:32:39.737000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:39.737000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:39.737000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:39.737000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:39.737000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:39.737000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:39.737000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:39.737000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:39.737000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:39.737000 audit: BPF prog-id=115 op=LOAD Jul 15 11:32:39.737000 audit[2584]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00038fca8 items=0 ppid=2349 pid=2584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:39.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562313063356536376361646639623535383631306366376561666538 Jul 15 11:32:39.737000 audit: BPF prog-id=115 op=UNLOAD Jul 15 11:32:39.737000 audit: BPF prog-id=114 op=UNLOAD Jul 15 11:32:39.737000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:39.737000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:39.737000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:39.737000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:39.737000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:39.737000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:39.737000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:39.737000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:39.737000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:39.737000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:39.737000 audit: BPF prog-id=116 op=LOAD Jul 15 11:32:39.737000 audit[2584]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00038fd38 items=0 ppid=2349 pid=2584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:39.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562313063356536376361646639623535383631306366376561666538 Jul 15 11:32:39.749128 env[1205]: time="2025-07-15T11:32:39.749050996Z" level=info msg="StartContainer for \"eb10c5e67cadf9b558610cf7eafe83ab1cbe6859ce87fadb6b94eedec39be8f1\" returns successfully" Jul 15 11:32:39.776257 kubelet[1448]: E0715 11:32:39.776222 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:39.842000 audit[2615]: NETFILTER_CFG table=filter:89 family=2 entries=9 op=nft_register_rule pid=2615 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:32:39.842000 audit[2615]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fff90cb83f0 a2=0 a3=7fff90cb83dc items=0 ppid=1669 pid=2615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:39.842000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:32:39.854000 audit[2615]: NETFILTER_CFG table=nat:90 family=2 entries=31 op=nft_register_chain pid=2615 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:32:39.854000 audit[2615]: SYSCALL arch=c000003e syscall=46 success=yes exit=10884 a0=3 a1=7fff90cb83f0 a2=0 a3=7fff90cb83dc items=0 ppid=1669 pid=2615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:39.854000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:32:39.901985 systemd-networkd[1028]: calid9d13a115e7: Gained IPv6LL Jul 15 11:32:40.125874 kubelet[1448]: I0715 11:32:40.125816 1448 csi_plugin.go:106] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Jul 15 11:32:40.125874 kubelet[1448]: I0715 11:32:40.125870 1448 csi_plugin.go:119] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Jul 15 11:32:40.532890 kubelet[1448]: I0715 11:32:40.532845 1448 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-vtfgv" podStartSLOduration=29.25999566 podStartE2EDuration="35.532807833s" podCreationTimestamp="2025-07-15 11:32:05 +0000 UTC" firstStartedPulling="2025-07-15 11:32:33.421395106 +0000 UTC m=+28.944434816" lastFinishedPulling="2025-07-15 11:32:39.694207289 +0000 UTC m=+35.217246989" observedRunningTime="2025-07-15 11:32:40.532700788 +0000 UTC m=+36.055740488" watchObservedRunningTime="2025-07-15 11:32:40.532807833 +0000 UTC m=+36.055847533" Jul 15 11:32:40.777029 kubelet[1448]: E0715 11:32:40.776994 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:41.777732 kubelet[1448]: E0715 11:32:41.777694 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:42.778154 kubelet[1448]: E0715 11:32:42.778118 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:43.779219 kubelet[1448]: E0715 11:32:43.779168 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:44.089109 update_engine[1198]: I0715 11:32:44.088948 1198 update_attempter.cc:509] Updating boot flags... Jul 15 11:32:44.758194 kubelet[1448]: E0715 11:32:44.758129 1448 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:44.763380 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1746968104.mount: Deactivated successfully. Jul 15 11:32:44.779498 kubelet[1448]: E0715 11:32:44.779459 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:45.779917 kubelet[1448]: E0715 11:32:45.779858 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:46.356245 env[1205]: time="2025-07-15T11:32:46.356194344Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:32:46.358242 env[1205]: time="2025-07-15T11:32:46.358214309Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f6422896ca84c9af48d5417d6b7a573bf6b38f81edc15538907d987fc658d909,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:32:46.360287 env[1205]: time="2025-07-15T11:32:46.360212954Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:32:46.362105 env[1205]: time="2025-07-15T11:32:46.362062864Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:30bb68e656e0665bce700e67d2756f68bdca3345fa1099a32bfdb8febcf621cd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:32:46.362944 env[1205]: time="2025-07-15T11:32:46.362904510Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:f6422896ca84c9af48d5417d6b7a573bf6b38f81edc15538907d987fc658d909\"" Jul 15 11:32:46.367723 env[1205]: time="2025-07-15T11:32:46.367672942Z" level=info msg="CreateContainer within sandbox \"f136364e3e5b4ee390a0a8aae7bc8dd984e97d6345e89b5a5b941389228641e9\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Jul 15 11:32:46.380300 env[1205]: time="2025-07-15T11:32:46.380242324Z" level=info msg="CreateContainer within sandbox \"f136364e3e5b4ee390a0a8aae7bc8dd984e97d6345e89b5a5b941389228641e9\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"632de47c41d6cdf35ffa25dab171588ec5caaec8a0126c8f558d10a626ecd038\"" Jul 15 11:32:46.380805 env[1205]: time="2025-07-15T11:32:46.380769851Z" level=info msg="StartContainer for \"632de47c41d6cdf35ffa25dab171588ec5caaec8a0126c8f558d10a626ecd038\"" Jul 15 11:32:46.396594 systemd[1]: Started cri-containerd-632de47c41d6cdf35ffa25dab171588ec5caaec8a0126c8f558d10a626ecd038.scope. Jul 15 11:32:46.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:46.407390 kernel: kauditd_printk_skb: 142 callbacks suppressed Jul 15 11:32:46.407454 kernel: audit: type=1400 audit(1752579166.404:723): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:46.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:46.419245 kernel: audit: type=1400 audit(1752579166.404:724): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:46.419319 kernel: audit: type=1400 audit(1752579166.404:725): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:46.419339 kernel: audit: type=1400 audit(1752579166.404:726): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:46.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:46.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:46.422460 kernel: audit: type=1400 audit(1752579166.404:727): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:46.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:46.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:46.425588 kernel: audit: type=1400 audit(1752579166.404:728): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:46.425669 kernel: audit: type=1400 audit(1752579166.404:729): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:46.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:46.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:46.431703 kernel: audit: type=1400 audit(1752579166.404:730): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:46.431766 kernel: audit: type=1400 audit(1752579166.404:731): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:46.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:46.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:46.437908 kernel: audit: type=1400 audit(1752579166.408:732): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:46.408000 audit: BPF prog-id=117 op=LOAD Jul 15 11:32:46.408000 audit[2650]: AVC avc: denied { bpf } for pid=2650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:46.408000 audit[2650]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2543 pid=2650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:46.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633326465343763343164366364663335666661323564616231373135 Jul 15 11:32:46.408000 audit[2650]: AVC avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:46.408000 audit[2650]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2543 pid=2650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:46.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633326465343763343164366364663335666661323564616231373135 Jul 15 11:32:46.408000 audit[2650]: AVC avc: denied { bpf } for pid=2650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:46.408000 audit[2650]: AVC avc: denied { bpf } for pid=2650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:46.408000 audit[2650]: AVC avc: denied { bpf } for pid=2650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:46.408000 audit[2650]: AVC avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:46.408000 audit[2650]: AVC avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:46.408000 audit[2650]: AVC avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:46.408000 audit[2650]: AVC avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:46.408000 audit[2650]: AVC avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:46.408000 audit[2650]: AVC avc: denied { bpf } for pid=2650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:46.408000 audit[2650]: AVC avc: denied { bpf } for pid=2650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:46.408000 audit: BPF prog-id=118 op=LOAD Jul 15 11:32:46.408000 audit[2650]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000e1d10 items=0 ppid=2543 pid=2650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:46.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633326465343763343164366364663335666661323564616231373135 Jul 15 11:32:46.412000 audit[2650]: AVC avc: denied { bpf } for pid=2650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:46.412000 audit[2650]: AVC avc: denied { bpf } for pid=2650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:46.412000 audit[2650]: AVC avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:46.412000 audit[2650]: AVC avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:46.412000 audit[2650]: AVC avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:46.412000 audit[2650]: AVC avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:46.412000 audit[2650]: AVC avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:46.412000 audit[2650]: AVC avc: denied { bpf } for pid=2650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:46.412000 audit[2650]: AVC avc: denied { bpf } for pid=2650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:46.412000 audit: BPF prog-id=119 op=LOAD Jul 15 11:32:46.412000 audit[2650]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000e1d58 items=0 ppid=2543 pid=2650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:46.412000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633326465343763343164366364663335666661323564616231373135 Jul 15 11:32:46.415000 audit: BPF prog-id=119 op=UNLOAD Jul 15 11:32:46.415000 audit: BPF prog-id=118 op=UNLOAD Jul 15 11:32:46.415000 audit[2650]: AVC avc: denied { bpf } for pid=2650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:46.415000 audit[2650]: AVC avc: denied { bpf } for pid=2650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:46.415000 audit[2650]: AVC avc: denied { bpf } for pid=2650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:46.415000 audit[2650]: AVC avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:46.415000 audit[2650]: AVC avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:46.415000 audit[2650]: AVC avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:46.415000 audit[2650]: AVC avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:46.415000 audit[2650]: AVC avc: denied { perfmon } for pid=2650 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:46.415000 audit[2650]: AVC avc: denied { bpf } for pid=2650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:46.415000 audit[2650]: AVC avc: denied { bpf } for pid=2650 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:46.415000 audit: BPF prog-id=120 op=LOAD Jul 15 11:32:46.415000 audit[2650]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003cc168 items=0 ppid=2543 pid=2650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:46.415000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633326465343763343164366364663335666661323564616231373135 Jul 15 11:32:46.504473 env[1205]: time="2025-07-15T11:32:46.504429189Z" level=info msg="StartContainer for \"632de47c41d6cdf35ffa25dab171588ec5caaec8a0126c8f558d10a626ecd038\" returns successfully" Jul 15 11:32:46.780738 kubelet[1448]: E0715 11:32:46.780677 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:47.781039 kubelet[1448]: E0715 11:32:47.780984 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:48.781947 kubelet[1448]: E0715 11:32:48.781891 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:49.782430 kubelet[1448]: E0715 11:32:49.782375 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:50.783501 