Jul 15 11:32:47.976023 kernel: Linux version 5.15.188-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Tue Jul 15 10:04:37 -00 2025 Jul 15 11:32:47.976044 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=3fdbb2e3469f90ee764ea38c6fc4332d45967696e3c4fd4a8c65f8d0125b235b Jul 15 11:32:47.976054 kernel: BIOS-provided physical RAM map: Jul 15 11:32:47.976060 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Jul 15 11:32:47.976065 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000007fffff] usable Jul 15 11:32:47.976070 kernel: BIOS-e820: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS Jul 15 11:32:47.976077 kernel: BIOS-e820: [mem 0x0000000000808000-0x000000000080afff] usable Jul 15 11:32:47.976083 kernel: BIOS-e820: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS Jul 15 11:32:47.976089 kernel: BIOS-e820: [mem 0x000000000080c000-0x000000000080ffff] usable Jul 15 11:32:47.976095 kernel: BIOS-e820: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS Jul 15 11:32:47.976101 kernel: BIOS-e820: [mem 0x0000000000900000-0x000000009c8eefff] usable Jul 15 11:32:47.976107 kernel: BIOS-e820: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved Jul 15 11:32:47.976131 kernel: BIOS-e820: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data Jul 15 11:32:47.976137 kernel: BIOS-e820: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS Jul 15 11:32:47.976144 kernel: BIOS-e820: [mem 0x000000009cbff000-0x000000009cf3ffff] usable Jul 15 11:32:47.976152 kernel: BIOS-e820: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved Jul 15 11:32:47.976158 kernel: BIOS-e820: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS Jul 15 11:32:47.976164 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Jul 15 11:32:47.976173 kernel: NX (Execute Disable) protection: active Jul 15 11:32:47.976179 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable Jul 15 11:32:47.976185 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable Jul 15 11:32:47.976191 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable Jul 15 11:32:47.976197 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable Jul 15 11:32:47.976203 kernel: extended physical RAM map: Jul 15 11:32:47.976209 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable Jul 15 11:32:47.976216 kernel: reserve setup_data: [mem 0x0000000000100000-0x00000000007fffff] usable Jul 15 11:32:47.976222 kernel: reserve setup_data: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS Jul 15 11:32:47.976228 kernel: reserve setup_data: [mem 0x0000000000808000-0x000000000080afff] usable Jul 15 11:32:47.976234 kernel: reserve setup_data: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS Jul 15 11:32:47.976240 kernel: reserve setup_data: [mem 0x000000000080c000-0x000000000080ffff] usable Jul 15 11:32:47.976246 kernel: reserve setup_data: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS Jul 15 11:32:47.976252 kernel: reserve setup_data: [mem 0x0000000000900000-0x000000009b438017] usable Jul 15 11:32:47.976258 kernel: reserve setup_data: [mem 0x000000009b438018-0x000000009b474e57] usable Jul 15 11:32:47.976264 kernel: reserve setup_data: [mem 0x000000009b474e58-0x000000009b475017] usable Jul 15 11:32:47.976270 kernel: reserve setup_data: [mem 0x000000009b475018-0x000000009b47ec57] usable Jul 15 11:32:47.976276 kernel: reserve setup_data: [mem 0x000000009b47ec58-0x000000009c8eefff] usable Jul 15 11:32:47.976283 kernel: reserve setup_data: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved Jul 15 11:32:47.976289 kernel: reserve setup_data: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data Jul 15 11:32:47.976295 kernel: reserve setup_data: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS Jul 15 11:32:47.976301 kernel: reserve setup_data: [mem 0x000000009cbff000-0x000000009cf3ffff] usable Jul 15 11:32:47.976309 kernel: reserve setup_data: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved Jul 15 11:32:47.976316 kernel: reserve setup_data: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS Jul 15 11:32:47.976322 kernel: reserve setup_data: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Jul 15 11:32:47.976330 kernel: efi: EFI v2.70 by EDK II Jul 15 11:32:47.976336 kernel: efi: SMBIOS=0x9c9ab000 ACPI=0x9cb7e000 ACPI 2.0=0x9cb7e014 MEMATTR=0x9b673018 RNG=0x9cb73018 Jul 15 11:32:47.976343 kernel: random: crng init done Jul 15 11:32:47.976349 kernel: SMBIOS 2.8 present. Jul 15 11:32:47.976356 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 Jul 15 11:32:47.976362 kernel: Hypervisor detected: KVM Jul 15 11:32:47.976369 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Jul 15 11:32:47.976375 kernel: kvm-clock: cpu 0, msr 3319b001, primary cpu clock Jul 15 11:32:47.976381 kernel: kvm-clock: using sched offset of 5503749931 cycles Jul 15 11:32:47.976393 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Jul 15 11:32:47.976400 kernel: tsc: Detected 2794.750 MHz processor Jul 15 11:32:47.976407 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Jul 15 11:32:47.976413 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Jul 15 11:32:47.976420 kernel: last_pfn = 0x9cf40 max_arch_pfn = 0x400000000 Jul 15 11:32:47.976427 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Jul 15 11:32:47.976433 kernel: Using GB pages for direct mapping Jul 15 11:32:47.976440 kernel: Secure boot disabled Jul 15 11:32:47.976446 kernel: ACPI: Early table checksum verification disabled Jul 15 11:32:47.976454 kernel: ACPI: RSDP 0x000000009CB7E014 000024 (v02 BOCHS ) Jul 15 11:32:47.976461 kernel: ACPI: XSDT 0x000000009CB7D0E8 000054 (v01 BOCHS BXPC 00000001 01000013) Jul 15 11:32:47.976468 kernel: ACPI: FACP 0x000000009CB79000 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Jul 15 11:32:47.976474 kernel: ACPI: DSDT 0x000000009CB7A000 0021BA (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 15 11:32:47.976483 kernel: ACPI: FACS 0x000000009CBDD000 000040 Jul 15 11:32:47.976490 kernel: ACPI: APIC 0x000000009CB78000 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 15 11:32:47.976496 kernel: ACPI: HPET 0x000000009CB77000 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 15 11:32:47.976506 kernel: ACPI: MCFG 0x000000009CB76000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 15 11:32:47.976512 kernel: ACPI: WAET 0x000000009CB75000 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 15 11:32:47.976520 kernel: ACPI: BGRT 0x000000009CB74000 000038 (v01 INTEL EDK2 00000002 01000013) Jul 15 11:32:47.976527 kernel: ACPI: Reserving FACP table memory at [mem 0x9cb79000-0x9cb790f3] Jul 15 11:32:47.976533 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cb7a000-0x9cb7c1b9] Jul 15 11:32:47.976540 kernel: ACPI: Reserving FACS table memory at [mem 0x9cbdd000-0x9cbdd03f] Jul 15 11:32:47.976546 kernel: ACPI: Reserving APIC table memory at [mem 0x9cb78000-0x9cb7808f] Jul 15 11:32:47.976553 kernel: ACPI: Reserving HPET table memory at [mem 0x9cb77000-0x9cb77037] Jul 15 11:32:47.976559 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cb76000-0x9cb7603b] Jul 15 11:32:47.976566 kernel: ACPI: Reserving WAET table memory at [mem 0x9cb75000-0x9cb75027] Jul 15 11:32:47.976572 kernel: ACPI: Reserving BGRT table memory at [mem 0x9cb74000-0x9cb74037] Jul 15 11:32:47.976580 kernel: No NUMA configuration found Jul 15 11:32:47.976587 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cf3ffff] Jul 15 11:32:47.976594 kernel: NODE_DATA(0) allocated [mem 0x9cea6000-0x9ceabfff] Jul 15 11:32:47.976600 kernel: Zone ranges: Jul 15 11:32:47.976607 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Jul 15 11:32:47.976614 kernel: DMA32 [mem 0x0000000001000000-0x000000009cf3ffff] Jul 15 11:32:47.976620 kernel: Normal empty Jul 15 11:32:47.976627 kernel: Movable zone start for each node Jul 15 11:32:47.976633 kernel: Early memory node ranges Jul 15 11:32:47.976641 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Jul 15 11:32:47.976647 kernel: node 0: [mem 0x0000000000100000-0x00000000007fffff] Jul 15 11:32:47.976654 kernel: node 0: [mem 0x0000000000808000-0x000000000080afff] Jul 15 11:32:47.976660 kernel: node 0: [mem 0x000000000080c000-0x000000000080ffff] Jul 15 11:32:47.976667 kernel: node 0: [mem 0x0000000000900000-0x000000009c8eefff] Jul 15 11:32:47.976673 kernel: node 0: [mem 0x000000009cbff000-0x000000009cf3ffff] Jul 15 11:32:47.976680 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cf3ffff] Jul 15 11:32:47.976686 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Jul 15 11:32:47.976693 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Jul 15 11:32:47.976700 kernel: On node 0, zone DMA: 8 pages in unavailable ranges Jul 15 11:32:47.976707 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Jul 15 11:32:47.976714 kernel: On node 0, zone DMA: 240 pages in unavailable ranges Jul 15 11:32:47.976721 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges Jul 15 11:32:47.976727 kernel: On node 0, zone DMA32: 12480 pages in unavailable ranges Jul 15 11:32:47.976734 kernel: ACPI: PM-Timer IO Port: 0x608 Jul 15 11:32:47.976740 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Jul 15 11:32:47.976747 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Jul 15 11:32:47.976754 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Jul 15 11:32:47.976760 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Jul 15 11:32:47.976768 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Jul 15 11:32:47.976775 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Jul 15 11:32:47.976781 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Jul 15 11:32:47.976791 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Jul 15 11:32:47.976799 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Jul 15 11:32:47.976806 kernel: TSC deadline timer available Jul 15 11:32:47.976813 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Jul 15 11:32:47.976819 kernel: kvm-guest: KVM setup pv remote TLB flush Jul 15 11:32:47.976826 kernel: kvm-guest: setup PV sched yield Jul 15 11:32:47.976834 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices Jul 15 11:32:47.976841 kernel: Booting paravirtualized kernel on KVM Jul 15 11:32:47.976852 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Jul 15 11:32:47.976860 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Jul 15 11:32:47.976867 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 Jul 15 11:32:47.976874 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 Jul 15 11:32:47.976881 kernel: pcpu-alloc: [0] 0 1 2 3 Jul 15 11:32:47.976888 kernel: kvm-guest: setup async PF for cpu 0 Jul 15 11:32:47.976894 kernel: kvm-guest: stealtime: cpu 0, msr 9b21c0c0 Jul 15 11:32:47.976901 kernel: kvm-guest: PV spinlocks enabled Jul 15 11:32:47.976908 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Jul 15 11:32:47.976915 kernel: Built 1 zonelists, mobility grouping on. Total pages: 629759 Jul 15 11:32:47.976923 kernel: Policy zone: DMA32 Jul 15 11:32:47.976931 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=3fdbb2e3469f90ee764ea38c6fc4332d45967696e3c4fd4a8c65f8d0125b235b Jul 15 11:32:47.976939 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Jul 15 11:32:47.976946 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Jul 15 11:32:47.976954 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jul 15 11:32:47.976961 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jul 15 11:32:47.976968 kernel: Memory: 2397432K/2567000K available (12295K kernel code, 2276K rwdata, 13732K rodata, 47476K init, 4104K bss, 169308K reserved, 0K cma-reserved) Jul 15 11:32:47.976975 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Jul 15 11:32:47.976982 kernel: ftrace: allocating 34607 entries in 136 pages Jul 15 11:32:47.976989 kernel: ftrace: allocated 136 pages with 2 groups Jul 15 11:32:47.976996 kernel: rcu: Hierarchical RCU implementation. Jul 15 11:32:47.977003 kernel: rcu: RCU event tracing is enabled. Jul 15 11:32:47.977012 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Jul 15 11:32:47.977019 kernel: Rude variant of Tasks RCU enabled. Jul 15 11:32:47.977026 kernel: Tracing variant of Tasks RCU enabled. Jul 15 11:32:47.977033 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jul 15 11:32:47.977040 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Jul 15 11:32:47.977047 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Jul 15 11:32:47.977054 kernel: Console: colour dummy device 80x25 Jul 15 11:32:47.977061 kernel: printk: console [ttyS0] enabled Jul 15 11:32:47.977068 kernel: ACPI: Core revision 20210730 Jul 15 11:32:47.977075 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Jul 15 11:32:47.977083 kernel: APIC: Switch to symmetric I/O mode setup Jul 15 11:32:47.977090 kernel: x2apic enabled Jul 15 11:32:47.977097 kernel: Switched APIC routing to physical x2apic. Jul 15 11:32:47.977104 kernel: kvm-guest: setup PV IPIs Jul 15 11:32:47.977128 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Jul 15 11:32:47.977135 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Jul 15 11:32:47.977142 kernel: Calibrating delay loop (skipped) preset value.. 