kubelet[1448]: E0715 11:32:50.783438 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:50.911000 audit[2701]: NETFILTER_CFG table=filter:91 family=2 entries=20 op=nft_register_rule pid=2701 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:32:50.911000 audit[2701]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffc3638c470 a2=0 a3=7ffc3638c45c items=0 ppid=1669 pid=2701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:50.911000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:32:50.916000 audit[2701]: NETFILTER_CFG table=nat:92 family=2 entries=26 op=nft_register_rule pid=2701 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:32:50.916000 audit[2701]: SYSCALL arch=c000003e syscall=46 success=yes exit=8076 a0=3 a1=7ffc3638c470 a2=0 a3=0 items=0 ppid=1669 pid=2701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:50.916000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:32:50.930000 audit[2703]: NETFILTER_CFG table=filter:93 family=2 entries=32 op=nft_register_rule pid=2703 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:32:50.930000 audit[2703]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffceae85810 a2=0 a3=7ffceae857fc items=0 ppid=1669 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:50.930000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:32:50.935000 audit[2703]: NETFILTER_CFG table=nat:94 family=2 entries=26 op=nft_register_rule pid=2703 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:32:50.935000 audit[2703]: SYSCALL arch=c000003e syscall=46 success=yes exit=8076 a0=3 a1=7ffceae85810 a2=0 a3=0 items=0 ppid=1669 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:50.935000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:32:51.160077 kubelet[1448]: I0715 11:32:51.159922 1448 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-7fcdb87857-p8fsg" podStartSLOduration=22.192183832 podStartE2EDuration="30.159898896s" podCreationTimestamp="2025-07-15 11:32:21 +0000 UTC" firstStartedPulling="2025-07-15 11:32:38.396295466 +0000 UTC m=+33.919335166" lastFinishedPulling="2025-07-15 11:32:46.36401052 +0000 UTC m=+41.887050230" observedRunningTime="2025-07-15 11:32:47.345024797 +0000 UTC m=+42.868064537" watchObservedRunningTime="2025-07-15 11:32:51.159898896 +0000 UTC m=+46.682938616" Jul 15 11:32:51.323133 systemd[1]: Created slice kubepods-besteffort-poddb312fb5_21b6_47b2_b62f_61caefa0fe66.slice. Jul 15 11:32:51.443815 kubelet[1448]: I0715 11:32:51.443679 1448 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tvrnl\" (UniqueName: \"kubernetes.io/projected/db312fb5-21b6-47b2-b62f-61caefa0fe66-kube-api-access-tvrnl\") pod \"nfs-server-provisioner-0\" (UID: \"db312fb5-21b6-47b2-b62f-61caefa0fe66\") " pod="default/nfs-server-provisioner-0" Jul 15 11:32:51.443815 kubelet[1448]: I0715 11:32:51.443736 1448 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/db312fb5-21b6-47b2-b62f-61caefa0fe66-data\") pod \"nfs-server-provisioner-0\" (UID: \"db312fb5-21b6-47b2-b62f-61caefa0fe66\") " pod="default/nfs-server-provisioner-0" Jul 15 11:32:51.626456 env[1205]: time="2025-07-15T11:32:51.626409350Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:db312fb5-21b6-47b2-b62f-61caefa0fe66,Namespace:default,Attempt:0,}" Jul 15 11:32:51.729163 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 15 11:32:51.729316 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Jul 15 11:32:51.729705 systemd-networkd[1028]: cali60e51b789ff: Link UP Jul 15 11:32:51.729901 systemd-networkd[1028]: cali60e51b789ff: Gained carrier Jul 15 11:32:51.739103 env[1205]: 2025-07-15 11:32:51.668 [INFO][2706] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.87-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default db312fb5-21b6-47b2-b62f-61caefa0fe66 1310 0 2025-07-15 11:32:50 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.0.0.87 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="e3de6122d8953dc83f2553dbca000d56481b85b30e2eeb28462cc926fb92c912" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.87-k8s-nfs--server--provisioner--0-" Jul 15 11:32:51.739103 env[1205]: 2025-07-15 11:32:51.668 [INFO][2706] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="e3de6122d8953dc83f2553dbca000d56481b85b30e2eeb28462cc926fb92c912" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.87-k8s-nfs--server--provisioner--0-eth0" Jul 15 11:32:51.739103 env[1205]: 2025-07-15 11:32:51.691 [INFO][2719] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e3de6122d8953dc83f2553dbca000d56481b85b30e2eeb28462cc926fb92c912" HandleID="k8s-pod-network.e3de6122d8953dc83f2553dbca000d56481b85b30e2eeb28462cc926fb92c912" Workload="10.0.0.87-k8s-nfs--server--provisioner--0-eth0" Jul 15 11:32:51.739103 env[1205]: 2025-07-15 11:32:51.691 [INFO][2719] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="e3de6122d8953dc83f2553dbca000d56481b85b30e2eeb28462cc926fb92c912" HandleID="k8s-pod-network.e3de6122d8953dc83f2553dbca000d56481b85b30e2eeb28462cc926fb92c912" Workload="10.0.0.87-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d12a0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.87", "pod":"nfs-server-provisioner-0", "timestamp":"2025-07-15 11:32:51.691659796 +0000 UTC"}, Hostname:"10.0.0.87", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 15 11:32:51.739103 env[1205]: 2025-07-15 11:32:51.691 [INFO][2719] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 15 11:32:51.739103 env[1205]: 2025-07-15 11:32:51.692 [INFO][2719] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 15 11:32:51.739103 env[1205]: 2025-07-15 11:32:51.692 [INFO][2719] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.87' Jul 15 11:32:51.739103 env[1205]: 2025-07-15 11:32:51.698 [INFO][2719] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.e3de6122d8953dc83f2553dbca000d56481b85b30e2eeb28462cc926fb92c912" host="10.0.0.87" Jul 15 11:32:51.739103 env[1205]: 2025-07-15 11:32:51.703 [INFO][2719] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.87" Jul 15 11:32:51.739103 env[1205]: 2025-07-15 11:32:51.708 [INFO][2719] ipam/ipam.go 511: Trying affinity for 192.168.45.0/26 host="10.0.0.87" Jul 15 11:32:51.739103 env[1205]: 2025-07-15 11:32:51.709 [INFO][2719] ipam/ipam.go 158: Attempting to load block cidr=192.168.45.0/26 host="10.0.0.87" Jul 15 11:32:51.739103 env[1205]: 2025-07-15 11:32:51.712 [INFO][2719] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.45.0/26 host="10.0.0.87" Jul 15 11:32:51.739103 env[1205]: 2025-07-15 11:32:51.712 [INFO][2719] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.45.0/26 handle="k8s-pod-network.e3de6122d8953dc83f2553dbca000d56481b85b30e2eeb28462cc926fb92c912" host="10.0.0.87" Jul 15 11:32:51.739103 env[1205]: 2025-07-15 11:32:51.714 [INFO][2719] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.e3de6122d8953dc83f2553dbca000d56481b85b30e2eeb28462cc926fb92c912 Jul 15 11:32:51.739103 env[1205]: 2025-07-15 11:32:51.717 [INFO][2719] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.45.0/26 handle="k8s-pod-network.e3de6122d8953dc83f2553dbca000d56481b85b30e2eeb28462cc926fb92c912" host="10.0.0.87" Jul 15 11:32:51.739103 env[1205]: 2025-07-15 11:32:51.723 [INFO][2719] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.45.3/26] block=192.168.45.0/26 handle="k8s-pod-network.e3de6122d8953dc83f2553dbca000d56481b85b30e2eeb28462cc926fb92c912" host="10.0.0.87" Jul 15 11:32:51.739103 env[1205]: 2025-07-15 11:32:51.723 [INFO][2719] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.45.3/26] handle="k8s-pod-network.e3de6122d8953dc83f2553dbca000d56481b85b30e2eeb28462cc926fb92c912" host="10.0.0.87" Jul 15 11:32:51.739103 env[1205]: 2025-07-15 11:32:51.723 [INFO][2719] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 15 11:32:51.739103 env[1205]: 2025-07-15 11:32:51.723 [INFO][2719] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.45.3/26] IPv6=[] ContainerID="e3de6122d8953dc83f2553dbca000d56481b85b30e2eeb28462cc926fb92c912" HandleID="k8s-pod-network.e3de6122d8953dc83f2553dbca000d56481b85b30e2eeb28462cc926fb92c912" Workload="10.0.0.87-k8s-nfs--server--provisioner--0-eth0" Jul 15 11:32:51.739668 env[1205]: 2025-07-15 11:32:51.724 [INFO][2706] cni-plugin/k8s.go 418: Populated endpoint ContainerID="e3de6122d8953dc83f2553dbca000d56481b85b30e2eeb28462cc926fb92c912" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.87-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.87-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"db312fb5-21b6-47b2-b62f-61caefa0fe66", ResourceVersion:"1310", Generation:0, CreationTimestamp:time.Date(2025, time.July, 15, 11, 32, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.87", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.45.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 15 11:32:51.739668 env[1205]: 2025-07-15 11:32:51.725 [INFO][2706] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.45.3/32] ContainerID="e3de6122d8953dc83f2553dbca000d56481b85b30e2eeb28462cc926fb92c912" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.87-k8s-nfs--server--provisioner--0-eth0" Jul 15 11:32:51.739668 env[1205]: 2025-07-15 11:32:51.725 [INFO][2706] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="e3de6122d8953dc83f2553dbca000d56481b85b30e2eeb28462cc926fb92c912" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.87-k8s-nfs--server--provisioner--0-eth0" Jul 15 11:32:51.739668 env[1205]: 2025-07-15 11:32:51.729 [INFO][2706] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="e3de6122d8953dc83f2553dbca000d56481b85b30e2eeb28462cc926fb92c912" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.87-k8s-nfs--server--provisioner--0-eth0" Jul 15 11:32:51.739826 env[1205]: 2025-07-15 11:32:51.729 [INFO][2706] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="e3de6122d8953dc83f2553dbca000d56481b85b30e2eeb28462cc926fb92c912" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.87-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.87-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"db312fb5-21b6-47b2-b62f-61caefa0fe66", ResourceVersion:"1310", Generation:0, CreationTimestamp:time.Date(2025, time.July, 15, 11, 32, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.87", ContainerID:"e3de6122d8953dc83f2553dbca000d56481b85b30e2eeb28462cc926fb92c912", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.45.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"32:18:2c:b5:42:57", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 15 11:32:51.739826 env[1205]: 2025-07-15 11:32:51.736 [INFO][2706] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="e3de6122d8953dc83f2553dbca000d56481b85b30e2eeb28462cc926fb92c912" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.87-k8s-nfs--server--provisioner--0-eth0" Jul 15 11:32:51.746000 audit[2742]: NETFILTER_CFG table=filter:95 family=2 entries=40 op=nft_register_chain pid=2742 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 15 11:32:51.748949 kernel: kauditd_printk_skb: 59 callbacks suppressed Jul 15 11:32:51.748989 kernel: audit: type=1325 audit(1752579171.746:745): table=filter:95 family=2 entries=40 op=nft_register_chain pid=2742 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 15 11:32:51.749798 env[1205]: time="2025-07-15T11:32:51.749710459Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 15 11:32:51.749879 env[1205]: time="2025-07-15T11:32:51.749819573Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 15 11:32:51.749879 env[1205]: time="2025-07-15T11:32:51.749863470Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 15 11:32:51.750167 env[1205]: time="2025-07-15T11:32:51.750107666Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e3de6122d8953dc83f2553dbca000d56481b85b30e2eeb28462cc926fb92c912 pid=2746 runtime=io.containerd.runc.v2 Jul 15 11:32:51.763378 kernel: audit: type=1300 audit(1752579171.746:745): arch=c000003e syscall=46 success=yes exit=20756 a0=3 a1=7fff8c4280c0 a2=0 a3=7fff8c4280ac items=0 ppid=2088 pid=2742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:51.746000 audit[2742]: SYSCALL arch=c000003e syscall=46 success=yes exit=20756 a0=3 a1=7fff8c4280c0 a2=0 a3=7fff8c4280ac items=0 ppid=2088 pid=2742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:51.746000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 15 11:32:51.767776 systemd[1]: Started cri-containerd-e3de6122d8953dc83f2553dbca000d56481b85b30e2eeb28462cc926fb92c912.scope. Jul 15 11:32:51.767915 kernel: audit: type=1327 audit(1752579171.746:745): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 15 11:32:51.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:51.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:51.784872 kernel: audit: type=1400 audit(1752579171.776:746): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:51.784932 kernel: audit: type=1400 audit(1752579171.776:747): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:51.784956 kernel: audit: type=1400 audit(1752579171.776:748): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:51.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:51.785145 kubelet[1448]: E0715 11:32:51.785115 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:51.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:51.790989 kernel: audit: type=1400 audit(1752579171.776:749): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:51.791038 kernel: audit: type=1400 audit(1752579171.776:750): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:51.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:51.793711 kernel: audit: type=1400 audit(1752579171.776:751): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:51.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:51.796457 kernel: audit: type=1400 audit(1752579171.776:752): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:51.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:51.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:51.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:51.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:51.784000 audit: BPF prog-id=121 op=LOAD Jul 15 11:32:51.784000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:51.784000 audit[2757]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2746 pid=2757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:51.784000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533646536313232643839353364633833663235353364626361303030 Jul 15 11:32:51.784000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:51.784000 audit[2757]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2746 pid=2757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:51.784000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533646536313232643839353364633833663235353364626361303030 Jul 15 11:32:51.784000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:51.784000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:51.784000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:51.784000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:51.784000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:51.784000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:51.784000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:51.784000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:51.784000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:51.784000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:51.784000 audit: BPF prog-id=122 op=LOAD Jul 15 11:32:51.784000 audit[2757]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00035c490 items=0 ppid=2746 pid=2757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:51.784000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533646536313232643839353364633833663235353364626361303030 Jul 15 11:32:51.787000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:51.787000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:51.787000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:51.787000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:51.787000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:51.787000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:51.787000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:51.787000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:51.787000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:51.787000 audit: BPF prog-id=123 op=LOAD Jul 15 11:32:51.787000 audit[2757]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00035c4d8 items=0 ppid=2746 pid=2757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:51.787000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533646536313232643839353364633833663235353364626361303030 Jul 15 11:32:51.792000 audit: BPF prog-id=123 op=UNLOAD Jul 15 11:32:51.792000 audit: BPF prog-id=122 op=UNLOAD Jul 15 11:32:51.792000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:51.792000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:51.792000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:51.792000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:51.792000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:51.792000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:51.792000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:51.792000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:51.792000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:51.792000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:51.792000 audit: BPF prog-id=124 op=LOAD Jul 15 11:32:51.792000 audit[2757]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00035c8e8 items=0 ppid=2746 pid=2757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:51.792000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533646536313232643839353364633833663235353364626361303030 Jul 15 11:32:51.799648 systemd-resolved[1146]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 15 11:32:51.819872 env[1205]: time="2025-07-15T11:32:51.819814102Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:db312fb5-21b6-47b2-b62f-61caefa0fe66,Namespace:default,Attempt:0,} returns sandbox id \"e3de6122d8953dc83f2553dbca000d56481b85b30e2eeb28462cc926fb92c912\"" Jul 15 11:32:51.821330 env[1205]: time="2025-07-15T11:32:51.821293221Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Jul 15 11:32:52.785822 kubelet[1448]: E0715 11:32:52.785761 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:53.534095 systemd-networkd[1028]: cali60e51b789ff: Gained IPv6LL Jul 15 11:32:53.787002 kubelet[1448]: E0715 11:32:53.786860 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:54.787619 kubelet[1448]: E0715 11:32:54.787561 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:55.169000 audit[2788]: NETFILTER_CFG table=filter:96 family=2 entries=32 op=nft_register_rule pid=2788 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:32:55.169000 audit[2788]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7fff583cbde0 a2=0 a3=7fff583cbdcc items=0 ppid=1669 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:55.169000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:32:55.173000 audit[2788]: NETFILTER_CFG table=nat:97 family=2 entries=38 op=nft_register_chain pid=2788 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:32:55.173000 audit[2788]: SYSCALL arch=c000003e syscall=46 success=yes exit=12772 a0=3 a1=7fff583cbde0 a2=0 a3=7fff583cbdcc items=0 ppid=1669 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:55.173000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:32:55.184897 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3659801458.mount: Deactivated successfully. Jul 15 11:32:55.788245 kubelet[1448]: E0715 11:32:55.788180 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:56.788933 kubelet[1448]: E0715 11:32:56.788896 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:57.789083 kubelet[1448]: E0715 11:32:57.789035 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:58.789626 kubelet[1448]: E0715 11:32:58.789553 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:32:59.079440 env[1205]: time="2025-07-15T11:32:59.079273535Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:32:59.082977 env[1205]: time="2025-07-15T11:32:59.082908856Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:32:59.085377 env[1205]: time="2025-07-15T11:32:59.085345100Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:32:59.088107 env[1205]: time="2025-07-15T11:32:59.088046470Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:32:59.088782 env[1205]: time="2025-07-15T11:32:59.088721319Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Jul 15 11:32:59.096624 env[1205]: time="2025-07-15T11:32:59.096576216Z" level=info msg="CreateContainer within sandbox \"e3de6122d8953dc83f2553dbca000d56481b85b30e2eeb28462cc926fb92c912\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Jul 15 11:32:59.407890 env[1205]: time="2025-07-15T11:32:59.407732159Z" level=info msg="CreateContainer within sandbox \"e3de6122d8953dc83f2553dbca000d56481b85b30e2eeb28462cc926fb92c912\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"141740f8d92125f6772f86051a01ad1fc83c4da919e8f54bf55c9f96879d2a55\"" Jul 15 11:32:59.408716 env[1205]: time="2025-07-15T11:32:59.408661801Z" level=info msg="StartContainer for \"141740f8d92125f6772f86051a01ad1fc83c4da919e8f54bf55c9f96879d2a55\"" Jul 15 11:32:59.430043 systemd[1]: Started cri-containerd-141740f8d92125f6772f86051a01ad1fc83c4da919e8f54bf55c9f96879d2a55.scope. Jul 15 11:32:59.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:59.443381 kernel: kauditd_printk_skb: 56 callbacks suppressed Jul 15 11:32:59.443506 kernel: audit: type=1400 audit(1752579179.441:766): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:59.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:59.449278 kernel: audit: type=1400 audit(1752579179.441:767): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:59.449326 kernel: audit: type=1400 audit(1752579179.441:768): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:59.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:59.452168 kernel: audit: type=1400 audit(1752579179.441:769): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:59.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:59.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:59.458048 kernel: audit: type=1400 audit(1752579179.441:770): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:59.458119 kernel: audit: type=1400 audit(1752579179.441:771): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:59.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:59.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:59.463869 kernel: audit: type=1400 audit(1752579179.441:772): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:59.463925 kernel: audit: type=1400 audit(1752579179.441:773): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:59.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:59.466658 kernel: audit: type=1400 audit(1752579179.441:774): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:59.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:59.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:59.472153 kernel: audit: type=1400 audit(1752579179.445:775): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:59.445000 audit: BPF prog-id=125 op=LOAD Jul 15 11:32:59.445000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:59.445000 audit[2799]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2746 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:59.445000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134313734306638643932313235663637373266383630353161303161 Jul 15 11:32:59.445000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:59.445000 audit[2799]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2746 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:59.445000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134313734306638643932313235663637373266383630353161303161 Jul 15 11:32:59.445000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:59.445000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:59.445000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:59.445000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:59.445000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:59.445000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:59.445000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:59.445000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:59.445000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:59.445000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:59.445000 audit: BPF prog-id=126 op=LOAD Jul 15 11:32:59.445000 audit[2799]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00009a390 items=0 ppid=2746 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:59.445000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134313734306638643932313235663637373266383630353161303161 Jul 15 11:32:59.451000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:59.451000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:59.451000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:59.451000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:59.451000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:59.451000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:59.451000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:59.451000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:59.451000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:59.451000 audit: BPF prog-id=127 op=LOAD Jul 15 11:32:59.451000 audit[2799]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00009a3d8 items=0 ppid=2746 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:59.451000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134313734306638643932313235663637373266383630353161303161 Jul 15 11:32:59.454000 audit: BPF prog-id=127 op=UNLOAD Jul 15 11:32:59.454000 audit: BPF prog-id=126 op=UNLOAD Jul 15 11:32:59.454000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:59.454000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:59.454000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:59.454000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:59.454000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:59.454000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:59.454000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:59.454000 audit[2799]: AVC avc: denied { perfmon } for pid=2799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:59.454000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:59.454000 audit[2799]: AVC avc: denied { bpf } for pid=2799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:32:59.454000 audit: BPF prog-id=128 op=LOAD Jul 15 11:32:59.454000 audit[2799]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00009a7e8 items=0 ppid=2746 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:59.454000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134313734306638643932313235663637373266383630353161303161 Jul 15 11:32:59.482353 env[1205]: time="2025-07-15T11:32:59.482299626Z" level=info msg="StartContainer for \"141740f8d92125f6772f86051a01ad1fc83c4da919e8f54bf55c9f96879d2a55\" returns successfully" Jul 15 11:32:59.528000 audit[2828]: AVC avc: denied { search } for pid=2828 comm="rpcbind" name="crypto" dev="proc" ino=24698 scontext=system_u:system_r:svirt_lxc_net_t:s0:c300,c807 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 15 11:32:59.528000 audit[2828]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f664adbb0c0 a2=0 a3=0 items=0 ppid=2810 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c300,c807 key=(null) Jul 15 11:32:59.528000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Jul 15 11:32:59.562000 audit[2833]: AVC avc: denied { search } for pid=2833 comm="dbus-daemon" name="crypto" dev="proc" ino=24698 scontext=system_u:system_r:svirt_lxc_net_t:s0:c300,c807 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 15 11:32:59.562000 