5589.50 BogoMIPS (lpj=2794750) Jul 15 11:32:47.977150 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Jul 15 11:32:47.977159 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Jul 15 11:32:47.977168 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Jul 15 11:32:47.977175 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Jul 15 11:32:47.977182 kernel: Spectre V2 : Mitigation: Retpolines Jul 15 11:32:47.977189 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Jul 15 11:32:47.977196 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Jul 15 11:32:47.977203 kernel: RETBleed: Mitigation: untrained return thunk Jul 15 11:32:47.977210 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Jul 15 11:32:47.977219 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Jul 15 11:32:47.977228 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Jul 15 11:32:47.977235 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Jul 15 11:32:47.977242 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Jul 15 11:32:47.977249 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Jul 15 11:32:47.977256 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Jul 15 11:32:47.977263 kernel: Freeing SMP alternatives memory: 32K Jul 15 11:32:47.977270 kernel: pid_max: default: 32768 minimum: 301 Jul 15 11:32:47.977277 kernel: LSM: Security Framework initializing Jul 15 11:32:47.977284 kernel: SELinux: Initializing. Jul 15 11:32:47.977292 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jul 15 11:32:47.977299 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jul 15 11:32:47.977306 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) Jul 15 11:32:47.977313 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Jul 15 11:32:47.977320 kernel: ... version: 0 Jul 15 11:32:47.977327 kernel: ... bit width: 48 Jul 15 11:32:47.977334 kernel: ... generic registers: 6 Jul 15 11:32:47.977341 kernel: ... value mask: 0000ffffffffffff Jul 15 11:32:47.977348 kernel: ... max period: 00007fffffffffff Jul 15 11:32:47.977356 kernel: ... fixed-purpose events: 0 Jul 15 11:32:47.977363 kernel: ... event mask: 000000000000003f Jul 15 11:32:47.977370 kernel: signal: max sigframe size: 1776 Jul 15 11:32:47.977377 kernel: rcu: Hierarchical SRCU implementation. Jul 15 11:32:47.977384 kernel: smp: Bringing up secondary CPUs ... Jul 15 11:32:47.977390 kernel: x86: Booting SMP configuration: Jul 15 11:32:47.977397 kernel: .... node #0, CPUs: #1 Jul 15 11:32:47.977404 kernel: kvm-clock: cpu 1, msr 3319b041, secondary cpu clock Jul 15 11:32:47.977411 kernel: kvm-guest: setup async PF for cpu 1 Jul 15 11:32:47.977418 kernel: kvm-guest: stealtime: cpu 1, msr 9b29c0c0 Jul 15 11:32:47.977426 kernel: #2 Jul 15 11:32:47.977433 kernel: kvm-clock: cpu 2, msr 3319b081, secondary cpu clock Jul 15 11:32:47.977440 kernel: kvm-guest: setup async PF for cpu 2 Jul 15 11:32:47.977447 kernel: kvm-guest: stealtime: cpu 2, msr 9b31c0c0 Jul 15 11:32:47.977454 kernel: #3 Jul 15 11:32:47.977461 kernel: kvm-clock: cpu 3, msr 3319b0c1, secondary cpu clock Jul 15 11:32:47.977468 kernel: kvm-guest: setup async PF for cpu 3 Jul 15 11:32:47.977475 kernel: kvm-guest: stealtime: cpu 3, msr 9b39c0c0 Jul 15 11:32:47.977481 kernel: smp: Brought up 1 node, 4 CPUs Jul 15 11:32:47.977492 kernel: smpboot: Max logical packages: 1 Jul 15 11:32:47.977499 kernel: smpboot: Total of 4 processors activated (22358.00 BogoMIPS) Jul 15 11:32:47.977506 kernel: devtmpfs: initialized Jul 15 11:32:47.977513 kernel: x86/mm: Memory block size: 128MB Jul 15 11:32:47.977520 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00800000-0x00807fff] (32768 bytes) Jul 15 11:32:47.977527 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x0080b000-0x0080bfff] (4096 bytes) Jul 15 11:32:47.977534 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00810000-0x008fffff] (983040 bytes) Jul 15 11:32:47.977541 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cb7f000-0x9cbfefff] (524288 bytes) Jul 15 11:32:47.977548 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cf60000-0x9cffffff] (655360 bytes) Jul 15 11:32:47.977557 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jul 15 11:32:47.977564 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Jul 15 11:32:47.977571 kernel: pinctrl core: initialized pinctrl subsystem Jul 15 11:32:47.977578 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jul 15 11:32:47.977585 kernel: audit: initializing netlink subsys (disabled) Jul 15 11:32:47.977592 kernel: audit: type=2000 audit(1752579167.146:1): state=initialized audit_enabled=0 res=1 Jul 15 11:32:47.977599 kernel: thermal_sys: Registered thermal governor 'step_wise' Jul 15 11:32:47.977606 kernel: thermal_sys: Registered thermal governor 'user_space' Jul 15 11:32:47.977613 kernel: cpuidle: using governor menu Jul 15 11:32:47.977622 kernel: ACPI: bus type PCI registered Jul 15 11:32:47.977628 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jul 15 11:32:47.977635 kernel: dca service started, version 1.12.1 Jul 15 11:32:47.977642 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Jul 15 11:32:47.977649 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Jul 15 11:32:47.977656 kernel: PCI: Using configuration type 1 for base access Jul 15 11:32:47.977663 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Jul 15 11:32:47.977673 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Jul 15 11:32:47.977680 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Jul 15 11:32:47.977688 kernel: ACPI: Added _OSI(Module Device) Jul 15 11:32:47.977695 kernel: ACPI: Added _OSI(Processor Device) Jul 15 11:32:47.977702 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jul 15 11:32:47.977709 kernel: ACPI: Added _OSI(Linux-Dell-Video) Jul 15 11:32:47.977716 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Jul 15 11:32:47.977723 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Jul 15 11:32:47.977730 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Jul 15 11:32:47.977737 kernel: ACPI: Interpreter enabled Jul 15 11:32:47.977744 kernel: ACPI: PM: (supports S0 S3 S5) Jul 15 11:32:47.977752 kernel: ACPI: Using IOAPIC for interrupt routing Jul 15 11:32:47.977759 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Jul 15 11:32:47.977766 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Jul 15 11:32:47.977773 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Jul 15 11:32:47.977918 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Jul 15 11:32:47.978000 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] Jul 15 11:32:47.978074 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] Jul 15 11:32:47.978086 kernel: PCI host bridge to bus 0000:00 Jul 15 11:32:47.978210 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Jul 15 11:32:47.978280 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Jul 15 11:32:47.978346 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Jul 15 11:32:47.978412 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] Jul 15 11:32:47.978478 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Jul 15 11:32:47.978544 kernel: pci_bus 0000:00: root bus resource [mem 0x800000000-0xfffffffff window] Jul 15 11:32:47.978613 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Jul 15 11:32:47.978718 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Jul 15 11:32:47.978810 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 Jul 15 11:32:47.978888 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xc0000000-0xc0ffffff pref] Jul 15 11:32:47.978967 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xc1044000-0xc1044fff] Jul 15 11:32:47.979075 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] Jul 15 11:32:47.979181 kernel: pci 0000:00:01.0: BAR 0: assigned to efifb Jul 15 11:32:47.979260 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Jul 15 11:32:47.979372 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 Jul 15 11:32:47.979455 kernel: pci 0000:00:02.0: reg 0x10: [io 0x6100-0x611f] Jul 15 11:32:47.979545 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xc1043000-0xc1043fff] Jul 15 11:32:47.979623 kernel: pci 0000:00:02.0: reg 0x20: [mem 0x800000000-0x800003fff 64bit pref] Jul 15 11:32:47.979721 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 Jul 15 11:32:47.979804 kernel: pci 0000:00:03.0: reg 0x10: [io 0x6000-0x607f] Jul 15 11:32:47.979880 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc1042000-0xc1042fff] Jul 15 11:32:47.979955 kernel: pci 0000:00:03.0: reg 0x20: [mem 0x800004000-0x800007fff 64bit pref] Jul 15 11:32:47.980048 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Jul 15 11:32:47.980145 kernel: pci 0000:00:04.0: reg 0x10: [io 0x60e0-0x60ff] Jul 15 11:32:47.980224 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc1041000-0xc1041fff] Jul 15 11:32:47.980300 kernel: pci 0000:00:04.0: reg 0x20: [mem 0x800008000-0x80000bfff 64bit pref] Jul 15 11:32:47.980379 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfffc0000-0xffffffff pref] Jul 15 11:32:47.980467 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Jul 15 11:32:47.980544 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Jul 15 11:32:47.980643 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Jul 15 11:32:47.980719 kernel: pci 0000:00:1f.2: reg 0x20: [io 0x60c0-0x60df] Jul 15 11:32:47.980793 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xc1040000-0xc1040fff] Jul 15 11:32:47.980895 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Jul 15 11:32:47.980975 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x6080-0x60bf] Jul 15 11:32:47.980985 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Jul 15 11:32:47.980992 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Jul 15 11:32:47.981000 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Jul 15 11:32:47.981006 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Jul 15 11:32:47.981014 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 Jul 15 11:32:47.981020 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 Jul 15 11:32:47.981027 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Jul 15 11:32:47.981036 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Jul 15 11:32:47.981043 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 Jul 15 11:32:47.981050 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 Jul 15 11:32:47.981057 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 Jul 15 11:32:47.981064 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 Jul 15 11:32:47.981071 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 Jul 15 11:32:47.981078 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 Jul 15 11:32:47.981085 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 Jul 15 11:32:47.981092 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 Jul 15 11:32:47.981100 kernel: iommu: Default domain type: Translated Jul 15 11:32:47.981107 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Jul 15 11:32:47.981208 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Jul 15 11:32:47.981282 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Jul 15 11:32:47.981356 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Jul 15 11:32:47.981366 kernel: vgaarb: loaded Jul 15 11:32:47.981373 kernel: pps_core: LinuxPPS API ver. 1 registered Jul 15 11:32:47.981380 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Jul 15 11:32:47.981387 kernel: PTP clock support registered Jul 15 11:32:47.981397 kernel: Registered efivars operations Jul 15 11:32:47.981404 kernel: PCI: Using ACPI for IRQ routing Jul 15 11:32:47.981411 kernel: PCI: pci_cache_line_size set to 64 bytes Jul 15 11:32:47.981418 kernel: e820: reserve RAM buffer [mem 0x0080b000-0x008fffff] Jul 15 11:32:47.981425 kernel: e820: reserve RAM buffer [mem 0x00810000-0x008fffff] Jul 15 11:32:47.981432 kernel: e820: reserve RAM buffer [mem 0x9b438018-0x9bffffff] Jul 15 11:32:47.981438 kernel: e820: reserve RAM buffer [mem 0x9b475018-0x9bffffff] Jul 15 11:32:47.981445 kernel: e820: reserve RAM buffer [mem 0x9c8ef000-0x9fffffff] Jul 15 11:32:47.981452 kernel: e820: reserve RAM buffer [mem 0x9cf40000-0x9fffffff] Jul 15 11:32:47.981460 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Jul 15 11:32:47.981467 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Jul 15 11:32:47.981474 kernel: clocksource: Switched to clocksource kvm-clock Jul 15 11:32:47.981481 kernel: VFS: Disk quotas dquot_6.6.0 Jul 15 11:32:47.981488 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jul 15 11:32:47.981495 kernel: pnp: PnP ACPI init Jul 15 11:32:47.981589 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved Jul 15 11:32:47.981600 kernel: pnp: PnP ACPI: found 6 devices Jul 15 11:32:47.981610 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Jul 15 11:32:47.981617 kernel: NET: Registered PF_INET protocol family Jul 15 11:32:47.981624 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Jul 15 11:32:47.981631 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Jul 15 11:32:47.981639 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jul 15 11:32:47.981646 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Jul 15 11:32:47.981653 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Jul 15 11:32:47.981660 kernel: TCP: Hash tables configured (established 32768 bind 32768) Jul 15 11:32:47.981668 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Jul 15 11:32:47.981675 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Jul 15 11:32:47.981682 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jul 15 11:32:47.981689 kernel: NET: Registered PF_XDP protocol family Jul 15 11:32:47.981774 kernel: pci 0000:00:04.0: can't claim BAR 6 [mem 0xfffc0000-0xffffffff pref]: no compatible bridge window Jul 15 11:32:47.981852 kernel: pci 0000:00:04.0: BAR 6: assigned [mem 0x9d000000-0x9d03ffff pref] Jul 15 11:32:47.981920 