audit[2833]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f37e89030c0 a2=0 a3=0 items=0 ppid=2810 pid=2833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c300,c807 key=(null) Jul 15 11:32:59.562000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Jul 15 11:32:59.565000 audit[2834]: AVC avc: denied { watch } for pid=2834 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538074 scontext=system_u:system_r:svirt_lxc_net_t:s0:c300,c807 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c300,c807 tclass=dir permissive=0 Jul 15 11:32:59.565000 audit[2834]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55db15f75480 a2=2c8 a3=7ffe8e7d455c items=0 ppid=2810 pid=2834 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c300,c807 key=(null) Jul 15 11:32:59.565000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Jul 15 11:32:59.568000 audit[2835]: AVC avc: denied { read } for pid=2835 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=24721 scontext=system_u:system_r:svirt_lxc_net_t:s0:c300,c807 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Jul 15 11:32:59.568000 audit[2835]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f8cd4764320 a1=80000 a2=d a3=7ffccd45ebd0 items=0 ppid=2810 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c300,c807 key=(null) Jul 15 11:32:59.568000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Jul 15 11:32:59.569000 audit[2835]: AVC avc: denied { search } for pid=2835 comm="ganesha.nfsd" name="crypto" dev="proc" ino=24698 scontext=system_u:system_r:svirt_lxc_net_t:s0:c300,c807 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 15 11:32:59.569000 audit[2835]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f8cd3cb80c0 a2=0 a3=0 items=0 ppid=2810 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c300,c807 key=(null) Jul 15 11:32:59.569000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Jul 15 11:32:59.790642 kubelet[1448]: E0715 11:32:59.790571 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:00.368918 kubelet[1448]: I0715 11:33:00.368853 1448 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=3.099749923 podStartE2EDuration="10.368822821s" podCreationTimestamp="2025-07-15 11:32:50 +0000 UTC" firstStartedPulling="2025-07-15 11:32:51.820747514 +0000 UTC m=+47.343787214" lastFinishedPulling="2025-07-15 11:32:59.089820402 +0000 UTC m=+54.612860112" observedRunningTime="2025-07-15 11:33:00.36863854 +0000 UTC m=+55.891678260" watchObservedRunningTime="2025-07-15 11:33:00.368822821 +0000 UTC m=+55.891862521" Jul 15 11:33:00.379000 audit[2853]: NETFILTER_CFG table=filter:98 family=2 entries=20 op=nft_register_rule pid=2853 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:33:00.379000 audit[2853]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffec211b210 a2=0 a3=7ffec211b1fc items=0 ppid=1669 pid=2853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:00.379000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:33:00.385000 audit[2853]: NETFILTER_CFG table=nat:99 family=2 entries=110 op=nft_register_chain pid=2853 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:33:00.385000 audit[2853]: SYSCALL arch=c000003e syscall=46 success=yes exit=50988 a0=3 a1=7ffec211b210 a2=0 a3=7ffec211b1fc items=0 ppid=1669 pid=2853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:00.385000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:33:00.791672 kubelet[1448]: E0715 11:33:00.791613 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:01.792501 kubelet[1448]: E0715 11:33:01.792451 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:02.793316 kubelet[1448]: E0715 11:33:02.793267 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:03.793766 kubelet[1448]: E0715 11:33:03.793703 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:04.758502 kubelet[1448]: E0715 11:33:04.758447 1448 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:04.770856 env[1205]: time="2025-07-15T11:33:04.770794578Z" level=info msg="StopPodSandbox for \"b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9\"" Jul 15 11:33:04.794460 kubelet[1448]: E0715 11:33:04.794413 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:04.992308 env[1205]: 2025-07-15 11:33:04.848 [WARNING][2890] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.87-k8s-csi--node--driver--vtfgv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"532a9ca4-afe0-4bce-901e-f33b2d9c1f64", ResourceVersion:"1252", Generation:0, CreationTimestamp:time.Date(2025, time.July, 15, 11, 32, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"8967bcb6f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.87", ContainerID:"b845b6d2b54f1a1fbebda708d6d276cfbb294eab05a063febab84cfd3f25de51", Pod:"csi-node-driver-vtfgv", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.45.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali70bb8d9b7df", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 15 11:33:04.992308 env[1205]: 2025-07-15 11:33:04.848 [INFO][2890] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9" Jul 15 11:33:04.992308 env[1205]: 2025-07-15 11:33:04.848 [INFO][2890] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9" iface="eth0" netns="" Jul 15 11:33:04.992308 env[1205]: 2025-07-15 11:33:04.848 [INFO][2890] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9" Jul 15 11:33:04.992308 env[1205]: 2025-07-15 11:33:04.848 [INFO][2890] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9" Jul 15 11:33:04.992308 env[1205]: 2025-07-15 11:33:04.868 [INFO][2899] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9" HandleID="k8s-pod-network.b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9" Workload="10.0.0.87-k8s-csi--node--driver--vtfgv-eth0" Jul 15 11:33:04.992308 env[1205]: 2025-07-15 11:33:04.868 [INFO][2899] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 15 11:33:04.992308 env[1205]: 2025-07-15 11:33:04.868 [INFO][2899] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 15 11:33:04.992308 env[1205]: 2025-07-15 11:33:04.988 [WARNING][2899] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9" HandleID="k8s-pod-network.b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9" Workload="10.0.0.87-k8s-csi--node--driver--vtfgv-eth0" Jul 15 11:33:04.992308 env[1205]: 2025-07-15 11:33:04.988 [INFO][2899] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9" HandleID="k8s-pod-network.b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9" Workload="10.0.0.87-k8s-csi--node--driver--vtfgv-eth0" Jul 15 11:33:04.992308 env[1205]: 2025-07-15 11:33:04.989 [INFO][2899] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 15 11:33:04.992308 env[1205]: 2025-07-15 11:33:04.990 [INFO][2890] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9" Jul 15 11:33:04.992788 env[1205]: time="2025-07-15T11:33:04.992342396Z" level=info msg="TearDown network for sandbox \"b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9\" successfully" Jul 15 11:33:04.992788 env[1205]: time="2025-07-15T11:33:04.992421361Z" level=info msg="StopPodSandbox for \"b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9\" returns successfully" Jul 15 11:33:04.992991 env[1205]: time="2025-07-15T11:33:04.992954757Z" level=info msg="RemovePodSandbox for \"b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9\"" Jul 15 11:33:04.993042 env[1205]: time="2025-07-15T11:33:04.992990943Z" level=info msg="Forcibly stopping sandbox \"b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9\"" Jul 15 11:33:05.424584 env[1205]: 2025-07-15 11:33:05.039 [WARNING][2916] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.87-k8s-csi--node--driver--vtfgv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"532a9ca4-afe0-4bce-901e-f33b2d9c1f64", ResourceVersion:"1252", Generation:0, CreationTimestamp:time.Date(2025, time.July, 15, 11, 32, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"8967bcb6f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.87", ContainerID:"b845b6d2b54f1a1fbebda708d6d276cfbb294eab05a063febab84cfd3f25de51", Pod:"csi-node-driver-vtfgv", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.45.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali70bb8d9b7df", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 15 11:33:05.424584 env[1205]: 2025-07-15 11:33:05.040 [INFO][2916] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9" Jul 15 11:33:05.424584 env[1205]: 2025-07-15 11:33:05.040 [INFO][2916] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9" iface="eth0" netns="" Jul 15 11:33:05.424584 env[1205]: 2025-07-15 11:33:05.040 [INFO][2916] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9" Jul 15 11:33:05.424584 env[1205]: 2025-07-15 11:33:05.040 [INFO][2916] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9" Jul 15 11:33:05.424584 env[1205]: 2025-07-15 11:33:05.415 [INFO][2925] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9" HandleID="k8s-pod-network.b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9" Workload="10.0.0.87-k8s-csi--node--driver--vtfgv-eth0" Jul 15 11:33:05.424584 env[1205]: 2025-07-15 11:33:05.415 [INFO][2925] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 15 11:33:05.424584 env[1205]: 2025-07-15 11:33:05.415 [INFO][2925] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 15 11:33:05.424584 env[1205]: 2025-07-15 11:33:05.421 [WARNING][2925] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9" HandleID="k8s-pod-network.b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9" Workload="10.0.0.87-k8s-csi--node--driver--vtfgv-eth0" Jul 15 11:33:05.424584 env[1205]: 2025-07-15 11:33:05.421 [INFO][2925] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9" HandleID="k8s-pod-network.b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9" Workload="10.0.0.87-k8s-csi--node--driver--vtfgv-eth0" Jul 15 11:33:05.424584 env[1205]: 2025-07-15 11:33:05.422 [INFO][2925] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 15 11:33:05.424584 env[1205]: 2025-07-15 11:33:05.423 [INFO][2916] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9" Jul 15 11:33:05.425090 env[1205]: time="2025-07-15T11:33:05.424612825Z" level=info msg="TearDown network for sandbox \"b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9\" successfully" Jul 15 11:33:05.538332 systemd[1]: Created slice kubepods-besteffort-pod741d9221_dddc_4711_b708_42f07cce0c8f.slice. Jul 15 11:33:05.676554 env[1205]: time="2025-07-15T11:33:05.676411797Z" level=info msg="RemovePodSandbox \"b0f861a68ad1733cf3eb35cfdb1d5bd1ecbf8bf0c210757c77a4b850b96c94e9\" returns successfully" Jul 15 11:33:05.676953 env[1205]: time="2025-07-15T11:33:05.676911068Z" level=info msg="StopPodSandbox for \"015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b\"" Jul 15 11:33:05.721268 kubelet[1448]: I0715 11:33:05.721212 1448 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-k5vpp\" (UniqueName: \"kubernetes.io/projected/741d9221-dddc-4711-b708-42f07cce0c8f-kube-api-access-k5vpp\") pod \"test-pod-1\" (UID: \"741d9221-dddc-4711-b708-42f07cce0c8f\") " pod="default/test-pod-1" Jul 15 11:33:05.721268 kubelet[1448]: I0715 11:33:05.721253 1448 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-fcdb2c9b-29df-4f54-a61c-6c055f235451\" (UniqueName: \"kubernetes.io/nfs/741d9221-dddc-4711-b708-42f07cce0c8f-pvc-fcdb2c9b-29df-4f54-a61c-6c055f235451\") pod \"test-pod-1\" (UID: \"741d9221-dddc-4711-b708-42f07cce0c8f\") " pod="default/test-pod-1" Jul 15 11:33:05.788240 env[1205]: 2025-07-15 11:33:05.763 [WARNING][2945] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.87-k8s-nginx--deployment--7fcdb87857--p8fsg-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"7bd665c1-2b80-453a-a57e-1124e3eace1d", ResourceVersion:"1276", Generation:0, CreationTimestamp:time.Date(2025, time.July, 15, 11, 32, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.87", ContainerID:"f136364e3e5b4ee390a0a8aae7bc8dd984e97d6345e89b5a5b941389228641e9", Pod:"nginx-deployment-7fcdb87857-p8fsg", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.45.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calid9d13a115e7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 15 11:33:05.788240 env[1205]: 2025-07-15 11:33:05.763 [INFO][2945] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b" Jul 15 11:33:05.788240 env[1205]: 2025-07-15 11:33:05.763 [INFO][2945] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b" iface="eth0" netns="" Jul 15 11:33:05.788240 env[1205]: 2025-07-15 11:33:05.763 [INFO][2945] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b" Jul 15 11:33:05.788240 env[1205]: 2025-07-15 11:33:05.763 [INFO][2945] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b" Jul 15 11:33:05.788240 env[1205]: 2025-07-15 11:33:05.779 [INFO][2954] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b" HandleID="k8s-pod-network.015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b" Workload="10.0.0.87-k8s-nginx--deployment--7fcdb87857--p8fsg-eth0" Jul 15 11:33:05.788240 env[1205]: 2025-07-15 11:33:05.779 [INFO][2954] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 15 11:33:05.788240 env[1205]: 2025-07-15 11:33:05.779 [INFO][2954] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 15 11:33:05.788240 env[1205]: 2025-07-15 11:33:05.785 [WARNING][2954] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b" HandleID="k8s-pod-network.015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b" Workload="10.0.0.87-k8s-nginx--deployment--7fcdb87857--p8fsg-eth0" Jul 15 11:33:05.788240 env[1205]: 2025-07-15 11:33:05.785 [INFO][2954] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b" HandleID="k8s-pod-network.015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b" Workload="10.0.0.87-k8s-nginx--deployment--7fcdb87857--p8fsg-eth0" Jul 15 11:33:05.788240 env[1205]: 2025-07-15 11:33:05.786 [INFO][2954] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 15 11:33:05.788240 env[1205]: 2025-07-15 11:33:05.787 [INFO][2945] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b" Jul 15 11:33:05.789017 env[1205]: time="2025-07-15T11:33:05.788266326Z" level=info msg="TearDown network for sandbox \"015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b\" successfully" Jul 15 11:33:05.789017 env[1205]: time="2025-07-15T11:33:05.788298083Z" level=info msg="StopPodSandbox for \"015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b\" returns successfully" Jul 15 11:33:05.789017 env[1205]: time="2025-07-15T11:33:05.788732199Z" level=info msg="RemovePodSandbox for \"015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b\"" Jul 15 11:33:05.789017 env[1205]: time="2025-07-15T11:33:05.788757020Z" level=info msg="Forcibly stopping sandbox \"015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b\"" Jul 15 11:33:05.794944 kubelet[1448]: E0715 11:33:05.794911 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:05.831000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.835046 kernel: Failed to create system directory netfs Jul 15 11:33:05.835105 kernel: kauditd_printk_skb: 68 callbacks suppressed Jul 15 11:33:05.835133 kernel: audit: type=1400 audit(1752579185.831:791): avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.835171 kernel: Failed to create system directory netfs Jul 15 11:33:05.835928 kernel: audit: type=1400 audit(1752579185.831:791): avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.831000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.839236 kernel: Failed to create system directory netfs Jul 15 11:33:05.839965 kernel: audit: type=1400 audit(1752579185.831:791): avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.831000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.841519 env[1205]: 2025-07-15 11:33:05.812 [WARNING][2972] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.87-k8s-nginx--deployment--7fcdb87857--p8fsg-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"7bd665c1-2b80-453a-a57e-1124e3eace1d", ResourceVersion:"1276", Generation:0, CreationTimestamp:time.Date(2025, time.July, 15, 11, 32, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.87", ContainerID:"f136364e3e5b4ee390a0a8aae7bc8dd984e97d6345e89b5a5b941389228641e9", Pod:"nginx-deployment-7fcdb87857-p8fsg", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.45.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calid9d13a115e7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 15 11:33:05.841519 env[1205]: 2025-07-15 11:33:05.812 [INFO][2972] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b" Jul 15 11:33:05.841519 env[1205]: 2025-07-15 11:33:05.812 [INFO][2972] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b" iface="eth0" netns="" Jul 15 11:33:05.841519 env[1205]: 2025-07-15 11:33:05.812 [INFO][2972] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b" Jul 15 11:33:05.841519 env[1205]: 2025-07-15 11:33:05.812 [INFO][2972] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b" Jul 15 11:33:05.841519 env[1205]: 2025-07-15 11:33:05.829 [INFO][2981] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b" HandleID="k8s-pod-network.015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b" Workload="10.0.0.87-k8s-nginx--deployment--7fcdb87857--p8fsg-eth0" Jul 15 11:33:05.841519 env[1205]: 2025-07-15 11:33:05.829 [INFO][2981] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 15 11:33:05.841519 env[1205]: 2025-07-15 11:33:05.829 [INFO][2981] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 15 11:33:05.841519 env[1205]: 2025-07-15 11:33:05.835 [WARNING][2981] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b" HandleID="k8s-pod-network.015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b" Workload="10.0.0.87-k8s-nginx--deployment--7fcdb87857--p8fsg-eth0" Jul 15 11:33:05.841519 env[1205]: 2025-07-15 11:33:05.835 [INFO][2981] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b" HandleID="k8s-pod-network.015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b" Workload="10.0.0.87-k8s-nginx--deployment--7fcdb87857--p8fsg-eth0" Jul 15 11:33:05.841519 env[1205]: 2025-07-15 11:33:05.836 [INFO][2981] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 15 11:33:05.841519 env[1205]: 2025-07-15 11:33:05.840 [INFO][2972] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b" Jul 15 11:33:05.842000 env[1205]: time="2025-07-15T11:33:05.841557781Z" level=info msg="TearDown network for sandbox \"015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b\" successfully" Jul 15 11:33:05.844384 kernel: Failed to create system directory netfs Jul 15 11:33:05.844428 kernel: audit: type=1400 audit(1752579185.831:791): avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.831000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.831000 audit[2991]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5565df2ae5e0 a1=153bc a2=5565d03152b0 a3=5 items=0 ppid=521 pid=2991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:05.863021 kernel: audit: type=1300 audit(1752579185.831:791): arch=c000003e syscall=175 success=yes exit=0 a0=5565df2ae5e0 a1=153bc a2=5565d03152b0 a3=5 items=0 ppid=521 pid=2991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:05.831000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 15 11:33:05.868466 kernel: audit: type=1327 audit(1752579185.831:791): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 15 11:33:05.865000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.870858 kernel: Failed to create system directory fscache Jul 15 11:33:05.870896 kernel: audit: type=1400 audit(1752579185.865:792): avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.865000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.876779 kernel: Failed to create system directory fscache Jul 15 11:33:05.876818 kernel: audit: type=1400 audit(1752579185.865:792): avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.876937 kernel: Failed to create system directory fscache Jul 15 11:33:05.876969 kernel: audit: type=1400 audit(1752579185.865:792): avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.865000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.877477 kernel: Failed to create system directory fscache Jul 15 11:33:05.877522 kernel: Failed to create system directory fscache Jul 15 11:33:05.877548 kernel: Failed to create system directory fscache Jul 15 11:33:05.877572 kernel: Failed to create system directory fscache Jul 15 11:33:05.877585 kernel: Failed to create system directory fscache Jul 15 11:33:05.877597 kernel: Failed to create system directory fscache Jul 15 11:33:05.877609 kernel: Failed to create system directory fscache Jul 15 11:33:05.877622 kernel: Failed to create system directory fscache Jul 15 11:33:05.880555 kernel: audit: type=1400 audit(1752579185.865:792): avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.865000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.865000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.865000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.865000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.865000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.865000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.865000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.865000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.865000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.889919 kernel: Failed to create system directory fscache Jul 15 11:33:05.889951 kernel: Failed to create system directory fscache Jul 15 11:33:05.865000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.865000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.891343 kernel: Failed to create system directory fscache Jul 15 11:33:05.865000 audit[2991]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5565df4c39c0 a1=4c0fc a2=5565d03152b0 a3=5 items=0 ppid=521 pid=2991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:05.865000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 15 11:33:05.893862 kernel: FS-Cache: Loaded Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.924027 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.924094 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.924116 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.925410 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.925441 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.926100 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.928306 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.928356 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.929908 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.929929 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.931304 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.931332 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.933384 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.933415 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.933437 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.934072 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.935442 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.935481 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.935749 env[1205]: time="2025-07-15T11:33:05.935704716Z" level=info msg="RemovePodSandbox \"015d7227dea232ec9252b114b5c55b24b97e74f39f257a42ccf6a173fb32df9b\" returns successfully" Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.936862 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.936882 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.938242 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.938268 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.940306 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.940342 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.940362 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.942343 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.942369 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.942382 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.944430 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.944469 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.944484 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.946448 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.946477 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.946495 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.948494 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.948517 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.948530 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.949875 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.949894 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.951240 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.951266 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.953291 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.953316 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.953329 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.955340 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.955364 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.955381 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.956027 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.957403 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.957429 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.959460 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.959500 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.959525 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.960147 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.961513 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.961539 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.962895 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.962922 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.964261 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.964304 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.971603 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.971647 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.971665 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.972983 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.973010 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.974367 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.974428 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.976426 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.976455 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.976478 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.977120 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.978492 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.978515 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.979895 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.979943 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.981264 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.981292 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.983352 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.983385 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.983405 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.985382 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.985409 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.985432 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.986070 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.987446 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.987473 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.989499 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.989524 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.989539 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.990187 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.992248 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.992309 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.992344 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.994302 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.994345 