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Jul 15 11:32:47.981987 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Jul 15 11:32:47.982055 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Jul 15 11:32:47.982164 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] Jul 15 11:32:47.982233 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Jul 15 11:32:47.982297 kernel: pci_bus 0000:00: resource 9 [mem 0x800000000-0xfffffffff window] Jul 15 11:32:47.982306 kernel: PCI: CLS 0 bytes, default 64 Jul 15 11:32:47.982314 kernel: Initialise system trusted keyrings Jul 15 11:32:47.982321 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Jul 15 11:32:47.982328 kernel: Key type asymmetric registered Jul 15 11:32:47.982335 kernel: Asymmetric key parser 'x509' registered Jul 15 11:32:47.982344 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Jul 15 11:32:47.982352 kernel: io scheduler mq-deadline registered Jul 15 11:32:47.982359 kernel: io scheduler kyber registered Jul 15 11:32:47.982377 kernel: io scheduler bfq registered Jul 15 11:32:47.982385 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Jul 15 11:32:47.982393 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 Jul 15 11:32:47.982401 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 Jul 15 11:32:47.982408 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 Jul 15 11:32:47.982415 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jul 15 11:32:47.982424 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Jul 15 11:32:47.982431 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Jul 15 11:32:47.982439 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Jul 15 11:32:47.982446 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Jul 15 11:32:47.982550 kernel: rtc_cmos 00:04: RTC can wake from S4 Jul 15 11:32:47.982562 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Jul 15 11:32:47.982629 kernel: rtc_cmos 00:04: registered as rtc0 Jul 15 11:32:47.982696 kernel: rtc_cmos 00:04: setting system clock to 2025-07-15T11:32:47 UTC (1752579167) Jul 15 11:32:47.982772 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Jul 15 11:32:47.982781 kernel: efifb: probing for efifb Jul 15 11:32:47.982789 kernel: efifb: framebuffer at 0xc0000000, using 4000k, total 4000k Jul 15 11:32:47.982796 kernel: efifb: mode is 1280x800x32, linelength=5120, pages=1 Jul 15 11:32:47.982804 kernel: efifb: scrolling: redraw Jul 15 11:32:47.982811 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Jul 15 11:32:47.982818 kernel: Console: switching to colour frame buffer device 160x50 Jul 15 11:32:47.982825 kernel: fb0: EFI VGA frame buffer device Jul 15 11:32:47.982833 kernel: pstore: Registered efi as persistent store backend Jul 15 11:32:47.982842 kernel: NET: Registered PF_INET6 protocol family Jul 15 11:32:47.982849 kernel: Segment Routing with IPv6 Jul 15 11:32:47.982856 kernel: In-situ OAM (IOAM) with IPv6 Jul 15 11:32:47.982864 kernel: NET: Registered PF_PACKET protocol family Jul 15 11:32:47.982872 kernel: Key type dns_resolver registered Jul 15 11:32:47.982879 kernel: IPI shorthand broadcast: enabled Jul 15 11:32:47.982888 kernel: sched_clock: Marking stable (532001812, 124677183)->(723879185, -67200190) Jul 15 11:32:47.982895 kernel: registered taskstats version 1 Jul 15 11:32:47.982903 kernel: Loading compiled-in X.509 certificates Jul 15 11:32:47.982910 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.188-flatcar: c4b3a19d3bd6de5654dc12075428550cf6251289' Jul 15 11:32:47.982917 kernel: Key type .fscrypt registered Jul 15 11:32:47.982924 kernel: Key type fscrypt-provisioning registered Jul 15 11:32:47.982932 kernel: pstore: Using crash dump compression: deflate Jul 15 11:32:47.982939 kernel: ima: No TPM chip found, activating TPM-bypass! Jul 15 11:32:47.982948 kernel: ima: Allocated hash algorithm: sha1 Jul 15 11:32:47.982955 kernel: ima: No architecture policies found Jul 15 11:32:47.982962 kernel: clk: Disabling unused clocks Jul 15 11:32:47.982970 kernel: Freeing unused kernel image (initmem) memory: 47476K Jul 15 11:32:47.982977 kernel: Write protecting the kernel read-only data: 28672k Jul 15 11:32:47.982984 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Jul 15 11:32:47.982991 kernel: Freeing unused kernel image (rodata/data gap) memory: 604K Jul 15 11:32:47.982999 kernel: Run /init as init process Jul 15 11:32:47.983006 kernel: with arguments: Jul 15 11:32:47.983013 kernel: /init Jul 15 11:32:47.983022 kernel: with environment: Jul 15 11:32:47.983029 kernel: HOME=/ Jul 15 11:32:47.983036 kernel: TERM=linux Jul 15 11:32:47.983043 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Jul 15 11:32:47.983052 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 15 11:32:47.983062 systemd[1]: Detected virtualization kvm. Jul 15 11:32:47.983070 systemd[1]: Detected architecture x86-64. Jul 15 11:32:47.983079 systemd[1]: Running in initrd. Jul 15 11:32:47.983086 systemd[1]: No hostname configured, using default hostname. Jul 15 11:32:47.983094 systemd[1]: Hostname set to . Jul 15 11:32:47.983102 systemd[1]: Initializing machine ID from VM UUID. Jul 15 11:32:47.983127 systemd[1]: Queued start job for default target initrd.target. Jul 15 11:32:47.983137 systemd[1]: Started systemd-ask-password-console.path. Jul 15 11:32:47.983145 systemd[1]: Reached target cryptsetup.target. Jul 15 11:32:47.983153 systemd[1]: Reached target paths.target. Jul 15 11:32:47.983161 systemd[1]: Reached target slices.target. Jul 15 11:32:47.983169 systemd[1]: Reached target swap.target. Jul 15 11:32:47.983177 systemd[1]: Reached target timers.target. Jul 15 11:32:47.983185 systemd[1]: Listening on iscsid.socket. Jul 15 11:32:47.983193 systemd[1]: Listening on iscsiuio.socket. Jul 15 11:32:47.983201 systemd[1]: Listening on systemd-journald-audit.socket. Jul 15 11:32:47.983208 systemd[1]: Listening on systemd-journald-dev-log.socket. Jul 15 11:32:47.983216 systemd[1]: Listening on systemd-journald.socket. Jul 15 11:32:47.983225 systemd[1]: Listening on systemd-networkd.socket. Jul 15 11:32:47.983233 systemd[1]: Listening on systemd-udevd-control.socket. Jul 15 11:32:47.983241 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 15 11:32:47.983248 systemd[1]: Reached target sockets.target. Jul 15 11:32:47.983256 systemd[1]: Starting kmod-static-nodes.service... Jul 15 11:32:47.983264 systemd[1]: Finished network-cleanup.service. Jul 15 11:32:47.983271 systemd[1]: Starting systemd-fsck-usr.service... Jul 15 11:32:47.983279 systemd[1]: Starting systemd-journald.service... Jul 15 11:32:47.983287 systemd[1]: Starting systemd-modules-load.service... Jul 15 11:32:47.983296 systemd[1]: Starting systemd-resolved.service... Jul 15 11:32:47.983303 systemd[1]: Starting systemd-vconsole-setup.service... Jul 15 11:32:47.983311 systemd[1]: Finished kmod-static-nodes.service. Jul 15 11:32:47.983319 kernel: audit: type=1130 audit(1752579167.975:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:47.983327 systemd[1]: Finished systemd-fsck-usr.service. Jul 15 11:32:47.983335 kernel: audit: type=1130 audit(1752579167.980:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:47.983345 systemd-journald[198]: Journal started Jul 15 11:32:47.983384 systemd-journald[198]: Runtime Journal (/run/log/journal/50891bd790bd49af8ce9a71f5e0b84e4) is 6.0M, max 48.4M, 42.4M free. Jul 15 11:32:47.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:47.980000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:47.985923 systemd[1]: Started systemd-journald.service. Jul 15 11:32:47.985000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:47.986213 systemd[1]: Finished systemd-vconsole-setup.service. Jul 15 11:32:47.994571 kernel: audit: type=1130 audit(1752579167.985:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:47.994596 kernel: audit: type=1130 audit(1752579167.989:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:47.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:47.989313 systemd-modules-load[199]: Inserted module 'overlay' Jul 15 11:32:47.990319 systemd[1]: Starting dracut-cmdline-ask.service... Jul 15 11:32:47.995063 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 15 11:32:48.002632 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 15 11:32:48.002000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:48.006162 kernel: audit: type=1130 audit(1752579168.002:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:48.017070 systemd-resolved[200]: Positive Trust Anchors: Jul 15 11:32:48.017530 systemd-resolved[200]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 15 11:32:48.017690 systemd-resolved[200]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 15 11:32:48.020143 systemd-resolved[200]: Defaulting to hostname 'linux'. Jul 15 11:32:48.021157 systemd[1]: Started systemd-resolved.service. Jul 15 11:32:48.021652 systemd[1]: Reached target nss-lookup.target. Jul 15 11:32:48.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:48.026146 kernel: audit: type=1130 audit(1752579168.017:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:48.035027 systemd[1]: Finished dracut-cmdline-ask.service. Jul 15 11:32:48.036562 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Jul 15 11:32:48.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:48.037299 systemd[1]: Starting dracut-cmdline.service... Jul 15 11:32:48.041530 kernel: audit: type=1130 audit(1752579168.036:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:48.041546 kernel: Bridge firewalling registered Jul 15 11:32:48.041536 systemd-modules-load[199]: Inserted module 'br_netfilter' Jul 15 11:32:48.047981 dracut-cmdline[218]: dracut-dracut-053 Jul 15 11:32:48.050217 dracut-cmdline[218]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=3fdbb2e3469f90ee764ea38c6fc4332d45967696e3c4fd4a8c65f8d0125b235b Jul 15 11:32:48.058138 kernel: SCSI subsystem initialized Jul 15 11:32:48.069408 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jul 15 11:32:48.069497 kernel: device-mapper: uevent: version 1.0.3 Jul 15 11:32:48.069515 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Jul 15 11:32:48.073308 systemd-modules-load[199]: Inserted module 'dm_multipath' Jul 15 11:32:48.073885 systemd[1]: Finished systemd-modules-load.service. Jul 15 11:32:48.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:48.075377 systemd[1]: Starting systemd-sysctl.service... Jul 15 11:32:48.080067 kernel: audit: type=1130 audit(1752579168.074:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:48.085911 systemd[1]: Finished systemd-sysctl.service. Jul 15 11:32:48.090584 kernel: audit: type=1130 audit(1752579168.085:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:48.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:48.118159 kernel: Loading iSCSI transport class v2.0-870. Jul 15 11:32:48.134157 kernel: iscsi: registered transport (tcp) Jul 15 11:32:48.156526 kernel: iscsi: registered transport (qla4xxx) Jul 15 11:32:48.156574 kernel: QLogic iSCSI HBA Driver Jul 15 11:32:48.187763 systemd[1]: Finished dracut-cmdline.service. Jul 15 11:32:48.187000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:48.189032 systemd[1]: Starting dracut-pre-udev.service... Jul 15 11:32:48.236184 kernel: raid6: avx2x4 gen() 30101 MB/s Jul 15 11:32:48.253164 kernel: raid6: avx2x4 xor() 7503 MB/s Jul 15 11:32:48.270136 kernel: raid6: avx2x2 gen() 32270 MB/s Jul 15 11:32:48.287138 kernel: raid6: avx2x2 xor() 19111 MB/s Jul 15 11:32:48.304136 kernel: raid6: avx2x1 gen() 26280 MB/s Jul 15 11:32:48.321144 kernel: raid6: avx2x1 xor() 14751 MB/s Jul 15 11:32:48.373153 kernel: raid6: sse2x4 gen() 14400 MB/s Jul 15 11:32:48.390134 kernel: raid6: sse2x4 xor() 7348 MB/s Jul 15 11:32:48.407130 kernel: raid6: sse2x2 gen() 16333 MB/s Jul 15 11:32:48.424140 kernel: raid6: sse2x2 xor() 8920 MB/s Jul 15 11:32:48.441147 kernel: raid6: sse2x1 gen() 9993 MB/s Jul 15 11:32:48.458524 kernel: raid6: sse2x1 xor() 7322 MB/s Jul 15 11:32:48.458574 kernel: raid6: using algorithm avx2x2 gen() 32270 MB/s Jul 15 11:32:48.458586 kernel: raid6: .... xor() 19111 MB/s, rmw enabled Jul 15 11:32:48.459267 kernel: raid6: using avx2x2 recovery algorithm Jul 15 11:32:48.488167 kernel: xor: automatically using best checksumming function avx Jul 15 11:32:48.649159 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Jul 15 11:32:48.659742 systemd[1]: Finished dracut-pre-udev.service. Jul 15 11:32:48.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:48.704000 audit: BPF prog-id=7 op=LOAD Jul 15 11:32:48.704000 audit: BPF prog-id=8 op=LOAD Jul 15 11:32:48.705438 systemd[1]: Starting systemd-udevd.service... Jul 15 11:32:48.720297 systemd-udevd[401]: Using default interface naming scheme 'v252'. Jul 15 11:32:48.772211 systemd[1]: Started systemd-udevd.service. Jul 15 11:32:48.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:48.773686 systemd[1]: Starting dracut-pre-trigger.service... Jul 15 11:32:48.783816 dracut-pre-trigger[402]: rd.md=0: removing MD RAID activation Jul 15 11:32:48.810753 systemd[1]: Finished dracut-pre-trigger.service. Jul 15 11:32:48.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:48.812246 systemd[1]: Starting systemd-udev-trigger.service... Jul 15 11:32:48.849638 systemd[1]: Finished systemd-udev-trigger.service. Jul 15 11:32:48.