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.994364 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.996381 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.996428 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.996453 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.998464 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.998500 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.998518 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.999858 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.999886 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.001227 kernel: Failed to create system directory sunrpc Jul 15 11:33:06.001254 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.003294 kernel: Failed to create system directory sunrpc Jul 15 11:33:06.003324 kernel: Failed to create system directory sunrpc Jul 15 11:33:06.003343 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.005394 kernel: Failed to create system directory sunrpc Jul 15 11:33:06.005431 kernel: Failed to create system directory sunrpc Jul 15 11:33:06.005455 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.006074 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.007460 kernel: Failed to create system directory sunrpc Jul 15 11:33:06.007491 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.008863 kernel: Failed to create system directory sunrpc Jul 15 11:33:06.008905 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.010248 kernel: Failed to create system directory sunrpc Jul 15 11:33:06.010290 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.012287 kernel: Failed to create system directory sunrpc Jul 15 11:33:06.012321 kernel: Failed to create system directory sunrpc Jul 15 11:33:06.012338 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.014376 kernel: Failed to create system directory sunrpc Jul 15 11:33:06.014414 kernel: Failed to create system directory sunrpc Jul 15 11:33:06.014433 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.015062 kernel: Failed to create system directory sunrpc Jul 15 11:33:05.911000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.026239 kernel: RPC: Registered named UNIX socket transport module. Jul 15 11:33:06.026278 kernel: RPC: Registered udp transport module. Jul 15 11:33:06.026299 kernel: RPC: Registered tcp transport module. Jul 15 11:33:06.026326 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Jul 15 11:33:05.911000 audit[2991]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5565df50fad0 a1=1a81bc a2=5565d03152b0 a3=5 items=6 ppid=521 pid=2991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:05.911000 audit: CWD cwd="/" Jul 15 11:33:05.911000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:05.911000 audit: PATH item=1 name=(null) inode=23864 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:05.911000 audit: PATH item=2 name=(null) inode=23864 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:05.911000 audit: PATH item=3 name=(null) inode=23865 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:05.911000 audit: PATH item=4 name=(null) inode=23864 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:05.911000 audit: PATH item=5 name=(null) inode=23866 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:05.911000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.061349 kernel: Failed to create system directory nfs Jul 15 11:33:06.061391 kernel: Failed to create system directory nfs Jul 15 11:33:06.061412 kernel: Failed to create system directory nfs Jul 15 11:33:06.061430 kernel: Failed to create system directory nfs Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.063293 kernel: Failed to create system directory nfs Jul 15 11:33:06.063331 kernel: Failed to create system directory nfs Jul 15 11:33:06.063356 kernel: Failed to create system directory nfs Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.065266 kernel: Failed to create system directory nfs Jul 15 11:33:06.065296 kernel: Failed to create system directory nfs Jul 15 11:33:06.065317 kernel: Failed to create system directory nfs Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.067221 kernel: Failed to create system directory nfs Jul 15 11:33:06.067260 kernel: Failed to create system directory nfs Jul 15 11:33:06.067282 kernel: Failed to create system directory nfs Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.069176 kernel: Failed to create system directory nfs Jul 15 11:33:06.069216 kernel: Failed to create system directory nfs Jul 15 11:33:06.069236 kernel: Failed to create system directory nfs Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.069865 kernel: Failed to create system directory nfs Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.071144 kernel: Failed to create system directory nfs Jul 15 11:33:06.071174 kernel: Failed to create system directory nfs Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.072449 kernel: Failed to create system directory nfs Jul 15 11:33:06.072479 kernel: Failed to create system directory nfs Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.074431 kernel: Failed to create system directory nfs Jul 15 11:33:06.074483 kernel: Failed to create system directory nfs Jul 15 11:33:06.074507 kernel: Failed to create system directory nfs Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.076398 kernel: Failed to create system directory nfs Jul 15 11:33:06.076428 kernel: Failed to create system directory nfs Jul 15 11:33:06.076448 kernel: Failed to create system directory nfs Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.078380 kernel: Failed to create system directory nfs Jul 15 11:33:06.078419 kernel: Failed to create system directory nfs Jul 15 11:33:06.078440 kernel: Failed to create system directory nfs Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.080336 kernel: Failed to create system directory nfs Jul 15 11:33:06.080366 kernel: Failed to create system directory nfs Jul 15 11:33:06.080392 kernel: Failed to create system directory nfs Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.082319 kernel: Failed to create system directory nfs Jul 15 11:33:06.082349 kernel: Failed to create system directory nfs Jul 15 11:33:06.082369 kernel: Failed to create system directory nfs Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.084290 kernel: Failed to create system directory nfs Jul 15 11:33:06.084328 kernel: Failed to create system directory nfs Jul 15 11:33:06.084348 kernel: Failed to create system directory nfs Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.086268 kernel: Failed to create system directory nfs Jul 15 11:33:06.086307 kernel: Failed to create system directory nfs Jul 15 11:33:06.086328 kernel: Failed to create system directory nfs Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.088238 kernel: Failed to create system directory nfs Jul 15 11:33:06.088270 kernel: Failed to create system directory nfs Jul 15 11:33:06.088296 kernel: Failed to create system directory nfs Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.090236 kernel: Failed to create system directory nfs Jul 15 11:33:06.090272 kernel: Failed to create system directory nfs Jul 15 11:33:06.090299 kernel: Failed to create system directory nfs Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.092192 kernel: Failed to create system directory nfs Jul 15 11:33:06.092216 kernel: Failed to create system directory nfs Jul 15 11:33:06.092229 kernel: Failed to create system directory nfs Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.094173 kernel: Failed to create system directory nfs Jul 15 11:33:06.094224 kernel: Failed to create system directory nfs Jul 15 11:33:06.094244 kernel: Failed to create system directory nfs Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.095514 kernel: Failed to create system directory nfs Jul 15 11:33:06.095562 kernel: Failed to create system directory nfs Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.096210 kernel: Failed to create system directory nfs Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.098233 kernel: Failed to create system directory nfs Jul 15 11:33:06.098264 kernel: Failed to create system directory nfs Jul 15 11:33:06.098295 kernel: Failed to create system directory nfs Jul 15 11:33:06.051000 audit[2991]: AVC avc: denied { confidentiality } for pid=2991 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.051000 audit[2991]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5565df730af0 a1=16ed54 a2=5565d03152b0 a3=5 items=0 ppid=521 pid=2991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:06.138899 kernel: FS-Cache: Netfs 'nfs' registered for caching Jul 15 11:33:06.051000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.175542 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.175609 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.175635 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.176933 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.176971 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.178295 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.178316 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.181891 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.181934 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.184074 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.184109 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.185510 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.185533 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.186971 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.187001 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.188401 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.189128 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.189859 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.189902 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.191282 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.191311 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.193413 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.193451 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.193470 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.194884 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.194914 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.196350 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.196387 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.198510 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.198556 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.198576 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.199941 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.201438 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.201468 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.201486 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.202890 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.202920 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.204351 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.204397 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.206474 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.206496 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.206516 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.207862 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.209251 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.209269 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.209281 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.211381 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.211402 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.211415 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.213537 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.213569 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.213582 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.215016 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.215054 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.216468 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.216492 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.217858 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.217886 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.219240 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.219959 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.219994 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.221341 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.221362 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.223389 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.223408 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.223430 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.225520 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.225572 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.225593 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.226990 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.227021 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.228406 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.228443 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.230481 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.230517 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.230542 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.231224 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.233363 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.233401 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.233420 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.235485 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.235522 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.235542 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.236920 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.236960 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.238335 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.238360 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.240416 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.240452 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.240475 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.242490 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.242539 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.242554 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.162000 audit[2997]: AVC avc: denied { confidentiality } for pid=2997 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.243890 kernel: Failed to create system directory nfs4 Jul 15 11:33:06.381175 kernel: NFS: Registering the id_resolver key type Jul 15 11:33:06.381224 kernel: Key type id_resolver registered Jul 15 11:33:06.381257 kernel: Key type id_legacy registered Jul 15 11:33:06.162000 audit[2997]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f4dafd5a010 a1=2095ac a2=56165b2922b0 a3=5 items=0 ppid=521 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:06.162000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Jul 15 11:33:06.