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:48.881675 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Jul 15 11:32:48.887295 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Jul 15 11:32:48.887309 kernel: GPT:9289727 != 19775487 Jul 15 11:32:48.887328 kernel: GPT:Alternate GPT header not at the end of the disk. Jul 15 11:32:48.887337 kernel: GPT:9289727 != 19775487 Jul 15 11:32:48.887346 kernel: GPT: Use GNU Parted to correct GPT errors. Jul 15 11:32:48.887356 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 15 11:32:48.889130 kernel: cryptd: max_cpu_qlen set to 1000 Jul 15 11:32:48.912777 kernel: AVX2 version of gcm_enc/dec engaged. Jul 15 11:32:48.912819 kernel: libata version 3.00 loaded. Jul 15 11:32:48.914131 kernel: AES CTR mode by8 optimization enabled Jul 15 11:32:48.934977 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Jul 15 11:32:48.958843 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/vda6 scanned by (udev-worker) (450) Jul 15 11:32:48.959924 kernel: ahci 0000:00:1f.2: version 3.0 Jul 15 11:32:48.985038 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 Jul 15 11:32:48.985053 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Jul 15 11:32:48.985181 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Jul 15 11:32:48.985266 kernel: scsi host0: ahci Jul 15 11:32:48.985369 kernel: scsi host1: ahci Jul 15 11:32:48.985477 kernel: scsi host2: ahci Jul 15 11:32:48.985568 kernel: scsi host3: ahci Jul 15 11:32:48.985661 kernel: scsi host4: ahci Jul 15 11:32:48.985752 kernel: scsi host5: ahci Jul 15 11:32:48.985842 kernel: ata1: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040100 irq 34 Jul 15 11:32:48.985852 kernel: ata2: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040180 irq 34 Jul 15 11:32:48.985868 kernel: ata3: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040200 irq 34 Jul 15 11:32:48.985877 kernel: ata4: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040280 irq 34 Jul 15 11:32:48.985886 kernel: ata5: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040300 irq 34 Jul 15 11:32:48.985895 kernel: ata6: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040380 irq 34 Jul 15 11:32:48.963312 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Jul 15 11:32:48.964607 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Jul 15 11:32:48.970166 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Jul 15 11:32:48.979258 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 15 11:32:48.988711 systemd[1]: Starting disk-uuid.service... Jul 15 11:32:49.010998 disk-uuid[538]: Primary Header is updated. Jul 15 11:32:49.010998 disk-uuid[538]: Secondary Entries is updated. Jul 15 11:32:49.010998 disk-uuid[538]: Secondary Header is updated. Jul 15 11:32:49.015140 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 15 11:32:49.019144 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 15 11:32:49.300016 kernel: ata5: SATA link down (SStatus 0 SControl 300) Jul 15 11:32:49.300133 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) Jul 15 11:32:49.300148 kernel: ata2: SATA link down (SStatus 0 SControl 300) Jul 15 11:32:49.300161 kernel: ata6: SATA link down (SStatus 0 SControl 300) Jul 15 11:32:49.300173 kernel: ata4: SATA link down (SStatus 0 SControl 300) Jul 15 11:32:49.301150 kernel: ata1: SATA link down (SStatus 0 SControl 300) Jul 15 11:32:49.302146 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Jul 15 11:32:49.303348 kernel: ata3.00: applying bridge limits Jul 15 11:32:49.303401 kernel: ata3.00: configured for UDMA/100 Jul 15 11:32:49.306142 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Jul 15 11:32:49.334160 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Jul 15 11:32:49.351790 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Jul 15 11:32:49.351807 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Jul 15 11:32:50.089168 disk-uuid[539]: The operation has completed successfully. Jul 15 11:32:50.090794 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 15 11:32:50.110890 systemd[1]: disk-uuid.service: Deactivated successfully. Jul 15 11:32:50.111000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:50.111000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:50.110981 systemd[1]: Finished disk-uuid.service. Jul 15 11:32:50.118319 systemd[1]: Starting verity-setup.service... Jul 15 11:32:50.133147 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" Jul 15 11:32:50.156323 systemd[1]: Found device dev-mapper-usr.device. Jul 15 11:32:50.159348 systemd[1]: Mounting sysusr-usr.mount... Jul 15 11:32:50.161331 systemd[1]: Finished verity-setup.service. Jul 15 11:32:50.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:50.226154 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 15 11:32:50.226507 systemd[1]: Mounted sysusr-usr.mount. Jul 15 11:32:50.226868 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Jul 15 11:32:50.227638 systemd[1]: Starting ignition-setup.service... Jul 15 11:32:50.230155 systemd[1]: Starting parse-ip-for-networkd.service... Jul 15 11:32:50.239830 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Jul 15 11:32:50.239999 kernel: BTRFS info (device vda6): using free space tree Jul 15 11:32:50.240148 kernel: BTRFS info (device vda6): has skinny extents Jul 15 11:32:50.249904 systemd[1]: mnt-oem.mount: Deactivated successfully. Jul 15 11:32:50.314227 systemd[1]: Finished parse-ip-for-networkd.service. Jul 15 11:32:50.336000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:50.337000 audit: BPF prog-id=9 op=LOAD Jul 15 11:32:50.338246 systemd[1]: Starting systemd-networkd.service... Jul 15 11:32:50.365066 systemd-networkd[713]: lo: Link UP Jul 15 11:32:50.365077 systemd-networkd[713]: lo: Gained carrier Jul 15 11:32:50.365589 systemd-networkd[713]: Enumeration completed Jul 15 11:32:50.365817 systemd-networkd[713]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 15 11:32:50.369000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:50.366282 systemd[1]: Started systemd-networkd.service. Jul 15 11:32:50.367488 systemd-networkd[713]: eth0: Link UP Jul 15 11:32:50.367492 systemd-networkd[713]: eth0: Gained carrier Jul 15 11:32:50.369301 systemd[1]: Reached target network.target. Jul 15 11:32:50.375137 systemd[1]: Starting iscsiuio.service... Jul 15 11:32:50.423732 systemd[1]: Started iscsiuio.service. Jul 15 11:32:50.425000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:50.425348 systemd-networkd[713]: eth0: DHCPv4 address 10.0.0.93/16, gateway 10.0.0.1 acquired from 10.0.0.1 Jul 15 11:32:50.427484 systemd[1]: Starting iscsid.service... Jul 15 11:32:50.432325 iscsid[718]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Jul 15 11:32:50.432325 iscsid[718]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Jul 15 11:32:50.432325 iscsid[718]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Jul 15 11:32:50.432325 iscsid[718]: If using hardware iscsi like qla4xxx this message can be ignored. Jul 15 11:32:50.432325 iscsid[718]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Jul 15 11:32:50.441921 iscsid[718]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Jul 15 11:32:50.443168 systemd[1]: Started iscsid.service. Jul 15 11:32:50.444000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:50.445507 systemd[1]: Starting dracut-initqueue.service... Jul 15 11:32:50.455304 systemd[1]: Finished dracut-initqueue.service. Jul 15 11:32:50.456000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:50.456968 systemd[1]: Reached target remote-fs-pre.target. Jul 15 11:32:50.458601 systemd[1]: Reached target remote-cryptsetup.target. Jul 15 11:32:50.460274 systemd[1]: Reached target remote-fs.target. Jul 15 11:32:50.462637 systemd[1]: Starting dracut-pre-mount.service... Jul 15 11:32:50.481368 systemd[1]: Finished dracut-pre-mount.service. Jul 15 11:32:50.482000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:50.563358 systemd[1]: Finished ignition-setup.service. Jul 15 11:32:50.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:50.565833 systemd[1]: Starting ignition-fetch-offline.service... Jul 15 11:32:50.640876 ignition[733]: Ignition 2.14.0 Jul 15 11:32:50.640890 ignition[733]: Stage: fetch-offline Jul 15 11:32:50.640985 ignition[733]: no configs at "/usr/lib/ignition/base.d" Jul 15 11:32:50.641000 ignition[733]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 15 11:32:50.641312 ignition[733]: parsed url from cmdline: "" Jul 15 11:32:50.641317 ignition[733]: no config URL provided Jul 15 11:32:50.641323 ignition[733]: reading system config file "/usr/lib/ignition/user.ign" Jul 15 11:32:50.641333 ignition[733]: no config at "/usr/lib/ignition/user.ign" Jul 15 11:32:50.641380 ignition[733]: op(1): [started] loading QEMU firmware config module Jul 15 11:32:50.641385 ignition[733]: op(1): executing: "modprobe" "qemu_fw_cfg" Jul 15 11:32:50.650642 ignition[733]: op(1): [finished] loading QEMU firmware config module Jul 15 11:32:50.652158 ignition[733]: parsing config with SHA512: f1fe173ef60fc0eee1472c15f85d5010a0455074072a69bfe8263cc144d5fd837eea32369dc4c54e36322d65081122344e6345d58f14bfe7ca0f517048633dff Jul 15 11:32:50.658956 unknown[733]: fetched base config from "system" Jul 15 11:32:50.658967 unknown[733]: fetched user config from "qemu" Jul 15 11:32:50.659419 ignition[733]: fetch-offline: fetch-offline passed Jul 15 11:32:50.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:50.660701 systemd[1]: Finished ignition-fetch-offline.service. Jul 15 11:32:50.659521 ignition[733]: Ignition finished successfully Jul 15 11:32:50.661983 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Jul 15 11:32:50.662983 systemd[1]: Starting ignition-kargs.service... Jul 15 11:32:50.683548 ignition[741]: Ignition 2.14.0 Jul 15 11:32:50.683560 ignition[741]: Stage: kargs Jul 15 11:32:50.683659 ignition[741]: no configs at "/usr/lib/ignition/base.d" Jul 15 11:32:50.683668 ignition[741]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 15 11:32:50.686404 systemd[1]: Finished ignition-kargs.service. Jul 15 11:32:50.688000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:50.684451 ignition[741]: kargs: kargs passed Jul 15 11:32:50.684506 ignition[741]: Ignition finished successfully Jul 15 11:32:50.689587 systemd[1]: Starting ignition-disks.service... Jul 15 11:32:50.696792 ignition[747]: Ignition 2.14.0 Jul 15 11:32:50.696803 ignition[747]: Stage: disks Jul 15 11:32:50.696900 ignition[747]: no configs at "/usr/lib/ignition/base.d" Jul 15 11:32:50.696910 ignition[747]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 15 11:32:50.699000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:50.698628 systemd[1]: Finished ignition-disks.service. Jul 15 11:32:50.697730 ignition[747]: disks: disks passed Jul 15 11:32:50.700012 systemd[1]: Reached target initrd-root-device.target. Jul 15 11:32:50.697777 ignition[747]: Ignition finished successfully Jul 15 11:32:50.701727 systemd[1]: Reached target local-fs-pre.target. Jul 15 11:32:50.702590 systemd[1]: Reached target local-fs.target. Jul 15 11:32:50.704096 systemd[1]: Reached target sysinit.target. Jul 15 11:32:50.705463 systemd[1]: Reached target basic.target. Jul 15 11:32:50.707142 systemd[1]: Starting systemd-fsck-root.service... Jul 15 11:32:50.724182 systemd-fsck[755]: ROOT: clean, 619/553520 files, 56023/553472 blocks Jul 15 11:32:50.731466 systemd[1]: Finished systemd-fsck-root.service. Jul 15 11:32:50.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:50.732681 systemd[1]: Mounting sysroot.mount... Jul 15 11:32:50.740147 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Jul 15 11:32:50.740384 systemd[1]: Mounted sysroot.mount. Jul 15 11:32:50.741016 systemd[1]: Reached target initrd-root-fs.target. Jul 15 11:32:50.742703 systemd[1]: Mounting sysroot-usr.mount... Jul 15 11:32:50.743908 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Jul 15 11:32:50.743941 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Jul 15 11:32:50.743963 systemd[1]: Reached target ignition-diskful.target. Jul 15 11:32:50.746154 systemd[1]: Mounted sysroot-usr.mount. Jul 15 11:32:50.747762 systemd[1]: Starting initrd-setup-root.service... Jul 15 11:32:50.755218 initrd-setup-root[765]: cut: /sysroot/etc/passwd: No such file or directory Jul 15 11:32:50.760016 initrd-setup-root[773]: cut: /sysroot/etc/group: No such file or directory Jul 15 11:32:50.764614 initrd-setup-root[781]: cut: /sysroot/etc/shadow: No such file or directory Jul 15 11:32:50.768589 initrd-setup-root[789]: cut: /sysroot/etc/gshadow: No such file or directory Jul 15 11:32:50.794259 systemd[1]: Finished initrd-setup-root.service. Jul 15 11:32:50.819000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:50.820218 systemd[1]: Starting ignition-mount.service... Jul 15 11:32:50.821524 systemd[1]: Starting sysroot-boot.service... Jul 15 11:32:50.826755 bash[806]: umount: /sysroot/usr/share/oem: not mounted. Jul 15 11:32:50.836604 ignition[807]: INFO : Ignition 2.14.0 Jul 15 11:32:50.836604 ignition[807]: INFO : Stage: mount Jul 15 11:32:50.838347 ignition[807]: INFO : no configs at "/usr/lib/ignition/base.d" Jul 15 11:32:50.838347 ignition[807]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 15 11:32:50.838347 ignition[807]: INFO : mount: mount passed Jul 15 11:32:50.838347 ignition[807]: INFO : Ignition finished successfully Jul 15 11:32:50.