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.394347 kernel: Failed to create system directory rpcgss Jul 15 11:33:06.394391 kernel: Failed to create system directory rpcgss Jul 15 11:33:06.394410 kernel: Failed to create system directory rpcgss Jul 15 11:33:06.394424 kernel: Failed to create system directory rpcgss Jul 15 11:33:06.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.396486 kernel: Failed to create system directory rpcgss Jul 15 11:33:06.396518 kernel: Failed to create system directory rpcgss Jul 15 11:33:06.396542 kernel: Failed to create system directory rpcgss Jul 15 11:33:06.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.397899 kernel: Failed to create system directory rpcgss Jul 15 11:33:06.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.399331 kernel: Failed to create system directory rpcgss Jul 15 11:33:06.399357 kernel: Failed to create system directory rpcgss Jul 15 11:33:06.399370 kernel: Failed to create system directory rpcgss Jul 15 11:33:06.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.401441 kernel: Failed to create system directory rpcgss Jul 15 11:33:06.401479 kernel: Failed to create system directory rpcgss Jul 15 11:33:06.401493 kernel: Failed to create system directory rpcgss Jul 15 11:33:06.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.402853 kernel: Failed to create system directory rpcgss Jul 15 11:33:06.402873 kernel: Failed to create system directory rpcgss Jul 15 11:33:06.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.404262 kernel: Failed to create system directory rpcgss Jul 15 11:33:06.404283 kernel: Failed to create system directory rpcgss Jul 15 11:33:06.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.406537 kernel: Failed to create system directory rpcgss Jul 15 11:33:06.406584 kernel: Failed to create system directory rpcgss Jul 15 11:33:06.406721 kernel: Failed to create system directory rpcgss Jul 15 11:33:06.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.408105 kernel: Failed to create system directory rpcgss Jul 15 11:33:06.408131 kernel: Failed to create system directory rpcgss Jul 15 11:33:06.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.409522 kernel: Failed to create system directory rpcgss Jul 15 11:33:06.409542 kernel: Failed to create system directory rpcgss Jul 15 11:33:06.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.389000 audit[2998]: AVC avc: denied { confidentiality } for pid=2998 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:06.410939 kernel: Failed to create system directory rpcgss Jul 15 11:33:06.389000 audit[2998]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f2dbdce1010 a1=70bac a2=55e72e7792b0 a3=5 items=0 ppid=521 pid=2998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:06.389000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Jul 15 11:33:06.446073 nfsidmap[3006]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Jul 15 11:33:06.448407 nfsidmap[3009]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Jul 15 11:33:06.454000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2641 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 15 11:33:06.454000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2641 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 15 11:33:06.454000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2641 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 15 11:33:06.455000 audit[1272]: AVC avc: denied { watch_reads } for pid=1272 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2641 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 15 11:33:06.455000 audit[1272]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55bdd43e7810 a2=10 a3=a87171dc06c56fee items=0 ppid=1 pid=1272 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:06.455000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 15 11:33:06.455000 audit[1272]: AVC avc: denied { watch_reads } for pid=1272 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2641 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 15 11:33:06.455000 audit[1272]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55bdd43e7810 a2=10 a3=a87171dc06c56fee items=0 ppid=1 pid=1272 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:06.455000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 15 11:33:06.455000 audit[1272]: AVC avc: denied { watch_reads } for pid=1272 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2641 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 15 11:33:06.455000 audit[1272]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55bdd43e7810 a2=10 a3=a87171dc06c56fee items=0 ppid=1 pid=1272 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:06.455000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 15 11:33:06.741037 env[1205]: time="2025-07-15T11:33:06.740994603Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:741d9221-dddc-4711-b708-42f07cce0c8f,Namespace:default,Attempt:0,}" Jul 15 11:33:06.796006 kubelet[1448]: E0715 11:33:06.795961 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:06.834332 systemd-networkd[1028]: cali5ec59c6bf6e: Link UP Jul 15 11:33:06.836926 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 15 11:33:06.837013 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Jul 15 11:33:06.837187 systemd-networkd[1028]: cali5ec59c6bf6e: Gained carrier Jul 15 11:33:06.845786 env[1205]: 2025-07-15 11:33:06.778 [INFO][3013] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.87-k8s-test--pod--1-eth0 default 741d9221-dddc-4711-b708-42f07cce0c8f 1390 0 2025-07-15 11:32:51 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.87 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="b3d6dac6bd596a653ca864c8369dc9abe2334325142e0b337b5b7407f6e802a0" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.87-k8s-test--pod--1-" Jul 15 11:33:06.845786 env[1205]: 2025-07-15 11:33:06.778 [INFO][3013] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="b3d6dac6bd596a653ca864c8369dc9abe2334325142e0b337b5b7407f6e802a0" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.87-k8s-test--pod--1-eth0" Jul 15 11:33:06.845786 env[1205]: 2025-07-15 11:33:06.800 [INFO][3027] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b3d6dac6bd596a653ca864c8369dc9abe2334325142e0b337b5b7407f6e802a0" HandleID="k8s-pod-network.b3d6dac6bd596a653ca864c8369dc9abe2334325142e0b337b5b7407f6e802a0" Workload="10.0.0.87-k8s-test--pod--1-eth0" Jul 15 11:33:06.845786 env[1205]: 2025-07-15 11:33:06.800 [INFO][3027] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b3d6dac6bd596a653ca864c8369dc9abe2334325142e0b337b5b7407f6e802a0" HandleID="k8s-pod-network.b3d6dac6bd596a653ca864c8369dc9abe2334325142e0b337b5b7407f6e802a0" Workload="10.0.0.87-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004e7f0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.87", "pod":"test-pod-1", "timestamp":"2025-07-15 11:33:06.800626288 +0000 UTC"}, Hostname:"10.0.0.87", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 15 11:33:06.845786 env[1205]: 2025-07-15 11:33:06.800 [INFO][3027] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 15 11:33:06.845786 env[1205]: 2025-07-15 11:33:06.800 [INFO][3027] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 15 11:33:06.845786 env[1205]: 2025-07-15 11:33:06.800 [INFO][3027] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.87' Jul 15 11:33:06.845786 env[1205]: 2025-07-15 11:33:06.808 [INFO][3027] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.b3d6dac6bd596a653ca864c8369dc9abe2334325142e0b337b5b7407f6e802a0" host="10.0.0.87" Jul 15 11:33:06.845786 env[1205]: 2025-07-15 11:33:06.813 [INFO][3027] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.87" Jul 15 11:33:06.845786 env[1205]: 2025-07-15 11:33:06.816 [INFO][3027] ipam/ipam.go 511: Trying affinity for 192.168.45.0/26 host="10.0.0.87" Jul 15 11:33:06.845786 env[1205]: 2025-07-15 11:33:06.818 [INFO][3027] ipam/ipam.go 158: Attempting to load block cidr=192.168.45.0/26 host="10.0.0.87" Jul 15 11:33:06.845786 env[1205]: 2025-07-15 11:33:06.819 [INFO][3027] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.45.0/26 host="10.0.0.87" Jul 15 11:33:06.845786 env[1205]: 2025-07-15 11:33:06.819 [INFO][3027] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.45.0/26 handle="k8s-pod-network.b3d6dac6bd596a653ca864c8369dc9abe2334325142e0b337b5b7407f6e802a0" host="10.0.0.87" Jul 15 11:33:06.845786 env[1205]: 2025-07-15 11:33:06.820 [INFO][3027] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.b3d6dac6bd596a653ca864c8369dc9abe2334325142e0b337b5b7407f6e802a0 Jul 15 11:33:06.845786 env[1205]: 2025-07-15 11:33:06.825 [INFO][3027] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.45.0/26 handle="k8s-pod-network.b3d6dac6bd596a653ca864c8369dc9abe2334325142e0b337b5b7407f6e802a0" host="10.0.0.87" Jul 15 11:33:06.845786 env[1205]: 2025-07-15 11:33:06.830 [INFO][3027] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.45.4/26] block=192.168.45.0/26 handle="k8s-pod-network.b3d6dac6bd596a653ca864c8369dc9abe2334325142e0b337b5b7407f6e802a0" host="10.0.0.87" Jul 15 11:33:06.845786 env[1205]: 2025-07-15 11:33:06.830 [INFO][3027] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.45.4/26] handle="k8s-pod-network.b3d6dac6bd596a653ca864c8369dc9abe2334325142e0b337b5b7407f6e802a0" host="10.0.0.87" Jul 15 11:33:06.845786 env[1205]: 2025-07-15 11:33:06.830 [INFO][3027] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 15 11:33:06.845786 env[1205]: 2025-07-15 11:33:06.830 [INFO][3027] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.45.4/26] IPv6=[] ContainerID="b3d6dac6bd596a653ca864c8369dc9abe2334325142e0b337b5b7407f6e802a0" HandleID="k8s-pod-network.b3d6dac6bd596a653ca864c8369dc9abe2334325142e0b337b5b7407f6e802a0" Workload="10.0.0.87-k8s-test--pod--1-eth0" Jul 15 11:33:06.845786 env[1205]: 2025-07-15 11:33:06.832 [INFO][3013] cni-plugin/k8s.go 418: Populated endpoint ContainerID="b3d6dac6bd596a653ca864c8369dc9abe2334325142e0b337b5b7407f6e802a0" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.87-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.87-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"741d9221-dddc-4711-b708-42f07cce0c8f", ResourceVersion:"1390", Generation:0, CreationTimestamp:time.Date(2025, time.July, 15, 11, 32, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.87", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.45.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 15 11:33:06.846891 env[1205]: 2025-07-15 11:33:06.832 [INFO][3013] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.45.4/32] ContainerID="b3d6dac6bd596a653ca864c8369dc9abe2334325142e0b337b5b7407f6e802a0" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.87-k8s-test--pod--1-eth0" Jul 15 11:33:06.846891 env[1205]: 2025-07-15 11:33:06.832 [INFO][3013] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="b3d6dac6bd596a653ca864c8369dc9abe2334325142e0b337b5b7407f6e802a0" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.87-k8s-test--pod--1-eth0" Jul 15 11:33:06.846891 env[1205]: 2025-07-15 11:33:06.837 [INFO][3013] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b3d6dac6bd596a653ca864c8369dc9abe2334325142e0b337b5b7407f6e802a0" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.87-k8s-test--pod--1-eth0" Jul 15 11:33:06.846891 env[1205]: 2025-07-15 11:33:06.838 [INFO][3013] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="b3d6dac6bd596a653ca864c8369dc9abe2334325142e0b337b5b7407f6e802a0" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.87-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.87-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"741d9221-dddc-4711-b708-42f07cce0c8f", ResourceVersion:"1390", Generation:0, CreationTimestamp:time.Date(2025, time.July, 15, 11, 32, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.87", ContainerID:"b3d6dac6bd596a653ca864c8369dc9abe2334325142e0b337b5b7407f6e802a0", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.45.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"2a:ab:de:a3:15:7e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 15 11:33:06.846891 env[1205]: 2025-07-15 11:33:06.844 [INFO][3013] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="b3d6dac6bd596a653ca864c8369dc9abe2334325142e0b337b5b7407f6e802a0" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.87-k8s-test--pod--1-eth0" Jul 15 11:33:06.853000 audit[3051]: NETFILTER_CFG table=filter:100 family=2 entries=40 op=nft_register_chain pid=3051 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 15 11:33:06.853000 audit[3051]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffe7f8dd970 a2=0 a3=7ffe7f8dd95c items=0 ppid=2088 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:06.853000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 15 11:33:06.855787 env[1205]: time="2025-07-15T11:33:06.855706129Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 15 11:33:06.855787 env[1205]: time="2025-07-15T11:33:06.855755181Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 15 11:33:06.855949 env[1205]: time="2025-07-15T11:33:06.855782417Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 15 11:33:06.856124 env[1205]: time="2025-07-15T11:33:06.856048580Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b3d6dac6bd596a653ca864c8369dc9abe2334325142e0b337b5b7407f6e802a0 pid=3050 runtime=io.containerd.runc.v2 Jul 15 11:33:06.865370 systemd[1]: Started cri-containerd-b3d6dac6bd596a653ca864c8369dc9abe2334325142e0b337b5b7407f6e802a0.scope. Jul 15 11:33:06.