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:50.838205 systemd[1]: Finished ignition-mount.service. Jul 15 11:32:50.843927 systemd[1]: Finished sysroot-boot.service. Jul 15 11:32:50.845000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:51.169286 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 15 11:32:51.178142 kernel: BTRFS: device label OEM devid 1 transid 10 /dev/vda6 scanned by mount (816) Jul 15 11:32:51.178181 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Jul 15 11:32:51.179920 kernel: BTRFS info (device vda6): using free space tree Jul 15 11:32:51.179948 kernel: BTRFS info (device vda6): has skinny extents Jul 15 11:32:51.184365 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 15 11:32:51.186150 systemd[1]: Starting ignition-files.service... Jul 15 11:32:51.206524 ignition[836]: INFO : Ignition 2.14.0 Jul 15 11:32:51.206524 ignition[836]: INFO : Stage: files Jul 15 11:32:51.208334 ignition[836]: INFO : no configs at "/usr/lib/ignition/base.d" Jul 15 11:32:51.208334 ignition[836]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 15 11:32:51.212129 ignition[836]: DEBUG : files: compiled without relabeling support, skipping Jul 15 11:32:51.214357 ignition[836]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Jul 15 11:32:51.214357 ignition[836]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Jul 15 11:32:51.219006 ignition[836]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Jul 15 11:32:51.220503 ignition[836]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Jul 15 11:32:51.222205 unknown[836]: wrote ssh authorized keys file for user: core Jul 15 11:32:51.223309 ignition[836]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Jul 15 11:32:51.224912 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Jul 15 11:32:51.226661 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Jul 15 11:32:51.228360 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Jul 15 11:32:51.230103 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Jul 15 11:32:51.231754 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" Jul 15 11:32:51.234137 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" Jul 15 11:32:51.236511 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" Jul 15 11:32:51.238564 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://extensions.flatcar.org/extensions/kubernetes-v1.31.8-x86-64.raw: attempt #1 Jul 15 11:32:51.688928 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Jul 15 11:32:52.058274 systemd-networkd[713]: eth0: Gained IPv6LL Jul 15 11:32:52.204261 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" Jul 15 11:32:52.204261 ignition[836]: INFO : files: op(7): [started] processing unit "coreos-metadata.service" Jul 15 11:32:52.208430 ignition[836]: INFO : files: op(7): op(8): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Jul 15 11:32:52.208430 ignition[836]: INFO : files: op(7): op(8): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Jul 15 11:32:52.208430 ignition[836]: INFO : files: op(7): [finished] processing unit "coreos-metadata.service" Jul 15 11:32:52.208430 ignition[836]: INFO : files: op(9): [started] setting preset to disabled for "coreos-metadata.service" Jul 15 11:32:52.208430 ignition[836]: INFO : files: op(9): op(a): [started] removing enablement symlink(s) for "coreos-metadata.service" Jul 15 11:32:52.237585 ignition[836]: INFO : files: op(9): op(a): [finished] removing enablement symlink(s) for "coreos-metadata.service" Jul 15 11:32:52.239406 ignition[836]: INFO : files: op(9): [finished] setting preset to disabled for "coreos-metadata.service" Jul 15 11:32:52.239406 ignition[836]: INFO : files: createResultFile: createFiles: op(b): [started] writing file "/sysroot/etc/.ignition-result.json" Jul 15 11:32:52.239406 ignition[836]: INFO : files: createResultFile: createFiles: op(b): [finished] writing file "/sysroot/etc/.ignition-result.json" Jul 15 11:32:52.239406 ignition[836]: INFO : files: files passed Jul 15 11:32:52.239406 ignition[836]: INFO : Ignition finished successfully Jul 15 11:32:52.246575 systemd[1]: Finished ignition-files.service. Jul 15 11:32:52.252084 kernel: kauditd_printk_skb: 25 callbacks suppressed Jul 15 11:32:52.252105 kernel: audit: type=1130 audit(1752579172.246:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:52.246000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:52.252158 systemd[1]: Starting initrd-setup-root-after-ignition.service... Jul 15 11:32:52.253916 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Jul 15 11:32:52.254685 systemd[1]: Starting ignition-quench.service... Jul 15 11:32:52.257844 systemd[1]: ignition-quench.service: Deactivated successfully. Jul 15 11:32:52.257921 systemd[1]: Finished ignition-quench.service. Jul 15 11:32:52.266730 kernel: audit: type=1130 audit(1752579172.259:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:52.266747 kernel: audit: type=1131 audit(1752579172.259:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:52.259000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:52.259000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:52.270127 initrd-setup-root-after-ignition[862]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Jul 15 11:32:52.272888 initrd-setup-root-after-ignition[864]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Jul 15 11:32:52.274889 systemd[1]: Finished initrd-setup-root-after-ignition.service. Jul 15 11:32:52.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:52.276859 systemd[1]: Reached target ignition-complete.target. Jul 15 11:32:52.281359 kernel: audit: type=1130 audit(1752579172.276:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:52.280887 systemd[1]: Starting initrd-parse-etc.service... Jul 15 11:32:52.295546 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jul 15 11:32:52.295653 systemd[1]: Finished initrd-parse-etc.service. Jul 15 11:32:52.305457 kernel: audit: type=1130 audit(1752579172.297:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:52.305473 kernel: audit: type=1131 audit(1752579172.297:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:52.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:52.297000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:52.297508 systemd[1]: Reached target initrd-fs.target. Jul 15 11:32:52.304420 systemd[1]: Reached target initrd.target. Jul 15 11:32:52.304769 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Jul 15 11:32:52.305872 systemd[1]: Starting dracut-pre-pivot.service... Jul 15 11:32:52.315514 systemd[1]: Finished dracut-pre-pivot.service. Jul 15 11:32:52.320160 kernel: audit: type=1130 audit(1752579172.315:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:52.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:52.316662 systemd[1]: Starting initrd-cleanup.service... Jul 15 11:32:52.326633 systemd[1]: Stopped target nss-lookup.target. Jul 15 11:32:52.360430 kernel: audit: type=1131 audit(1752579172.328:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:52.360461 kernel: audit: type=1131 audit(1752579172.333:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:52.360474 kernel: audit: type=1131 audit(1752579172.337:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:52.328000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:52.333000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:52.337000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:52.340000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:52.345000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:52.345000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:52.350000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:52.351000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:52.354000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:52.354000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:52.327234 systemd[1]: Stopped target remote-cryptsetup.target. Jul 15 11:32:52.327547 systemd[1]: Stopped target timers.target. Jul 15 11:32:52.327850 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jul 15 11:32:52.364588 ignition[877]: INFO : Ignition 2.14.0 Jul 15 11:32:52.364588 ignition[877]: INFO : Stage: umount Jul 15 11:32:52.364588 ignition[877]: INFO : no configs at "/usr/lib/ignition/base.d" Jul 15 11:32:52.364588 ignition[877]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 15 11:32:52.327978 systemd[1]: Stopped dracut-pre-pivot.service. Jul 15 11:32:52.369000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:52.371351 ignition[877]: INFO : umount: umount passed Jul 15 11:32:52.371351 ignition[877]: INFO : Ignition finished successfully Jul 15 11:32:52.372000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:52.373000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:52.375000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:52.328609 systemd[1]: Stopped target initrd.target. Jul 15 11:32:52.331804 systemd[1]: Stopped target basic.target. Jul 15 11:32:52.331937 systemd[1]: Stopped target ignition-complete.target. Jul 15 11:32:52.332119 systemd[1]: Stopped target ignition-diskful.target. Jul 15 11:32:52.332277 systemd[1]: Stopped target initrd-root-device.target. Jul 15 11:32:52.332439 systemd[1]: Stopped target remote-fs.target. Jul 15 11:32:52.332596 systemd[1]: Stopped target remote-fs-pre.target. Jul 15 11:32:52.383000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:52.332762 systemd[1]: Stopped target sysinit.target. Jul 15 11:32:52.332921 systemd[1]: Stopped target local-fs.target. Jul 15 11:32:52.333096 systemd[1]: Stopped target local-fs-pre.target. Jul 15 11:32:52.333420 systemd[1]: Stopped target swap.target. Jul 15 11:32:52.390000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:52.333558 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jul 15 11:32:52.333645 systemd[1]: Stopped dracut-pre-mount.service. Jul 15 11:32:52.392000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:52.394000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:52.333814 systemd[1]: Stopped target cryptsetup.target. Jul 15 11:32:52.337062 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jul 15 11:32:52.337161 systemd[1]: Stopped dracut-initqueue.service. Jul 15 11:32:52.337437 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Jul 15 11:32:52.399000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:52.337520 systemd[1]: Stopped ignition-fetch-offline.service. Jul 15 11:32:52.340925 systemd[1]: Stopped target paths.target. Jul 15 11:32:52.341024 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jul 15 11:32:52.404000 audit: BPF prog-id=6 op=UNLOAD Jul 15 11:32:52.405000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:52.344162 systemd[1]: Stopped systemd-ask-password-console.path. Jul 15 11:32:52.344303 systemd[1]: Stopped target slices.target. Jul 15 11:32:52.407000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:52.344444 systemd[1]: Stopped target sockets.target. Jul 15 11:32:52.344605 systemd[1]: iscsid.socket: Deactivated successfully. Jul 15 11:32:52.344692 systemd[1]: Closed iscsid.socket. Jul 15 11:32:52.344923 systemd[1]: iscsiuio.socket: Deactivated successfully. Jul 15 11:32:52.345010 systemd[1]: Closed iscsiuio.socket. Jul 15 11:32:52.413000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:52.414000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:52.345442 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Jul 15 11:32:52.415000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:52.345553 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Jul 15 11:32:52.419000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:52.421000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:52.345758 systemd[1]: ignition-files.service: Deactivated successfully. Jul 15 11:32:52.422000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:52.345853 systemd[1]: Stopped ignition-files.service. Jul 15 11:32:52.348339 systemd[1]: Stopping ignition-mount.service... Jul 15 11:32:52.425000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:52.425000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:52.426000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:52.349695 systemd[1]: Stopping sysroot-boot.service... Jul 15 11:32:52.429000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:52.349872 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jul 15 11:32:52.350054 systemd[1]: Stopped systemd-udev-trigger.service. Jul 15 11:32:52.350646 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jul 15 11:32:52.350813 systemd[1]: Stopped dracut-pre-trigger.service. Jul 15 11:32:52.354089 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jul 15 11:32:52.354213 systemd[1]: Finished initrd-cleanup.service. Jul 15 11:32:52.367033 systemd[1]: sysroot-boot.mount: Deactivated successfully. Jul 15 11:32:52.367477 systemd[1]: ignition-mount.service: Deactivated successfully. Jul 15 11:32:52.367553 systemd[1]: Stopped ignition-mount.service. Jul 15 11:32:52.369571 systemd[1]: Stopped target network.target. Jul 15 11:32:52.371299 systemd[1]: ignition-disks.service: Deactivated successfully. Jul 15 11:32:52.371346 systemd[1]: Stopped ignition-disks.service. Jul 15 11:32:52.372198 systemd[1]: ignition-kargs.service: Deactivated successfully. Jul 15 11:32:52.372240 systemd[1]: Stopped ignition-kargs.service. Jul 15 11:32:52.373647 systemd[1]: ignition-setup.service: Deactivated successfully. Jul 15 11:32:52.373682 systemd[1]: Stopped ignition-setup.service. Jul 15 11:32:52.375312 systemd[1]: Stopping systemd-networkd.service... Jul 15 11:32:52.376938 systemd[1]: Stopping systemd-resolved.service... Jul 15 11:32:52.380184 systemd-networkd[713]: eth0: DHCPv6 lease lost Jul 15 11:32:52.446000 audit: BPF prog-id=9 op=UNLOAD Jul 15 11:32:52.381742 systemd[1]: systemd-networkd.service: Deactivated successfully. Jul 15 11:32:52.381823 systemd[1]: Stopped systemd-networkd.service. Jul 15 11:32:52.384433 systemd[1]: systemd-networkd.socket: Deactivated successfully. Jul 15 11:32:52.384472 systemd[1]: Closed systemd-networkd.socket. Jul 15 11:32:52.387565 systemd[1]: Stopping network-cleanup.service... Jul 15 11:32:52.389222 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Jul 15 11:32:52.389286 systemd[1]: Stopped parse-ip-for-networkd.service. Jul 15 11:32:52.390880 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jul 15 11:32:52.390925 systemd[1]: Stopped systemd-sysctl.service. Jul 15 11:32:52.392948 systemd[1]: systemd-modules-load.service: Deactivated successfully. Jul 15 11:32:52.393003 systemd[1]: Stopped systemd-modules-load.service. Jul 15 11:32:52.394746 systemd[1]: Stopping systemd-udevd.service... Jul 15 11:32:52.398243 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jul 15 11:32:52.398668 systemd[1]: systemd-resolved.service: Deactivated successfully. Jul 15 11:32:52.398747 systemd[1]: Stopped systemd-resolved.service. Jul 15 11:32:52.403542 systemd[1]: systemd-udevd.service: Deactivated successfully. Jul 15 11:32:52.403685 systemd[1]: Stopped systemd-udevd.service. Jul 15 11:32:52.406445 systemd[1]: network-cleanup.service: Deactivated successfully. Jul 15 11:32:52.406519 systemd[1]: Stopped network-cleanup.service. Jul 15 11:32:52.407827 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jul 15 11:32:52.407858 systemd[1]: Closed systemd-udevd-control.socket. Jul 15 11:32:52.409317 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jul 15 11:32:52.409342 systemd[1]: Closed systemd-udevd-kernel.socket. Jul 15 11:32:52.410892 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jul 15 11:32:52.470105 systemd-journald[198]: Received SIGTERM from PID 1 (systemd). Jul 15 11:32:52.470147 iscsid[718]: iscsid shutting down. Jul 15 11:32:52.410924 systemd[1]: Stopped dracut-pre-udev.service. Jul 15 11:32:52.413368 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jul 15 11:32:52.413416 systemd[1]: Stopped dracut-cmdline.service. Jul 15 11:32:52.415156 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jul 15 11:32:52.415204 systemd[1]: Stopped dracut-cmdline-ask.service. Jul 15 11:32:52.417075 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Jul 15 11:32:52.418171 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Jul 15 11:32:52.418225 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Jul 15 11:32:52.420210 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jul 15 11:32:52.420263 systemd[1]: Stopped kmod-static-nodes.service. Jul 15 11:32:52.421216 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jul 15 11:32:52.421268 systemd[1]: Stopped systemd-vconsole-setup.service. Jul 15 11:32:52.423260 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Jul 15 11:32:52.423757 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jul 15 11:32:52.423846 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Jul 15 11:32:52.425838 systemd[1]: sysroot-boot.service: Deactivated successfully. Jul 15 11:32:52.425931 systemd[1]: Stopped sysroot-boot.service. Jul 15 11:32:52.427077 systemd[1]: Reached target initrd-switch-root.target. Jul 15 11:32:52.428074 systemd[1]: initrd-setup-root.service: Deactivated successfully. Jul 15 11:32:52.428136 systemd[1]: Stopped initrd-setup-root.service. Jul 15 11:32:52.430476 systemd[1]: Starting initrd-switch-root.service... Jul 15 11:32:52.448844 systemd[1]: Switching root. Jul 15 11:32:52.478550 systemd-journald[198]: Journal stopped Jul 15 11:32:56.203782 kernel: SELinux: Class mctp_socket not defined in policy. Jul 15 11:32:56.203837 kernel: SELinux: Class anon_inode not defined in policy. Jul 15 11:32:56.203856 kernel: SELinux: the above unknown classes and permissions will be allowed Jul 15 11:32:56.203872 kernel: SELinux: policy capability network_peer_controls=1 Jul 15 11:32:56.203895 kernel: SELinux: policy capability open_perms=1 Jul 15 11:32:56.203910 kernel: SELinux: policy capability extended_socket_class=1 Jul 15 11:32:56.203925 kernel: SELinux: policy capability always_check_network=0 Jul 15 11:32:56.203937 kernel: SELinux: policy capability cgroup_seclabel=1 Jul 15 11:32:56.203951 kernel: SELinux: policy capability nnp_nosuid_transition=1 Jul 15 11:32:56.203963 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Jul 15 11:32:56.203976 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Jul 15 11:32:56.203990 systemd[1]: Successfully loaded SELinux policy in 62.128ms. Jul 15 11:32:56.204012 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 7.095ms. Jul 15 11:32:56.204028 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 15 11:32:56.204043 systemd[1]: Detected virtualization kvm. Jul 15 11:32:56.204060 systemd[1]: Detected architecture x86-64. Jul 15 11:32:56.204074 systemd[1]: Detected first boot. Jul 15 11:32:56.204088 systemd[1]: Initializing machine ID from VM UUID. Jul 15 11:32:56.204102 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Jul 15 11:32:56.204132 systemd[1]: Populated /etc with preset unit settings. Jul 15 11:32:56.204148 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 15 11:32:56.204168 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 15 11:32:56.204192 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 15 11:32:56.204209 systemd[1]: iscsiuio.service: Deactivated successfully. Jul 15 11:32:56.204223 systemd[1]: Stopped iscsiuio.service. Jul 15 11:32:56.204236 systemd[1]: iscsid.service: Deactivated successfully. Jul 15 11:32:56.204252 systemd[1]: Stopped iscsid.service. Jul 15 11:32:56.204266 systemd[1]: initrd-switch-root.service: Deactivated successfully. Jul 15 11:32:56.204283 systemd[1]: Stopped initrd-switch-root.service. Jul 15 11:32:56.204297 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jul 15 11:32:56.204314 systemd[1]: Created slice system-addon\x2dconfig.slice. Jul 15 11:32:56.204328 systemd[1]: Created slice system-addon\x2drun.slice. Jul 15 11:32:56.204342 systemd[1]: Created slice system-getty.slice. Jul 15 11:32:56.204356 systemd[1]: Created slice system-modprobe.slice. Jul 15 11:32:56.204370 systemd[1]: Created slice system-serial\x2dgetty.slice. Jul 15 11:32:56.204384 systemd[1]: Created slice system-system\x2dcloudinit.slice. Jul 15 11:32:56.204399 systemd[1]: Created slice system-systemd\x2dfsck.slice. Jul 15 11:32:56.204413 systemd[1]: Created slice user.slice. Jul 15 11:32:56.204428 systemd[1]: Started systemd-ask-password-console.path. Jul 15 11:32:56.204451 systemd[1]: Started systemd-ask-password-wall.path. Jul 15 11:32:56.204466 systemd[1]: Set up automount boot.automount. Jul 15 11:32:56.204480 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Jul 15 11:32:56.204494 systemd[1]: Stopped target initrd-switch-root.target. Jul 15 11:32:56.204519 systemd[1]: Stopped target initrd-fs.target. Jul 15 11:32:56.204534 systemd[1]: Stopped target initrd-root-fs.target. Jul 15 11:32:56.204549 systemd[1]: Reached target integritysetup.target. Jul 15 11:32:56.204563 systemd[1]: Reached target remote-cryptsetup.target. Jul 15 11:32:56.204583 systemd[1]: Reached target remote-fs.target. Jul 15 11:32:56.204596 systemd[1]: Reached target slices.target. Jul 15 11:32:56.204610 systemd[1]: Reached target swap.target. Jul 15 11:32:56.204624 systemd[1]: Reached target torcx.target. Jul 15 11:32:56.204638 systemd[1]: Reached target veritysetup.target. Jul 15 11:32:56.204651 systemd[1]: Listening on systemd-coredump.socket. Jul 15 11:32:56.204671 systemd[1]: Listening on systemd-initctl.socket. Jul 15 11:32:56.204684 systemd[1]: Listening on systemd-networkd.socket. Jul 15 11:32:56.204697 systemd[1]: Listening on systemd-udevd-control.socket. Jul 15 11:32:56.204709 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 15 11:32:56.204722 systemd[1]: Listening on systemd-userdbd.socket. Jul 15 11:32:56.204735 systemd[1]: Mounting dev-hugepages.mount... Jul 15 11:32:56.204749 systemd[1]: Mounting dev-mqueue.mount... Jul 15 11:32:56.204762 systemd[1]: Mounting media.mount... Jul 15 11:32:56.204775 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 15 11:32:56.204794 systemd[1]: Mounting sys-kernel-debug.mount... Jul 15 11:32:56.204806 systemd[1]: Mounting sys-kernel-tracing.mount... Jul 15 11:32:56.204819 systemd[1]: Mounting tmp.mount... Jul 15 11:32:56.204832 systemd[1]: Starting flatcar-tmpfiles.service... Jul 15 11:32:56.204845 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 15 11:32:56.204858 systemd[1]: Starting kmod-static-nodes.service... Jul 15 11:32:56.204873 systemd[1]: Starting modprobe@configfs.service... Jul 15 11:32:56.204897 systemd[1]: Starting modprobe@dm_mod.service... Jul 15 11:32:56.204912 systemd[1]: Starting modprobe@drm.service... Jul 15 11:32:56.204930 systemd[1]: Starting modprobe@efi_pstore.service... Jul 15 11:32:56.204945 systemd[1]: Starting modprobe@fuse.service... Jul 15 11:32:56.204957 systemd[1]: Starting modprobe@loop.service... Jul 15 11:32:56.204971 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Jul 15 11:32:56.204985 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jul 15 11:32:56.204999 systemd[1]: Stopped systemd-fsck-root.service. Jul 15 11:32:56.205013 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Jul 15 11:32:56.205028 kernel: loop: module loaded Jul 15 11:32:56.205043 systemd[1]: Stopped systemd-fsck-usr.service. Jul 15 11:32:56.205059 systemd[1]: Stopped systemd-journald.service. Jul 15 11:32:56.205071 kernel: fuse: init (API version 7.34) Jul 15 11:32:56.205083 systemd[1]: Starting systemd-journald.service... Jul 15 11:32:56.205097 systemd[1]: Starting systemd-modules-load.service... Jul 15 11:32:56.205134 systemd[1]: Starting systemd-network-generator.service... Jul 15 11:32:56.205150 systemd[1]: Starting systemd-remount-fs.service... Jul 15 11:32:56.205164 systemd[1]: Starting systemd-udev-trigger.service... Jul 15 11:32:56.205178 systemd[1]: verity-setup.service: Deactivated successfully. Jul 15 11:32:56.205192 systemd[1]: Stopped verity-setup.service. Jul 15 11:32:56.205211 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 15 11:32:56.205226 systemd[1]: Mounted dev-hugepages.mount. Jul 15 11:32:56.205246 systemd-journald[999]: Journal started Jul 15 11:32:56.205304 systemd-journald[999]: Runtime Journal (/run/log/journal/50891bd790bd49af8ce9a71f5e0b84e4) is 6.0M, max 48.4M, 42.4M free. Jul 15 11:32:52.554000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Jul 15 11:32:53.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 15 11:32:53.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 15 11:32:53.146000 audit: BPF prog-id=10 op=LOAD Jul 15 11:32:53.146000 audit: BPF prog-id=10 op=UNLOAD Jul 15 11:32:53.146000 audit: BPF prog-id=11 op=LOAD Jul 15 11:32:53.146000 audit: BPF prog-id=11 op=UNLOAD Jul 15 11:32:53.181000 audit[910]: AVC avc: denied { associate } for pid=910 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Jul 15 11:32:53.181000 audit[910]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001178e4 a1=c00002ae40 a2=c000029080 a3=32 items=0 ppid=893 pid=910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:53.181000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 15 11:32:53.183000 audit[910]: AVC avc: denied { associate } for pid=910 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Jul 15 11:32:53.183000 audit[910]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001179b9 a2=1ed a3=0 items=2 ppid=893 pid=910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:53.183000 audit: CWD cwd="/" Jul 15 11:32:53.183000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:53.183000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:53.183000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 15 11:32:55.981000 audit: BPF prog-id=12 op=LOAD Jul 15 11:32:55.981000 audit: BPF prog-id=3 op=UNLOAD Jul 15 11:32:55.981000 audit: BPF prog-id=13 op=LOAD Jul 15 11:32:55.981000 audit: BPF prog-id=14 op=LOAD Jul 15 11:32:55.981000 audit: BPF prog-id=4 op=UNLOAD Jul 15 11:32:55.981000 audit: BPF prog-id=5 op=UNLOAD Jul 15 11:32:55.982000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:55.985000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:55.988000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:55.990000 audit: BPF prog-id=12 op=UNLOAD Jul 15 11:32:55.991000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:55.991000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:56.177000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:56.180000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:56.181000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:56.181000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:56.183000 audit: BPF prog-id=15 op=LOAD Jul 15 11:32:56.183000 audit: BPF prog-id=16 op=LOAD Jul 15 11:32:56.183000 audit: BPF prog-id=17 op=LOAD Jul 15 11:32:56.183000 audit: BPF prog-id=13 op=UNLOAD Jul 15 11:32:56.183000 audit: BPF prog-id=14 op=UNLOAD Jul 15 11:32:56.201000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:56.202000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jul 15 11:32:56.202000 audit[999]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffcab73ea40 a2=4000 a3=7ffcab73eadc items=0 ppid=1 pid=999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:56.202000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Jul 15 11:32:55.979350 systemd[1]: Queued start job for default target