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.874000 audit: BPF prog-id=129 op=LOAD Jul 15 11:33:06.875000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.875000 audit[3060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3050 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:06.875000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233643664616336626435393661363533636138363463383336396463 Jul 15 11:33:06.875000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.875000 audit[3060]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3050 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:06.875000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233643664616336626435393661363533636138363463383336396463 Jul 15 11:33:06.875000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.875000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.875000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.875000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.875000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.875000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.875000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.875000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.875000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.875000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.875000 audit: BPF prog-id=130 op=LOAD Jul 15 11:33:06.875000 audit[3060]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003de9d0 items=0 ppid=3050 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:06.875000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233643664616336626435393661363533636138363463383336396463 Jul 15 11:33:06.875000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.875000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.875000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.875000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.875000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.875000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.875000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.875000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.875000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.875000 audit: BPF prog-id=131 op=LOAD Jul 15 11:33:06.875000 audit[3060]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003dea18 items=0 ppid=3050 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:06.875000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233643664616336626435393661363533636138363463383336396463 Jul 15 11:33:06.875000 audit: BPF prog-id=131 op=UNLOAD Jul 15 11:33:06.875000 audit: BPF prog-id=130 op=UNLOAD Jul 15 11:33:06.875000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.875000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.875000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.875000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.875000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.875000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.875000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.875000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.875000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.875000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.875000 audit: BPF prog-id=132 op=LOAD Jul 15 11:33:06.875000 audit[3060]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003dee28 items=0 ppid=3050 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:06.875000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233643664616336626435393661363533636138363463383336396463 Jul 15 11:33:06.876923 systemd-resolved[1146]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 15 11:33:06.899800 env[1205]: time="2025-07-15T11:33:06.899746429Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:741d9221-dddc-4711-b708-42f07cce0c8f,Namespace:default,Attempt:0,} returns sandbox id \"b3d6dac6bd596a653ca864c8369dc9abe2334325142e0b337b5b7407f6e802a0\"" Jul 15 11:33:06.901048 env[1205]: time="2025-07-15T11:33:06.901028073Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Jul 15 11:33:07.754553 env[1205]: time="2025-07-15T11:33:07.754430602Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:07.765791 env[1205]: time="2025-07-15T11:33:07.765743826Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:f6422896ca84c9af48d5417d6b7a573bf6b38f81edc15538907d987fc658d909,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:07.785903 env[1205]: time="2025-07-15T11:33:07.785854379Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:07.788586 env[1205]: time="2025-07-15T11:33:07.788559778Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:30bb68e656e0665bce700e67d2756f68bdca3345fa1099a32bfdb8febcf621cd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:07.789394 env[1205]: time="2025-07-15T11:33:07.789348062Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:f6422896ca84c9af48d5417d6b7a573bf6b38f81edc15538907d987fc658d909\"" Jul 15 11:33:07.795623 env[1205]: time="2025-07-15T11:33:07.795575954Z" level=info msg="CreateContainer within sandbox \"b3d6dac6bd596a653ca864c8369dc9abe2334325142e0b337b5b7407f6e802a0\" for container &ContainerMetadata{Name:test,Attempt:0,}" Jul 15 11:33:07.796496 kubelet[1448]: E0715 11:33:07.796452 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:07.807418 env[1205]: time="2025-07-15T11:33:07.807365686Z" level=info msg="CreateContainer within sandbox \"b3d6dac6bd596a653ca864c8369dc9abe2334325142e0b337b5b7407f6e802a0\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"8d14eeba1e7e4939e20578fba0686d7f5d878d971fe461c56291d7bfd33ddc2e\"" Jul 15 11:33:07.807991 env[1205]: time="2025-07-15T11:33:07.807954476Z" level=info msg="StartContainer for \"8d14eeba1e7e4939e20578fba0686d7f5d878d971fe461c56291d7bfd33ddc2e\"" Jul 15 11:33:07.824279 systemd[1]: Started cri-containerd-8d14eeba1e7e4939e20578fba0686d7f5d878d971fe461c56291d7bfd33ddc2e.scope. Jul 15 11:33:07.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:07.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:07.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:07.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:07.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:07.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:07.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:07.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:07.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:07.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:07.835000 audit: BPF prog-id=133 op=LOAD Jul 15 11:33:07.835000 audit[3091]: AVC avc: denied { bpf } for pid=3091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:07.835000 audit[3091]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3050 pid=3091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:07.835000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864313465656261316537653439333965323035373866626130363836 Jul 15 11:33:07.835000 audit[3091]: AVC avc: denied { perfmon } for pid=3091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:07.835000 audit[3091]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3050 pid=3091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:07.835000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864313465656261316537653439333965323035373866626130363836 Jul 15 11:33:07.835000 audit[3091]: AVC avc: denied { bpf } for pid=3091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:07.835000 audit[3091]: AVC avc: denied { bpf } for pid=3091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:07.835000 audit[3091]: AVC avc: denied { bpf } for pid=3091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:07.835000 audit[3091]: AVC avc: denied { perfmon } for pid=3091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:07.835000 audit[3091]: AVC avc: denied { perfmon } for pid=3091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:07.835000 audit[3091]: AVC avc: denied { perfmon } for pid=3091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:07.835000 audit[3091]: AVC avc: denied { perfmon } for pid=3091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:07.835000 audit[3091]: AVC avc: denied { perfmon } for pid=3091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:07.835000 audit[3091]: AVC avc: denied { bpf } for pid=3091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:07.835000 audit[3091]: AVC avc: denied { bpf } for pid=3091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:07.835000 audit: BPF prog-id=134 op=LOAD Jul 15 11:33:07.835000 audit[3091]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000354160 items=0 ppid=3050 pid=3091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:07.835000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864313465656261316537653439333965323035373866626130363836 Jul 15 11:33:07.835000 audit[3091]: AVC avc: denied { bpf } for pid=3091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:07.835000 audit[3091]: AVC avc: denied { bpf } for pid=3091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:07.835000 audit[3091]: AVC avc: denied { perfmon } for pid=3091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:07.835000 audit[3091]: AVC avc: denied { perfmon } for pid=3091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:07.835000 audit[3091]: AVC avc: denied { perfmon } for pid=3091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:07.835000 audit[3091]: AVC avc: denied { perfmon } for pid=3091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:07.835000 audit[3091]: AVC avc: denied { perfmon } for pid=3091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:07.835000 audit[3091]: AVC avc: denied { bpf } for pid=3091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:07.835000 audit[3091]: AVC avc: denied { bpf } for pid=3091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:07.835000 audit: BPF prog-id=135 op=LOAD Jul 15 11:33:07.835000 audit[3091]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003541a8 items=0 ppid=3050 pid=3091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:07.835000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864313465656261316537653439333965323035373866626130363836 Jul 15 11:33:07.835000 audit: BPF prog-id=135 op=UNLOAD Jul 15 11:33:07.835000 audit: BPF prog-id=134 op=UNLOAD Jul 15 11:33:07.835000 audit[3091]: AVC avc: denied { bpf } for pid=3091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:07.835000 audit[3091]: AVC avc: denied { bpf } for pid=3091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:07.835000 audit[3091]: AVC avc: denied { bpf } for pid=3091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:07.835000 audit[3091]: AVC avc: denied { perfmon } for pid=3091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:07.835000 audit[3091]: AVC avc: denied { perfmon } for pid=3091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:07.835000 audit[3091]: AVC avc: denied { perfmon } for pid=3091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:07.835000 audit[3091]: AVC avc: denied { perfmon } for pid=3091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:07.835000 audit[3091]: AVC avc: denied { perfmon } for pid=3091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:07.835000 audit[3091]: AVC avc: denied { bpf } for pid=3091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:07.835000 audit[3091]: AVC avc: denied { bpf } for pid=3091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:07.835000 audit: BPF prog-id=136 op=LOAD Jul 15 11:33:07.835000 audit[3091]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003545b8 items=0 ppid=3050 pid=3091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:07.835000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864313465656261316537653439333965323035373866626130363836 Jul 15 11:33:07.850981 env[1205]: time="2025-07-15T11:33:07.850924001Z" level=info msg="StartContainer for \"8d14eeba1e7e4939e20578fba0686d7f5d878d971fe461c56291d7bfd33ddc2e\" returns successfully" Jul 15 11:33:08.393601 kubelet[1448]: I0715 11:33:08.393513 1448 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=16.50360465 podStartE2EDuration="17.393489928s" podCreationTimestamp="2025-07-15 11:32:51 +0000 UTC" firstStartedPulling="2025-07-15 11:33:06.900486066 +0000 UTC m=+62.423525766" lastFinishedPulling="2025-07-15 11:33:07.790371324 +0000 UTC m=+63.313411044" observedRunningTime="2025-07-15 11:33:08.393254532 +0000 UTC m=+63.916294272" watchObservedRunningTime="2025-07-15 11:33:08.393489928 +0000 UTC m=+63.916529638" Jul 15 11:33:08.574038 systemd-networkd[1028]: cali5ec59c6bf6e: Gained IPv6LL Jul 15 11:33:08.797585 kubelet[1448]: E0715 11:33:08.797523 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:09.798003 kubelet[1448]: E0715 11:33:09.797948 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:10.798343 kubelet[1448]: E0715 11:33:10.798298 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:11.798800 kubelet[1448]: E0715 11:33:11.798730 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:12.799141 kubelet[1448]: E0715 11:33:12.799085 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:13.800023 kubelet[1448]: E0715 11:33:13.799970 1448 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"