multi-user.target. Jul 15 11:32:53.179746 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-07-15T11:32:53Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" Jul 15 11:32:55.979365 systemd[1]: Unnecessary job was removed for dev-vda6.device. Jul 15 11:32:53.180002 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-07-15T11:32:53Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 15 11:32:55.982710 systemd[1]: systemd-journald.service: Deactivated successfully. Jul 15 11:32:53.180025 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-07-15T11:32:53Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 15 11:32:56.207142 systemd[1]: Started systemd-journald.service. Jul 15 11:32:53.180063 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-07-15T11:32:53Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Jul 15 11:32:53.180076 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-07-15T11:32:53Z" level=debug msg="skipped missing lower profile" missing profile=oem Jul 15 11:32:53.180130 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-07-15T11:32:53Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Jul 15 11:32:53.180147 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-07-15T11:32:53Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Jul 15 11:32:53.180404 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-07-15T11:32:53Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Jul 15 11:32:53.180448 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-07-15T11:32:53Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 15 11:32:53.180465 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-07-15T11:32:53Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 15 11:32:53.181180 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-07-15T11:32:53Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Jul 15 11:32:53.181220 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-07-15T11:32:53Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Jul 15 11:32:53.181242 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-07-15T11:32:53Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.100: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.100 Jul 15 11:32:53.181259 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-07-15T11:32:53Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Jul 15 11:32:56.208000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:53.181279 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-07-15T11:32:53Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.100: no such file or directory" path=/var/lib/torcx/store/3510.3.100 Jul 15 11:32:53.181296 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-07-15T11:32:53Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Jul 15 11:32:55.692538 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-07-15T11:32:55Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 15 11:32:56.208641 systemd[1]: Mounted dev-mqueue.mount. Jul 15 11:32:55.692795 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-07-15T11:32:55Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 15 11:32:55.692921 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-07-15T11:32:55Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 15 11:32:55.693093 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-07-15T11:32:55Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 15 11:32:55.693153 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-07-15T11:32:55Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Jul 15 11:32:55.693222 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-07-15T11:32:55Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Jul 15 11:32:56.209540 systemd[1]: Mounted media.mount. Jul 15 11:32:56.210261 systemd[1]: Mounted sys-kernel-debug.mount. Jul 15 11:32:56.211069 systemd[1]: Mounted sys-kernel-tracing.mount. Jul 15 11:32:56.211894 systemd[1]: Mounted tmp.mount. Jul 15 11:32:56.212697 systemd[1]: Finished flatcar-tmpfiles.service. Jul 15 11:32:56.213000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:56.213702 systemd[1]: Finished kmod-static-nodes.service. Jul 15 11:32:56.214000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:56.214701 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jul 15 11:32:56.214849 systemd[1]: Finished modprobe@configfs.service. Jul 15 11:32:56.215000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:56.215000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:56.215876 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 15 11:32:56.215996 systemd[1]: Finished modprobe@dm_mod.service. Jul 15 11:32:56.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:56.216000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:56.217002 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 15 11:32:56.217138 systemd[1]: Finished modprobe@drm.service. Jul 15 11:32:56.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:56.217000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:56.218108 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 15 11:32:56.218350 systemd[1]: Finished modprobe@efi_pstore.service. Jul 15 11:32:56.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:56.219000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:56.219377 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jul 15 11:32:56.219508 systemd[1]: Finished modprobe@fuse.service. Jul 15 11:32:56.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:56.220000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:56.220488 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 15 11:32:56.220584 systemd[1]: Finished modprobe@loop.service. Jul 15 11:32:56.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:56.221000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:56.221592 systemd[1]: Finished systemd-modules-load.service. Jul 15 11:32:56.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:56.222649 systemd[1]: Finished systemd-network-generator.service. Jul 15 11:32:56.223000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:56.223748 systemd[1]: Finished systemd-remount-fs.service. Jul 15 11:32:56.224000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:56.224927 systemd[1]: Reached target network-pre.target. Jul 15 11:32:56.226764 systemd[1]: Mounting sys-fs-fuse-connections.mount... Jul 15 11:32:56.228616 systemd[1]: Mounting sys-kernel-config.mount... Jul 15 11:32:56.229480 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Jul 15 11:32:56.231104 systemd[1]: Starting systemd-hwdb-update.service... Jul 15 11:32:56.233195 systemd[1]: Starting systemd-journal-flush.service... Jul 15 11:32:56.234208 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 15 11:32:56.235311 systemd[1]: Starting systemd-random-seed.service... Jul 15 11:32:56.238221 systemd-journald[999]: Time spent on flushing to /var/log/journal/50891bd790bd49af8ce9a71f5e0b84e4 is 19.805ms for 1138 entries. Jul 15 11:32:56.238221 systemd-journald[999]: System Journal (/var/log/journal/50891bd790bd49af8ce9a71f5e0b84e4) is 8.0M, max 195.6M, 187.6M free. Jul 15 11:32:56.462685 systemd-journald[999]: Received client request to flush runtime journal. Jul 15 11:32:56.278000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:56.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:56.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:56.369000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:56.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:56.236273 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 15 11:32:56.238818 systemd[1]: Starting systemd-sysctl.service... Jul 15 11:32:56.241513 systemd[1]: Starting systemd-sysusers.service... Jul 15 11:32:56.244609 systemd[1]: Mounted sys-fs-fuse-connections.mount. Jul 15 11:32:56.245495 systemd[1]: Mounted sys-kernel-config.mount. Jul 15 11:32:56.463926 udevadm[1013]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Jul 15 11:32:56.278168 systemd[1]: Finished systemd-udev-trigger.service. Jul 15 11:32:56.280279 systemd[1]: Starting systemd-udev-settle.service... Jul 15 11:32:56.345713 systemd[1]: Finished systemd-sysctl.service. Jul 15 11:32:56.351046 systemd[1]: Finished systemd-sysusers.service. Jul 15 11:32:56.353248 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 15 11:32:56.368623 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 15 11:32:56.437704 systemd[1]: Finished systemd-random-seed.service. Jul 15 11:32:56.438739 systemd[1]: Reached target first-boot-complete.target. Jul 15 11:32:56.463971 systemd[1]: Finished systemd-journal-flush.service. Jul 15 11:32:56.464000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:57.097984 systemd[1]: Finished systemd-hwdb-update.service. Jul 15 11:32:57.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:57.099000 audit: BPF prog-id=18 op=LOAD Jul 15 11:32:57.099000 audit: BPF prog-id=19 op=LOAD Jul 15 11:32:57.099000 audit: BPF prog-id=7 op=UNLOAD Jul 15 11:32:57.099000 audit: BPF prog-id=8 op=UNLOAD Jul 15 11:32:57.100366 systemd[1]: Starting systemd-udevd.service... Jul 15 11:32:57.116433 systemd-udevd[1018]: Using default interface naming scheme 'v252'. Jul 15 11:32:57.129222 systemd[1]: Started systemd-udevd.service. Jul 15 11:32:57.129000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:57.130000 audit: BPF prog-id=20 op=LOAD Jul 15 11:32:57.131459 systemd[1]: Starting systemd-networkd.service... Jul 15 11:32:57.136000 audit: BPF prog-id=21 op=LOAD Jul 15 11:32:57.136000 audit: BPF prog-id=22 op=LOAD Jul 15 11:32:57.136000 audit: BPF prog-id=23 op=LOAD Jul 15 11:32:57.137617 systemd[1]: Starting systemd-userdbd.service... Jul 15 11:32:57.165561 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Jul 15 11:32:57.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:57.168181 systemd[1]: Started systemd-userdbd.service. Jul 15 11:32:57.184034 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 15 11:32:57.226014 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Jul 15 11:32:57.231152 kernel: ACPI: button: Power Button [PWRF] Jul 15 11:32:57.226000 audit[1025]: AVC avc: denied { confidentiality } for pid=1025 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Jul 15 11:32:57.226000 audit[1025]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=558811214850 a1=338ac a2=7fd0e5d2abc5 a3=5 items=110 ppid=1018 pid=1025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:57.226000 audit: CWD cwd="/" Jul 15 11:32:57.226000 audit: PATH item=0 name=(null) inode=51 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=1 name=(null) inode=14238 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=2 name=(null) inode=14238 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=3 name=(null) inode=14239 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=4 name=(null) inode=14238 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=5 name=(null) inode=14240 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=6 name=(null) inode=14238 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=7 name=(null) inode=14241 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=8 name=(null) inode=14241 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=9 name=(null) inode=14242 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=10 name=(null) inode=14241 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=11 name=(null) inode=14243 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=12 name=(null) inode=14241 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=13 name=(null) inode=14244 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=14 name=(null) inode=14241 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=15 name=(null) inode=14245 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=16 name=(null) inode=14241 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=17 name=(null) inode=14246 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=18 name=(null) inode=14238 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=19 name=(null) inode=14247 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=20 name=(null) inode=14247 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=21 name=(null) inode=14248 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=22 name=(null) inode=14247 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=23 name=(null) inode=14249 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=24 name=(null) inode=14247 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=25 name=(null) inode=14250 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=26 name=(null) inode=14247 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=27 name=(null) inode=14251 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=28 name=(null) inode=14247 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=29 name=(null) inode=14252 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=30 name=(null) inode=14238 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=31 name=(null) inode=14253 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=32 name=(null) inode=14253 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=33 name=(null) inode=14254 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=34 name=(null) inode=14253 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=35 name=(null) inode=14255 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=36 name=(null) inode=14253 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=37 name=(null) inode=14256 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=38 name=(null) inode=14253 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=39 name=(null) inode=14257 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=40 name=(null) inode=14253 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=41 name=(null) inode=14258 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=42 name=(null) inode=14238 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=43 name=(null) inode=14259 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=44 name=(null) inode=14259 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=45 name=(null) inode=14260 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=46 name=(null) inode=14259 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=47 name=(null) inode=14261 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=48 name=(null) inode=14259 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=49 name=(null) inode=14262 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=50 name=(null) inode=14259 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=51 name=(null) inode=14263 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=52 name=(null) inode=14259 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=53 name=(null) inode=14264 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=54 name=(null) inode=51 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=55 name=(null) inode=14265 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=56 name=(null) inode=14265 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=57 name=(null) inode=14266 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=58 name=(null) inode=14265 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=59 name=(null) inode=14267 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=60 name=(null) inode=14265 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=61 name=(null) inode=14268 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=62 name=(null) inode=14268 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=63 name=(null) inode=14269 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=64 name=(null) inode=14268 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=65 name=(null) inode=14270 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=66 name=(null) inode=14268 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=67 name=(null) inode=14271 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=68 name=(null) inode=14268 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=69 name=(null) inode=14272 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=70 name=(null) inode=14268 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=71 name=(null) inode=14273 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=72 name=(null) inode=14265 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=73 name=(null) inode=14274 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=74 name=(null) inode=14274 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=75 name=(null) inode=14275 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=76 name=(null) inode=14274 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=77 name=(null) inode=14276 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=78 name=(null) inode=14274 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=79 name=(null) inode=14277 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=80 name=(null) inode=14274 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=81 name=(null) inode=14278 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=82 name=(null) inode=14274 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=83 name=(null) inode=14279 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=84 name=(null) inode=14265 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=85 name=(null) inode=14280 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=86 name=(null) inode=14280 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=87 name=(null) inode=14281 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=88 name=(null) inode=14280 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=89 name=(null) inode=14282 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=90 name=(null) inode=14280 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=91 name=(null) inode=14283 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=92 name=(null) inode=14280 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=93 name=(null) inode=14284 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=94 name=(null) inode=14280 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=95 name=(null) inode=14285 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=96 name=(null) inode=14265 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=97 name=(null) inode=14286 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=98 name=(null) inode=14286 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=99 name=(null) inode=14287 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=100 name=(null) inode=14286 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=101 name=(null) inode=14288 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=102 name=(null) inode=14286 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=103 name=(null) inode=14289 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=104 name=(null) inode=14286 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=105 name=(null) inode=14290 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=106 name=(null) inode=14286 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=107 name=(null) inode=14291 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PATH item=109 name=(null) inode=14292 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:32:57.226000 audit: PROCTITLE proctitle="(udev-worker)" Jul 15 11:32:57.244146 kernel: i801_smbus 0000:00:1f.3: Enabling SMBus device Jul 15 11:32:57.254284 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Jul 15 11:32:57.254434 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Jul 15 11:32:57.254586 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Jul 15 11:32:57.254677 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Jul 15 11:32:57.260685 systemd-networkd[1024]: lo: Link UP Jul 15 11:32:57.260694 systemd-networkd[1024]: lo: Gained carrier Jul 15 11:32:57.261084 systemd-networkd[1024]: Enumeration completed Jul 15 11:32:57.261194 systemd-networkd[1024]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 15 11:32:57.261205 systemd[1]: Started systemd-networkd.service. Jul 15 11:32:57.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:57.262783 systemd-networkd[1024]: eth0: Link UP Jul 15 11:32:57.262864 systemd-networkd[1024]: eth0: Gained carrier Jul 15 11:32:57.266091 kernel: kauditd_printk_skb: 220 callbacks suppressed Jul 15 11:32:57.266193 kernel: audit: type=1130 audit(1752579177.262:144): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:57.273156 kernel: mousedev: PS/2 mouse device common for all mice Jul 15 11:32:57.281430 systemd-networkd[1024]: eth0: DHCPv4 address 10.0.0.93/16, gateway 10.0.0.1 acquired from 10.0.0.1 Jul 15 11:32:57.323576 kernel: kvm: Nested Virtualization enabled Jul 15 11:32:57.323625 kernel: SVM: kvm: Nested Paging enabled Jul 15 11:32:57.323651 kernel: SVM: Virtual VMLOAD VMSAVE supported Jul 15 11:32:57.323665 kernel: SVM: Virtual GIF supported Jul 15 11:32:57.340140 kernel: EDAC MC: Ver: 3.0.0 Jul 15 11:32:57.366450 systemd[1]: Finished systemd-udev-settle.service. Jul 15 11:32:57.367000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:57.368603 systemd[1]: Starting lvm2-activation-early.service... Jul 15 11:32:57.371139 kernel: audit: type=1130 audit(1752579177.367:145): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:57.376180 lvm[1054]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 15 11:32:57.404237 systemd[1]: Finished lvm2-activation-early.service. Jul 15 11:32:57.405000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:57.405234 systemd[1]: Reached target cryptsetup.target. Jul 15 11:32:57.409152 kernel: audit: type=1130 audit(1752579177.405:146): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:57.410131 systemd[1]: Starting lvm2-activation.service... Jul 15 11:32:57.414555 lvm[1055]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 15 11:32:57.441910 systemd[1]: Finished lvm2-activation.service. Jul 15 11:32:57.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:57.471241 systemd[1]: Reached target local-fs-pre.target. Jul 15 11:32:57.475055 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Jul 15 11:32:57.475149 kernel: audit: type=1130 audit(1752579177.471:147): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:57.475083 systemd[1]: Reached target local-fs.target. Jul 15 11:32:57.475880 systemd[1]: Reached target machines.target. Jul 15 11:32:57.478072 systemd[1]: Starting ldconfig.service... Jul 15 11:32:57.479081 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 15 11:32:57.479190 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 15 11:32:57.480137 systemd[1]: Starting systemd-boot-update.service... Jul 15 11:32:57.482315 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Jul 15 11:32:57.484290 systemd[1]: Starting systemd-machine-id-commit.service... Jul 15 11:32:57.486250 systemd[1]: Starting systemd-sysext.service... Jul 15 11:32:57.487411 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1057 (bootctl) Jul 15 11:32:57.488563 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Jul 15 11:32:57.497932 systemd[1]: Unmounting usr-share-oem.mount... Jul 15 11:32:57.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:57.500460 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Jul 15 11:32:57.506132 kernel: audit: type=1130 audit(1752579177.500:148): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:57.508346 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 15 11:32:57.508499 systemd[1]: Unmounted usr-share-oem.mount. Jul 15 11:32:57.519141 kernel: loop0: detected capacity change from 0 to 221472 Jul 15 11:32:57.982650 systemd-fsck[1065]: fsck.fat 4.2 (2021-01-31) Jul 15 11:32:57.982650 systemd-fsck[1065]: /dev/vda1: 791 files, 120745/258078 clusters Jul 15 11:32:57.985585 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Jul 15 11:32:57.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:57.988586 systemd[1]: Mounting boot.mount... Jul 15 11:32:57.992145 kernel: audit: type=1130 audit(1752579177.986:149): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:57.992276 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Jul 15 11:32:57.999008 systemd[1]: Mounted boot.mount. Jul 15 11:32:58.011852 systemd[1]: Finished systemd-boot-update.service. Jul 15 11:32:58.013153 kernel: loop1: detected capacity change from 0 to 221472 Jul 15 11:32:58.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:58.019140 kernel: audit: type=1130 audit(1752579178.014:150): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:58.020480 (sd-sysext)[1070]: Using extensions 'kubernetes'. Jul 15 11:32:58.020852 (sd-sysext)[1070]: Merged extensions into '/usr'. Jul 15 11:32:58.036729 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 15 11:32:58.038238 systemd[1]: Mounting usr-share-oem.mount... Jul 15 11:32:58.051839 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 15 11:32:58.053163 systemd[1]: Starting modprobe@dm_mod.service... Jul 15 11:32:58.055565 systemd[1]: Starting modprobe@efi_pstore.service... Jul 15 11:32:58.057382 systemd[1]: Starting modprobe@loop.service... Jul 15 11:32:58.058183 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 15 11:32:58.058300 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 15 11:32:58.058404 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 15 11:32:58.060791 systemd[1]: Mounted usr-share-oem.mount. Jul 15 11:32:58.061825 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 15 11:32:58.061970 systemd[1]: Finished modprobe@dm_mod.service. Jul 15 11:32:58.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:58.062000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:58.063183 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 15 11:32:58.063277 systemd[1]: Finished modprobe@efi_pstore.service. Jul 15 11:32:58.067131 kernel: audit: type=1130 audit(1752579178.062:151): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:58.067172 kernel: audit: type=1131 audit(1752579178.062:152): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:58.070000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:58.071245 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 15 11:32:58.071340 systemd[1]: Finished modprobe@loop.service. Jul 15 11:32:58.070000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:58.075451 kernel: audit: type=1130 audit(1752579178.070:153): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:58.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:58.075000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:58.075897 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 15 11:32:58.075999 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 15 11:32:58.076938 systemd[1]: Finished systemd-sysext.service. Jul 15 11:32:58.077000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:58.078995 systemd[1]: Starting ensure-sysext.service... Jul 15 11:32:58.080770 systemd[1]: Starting systemd-tmpfiles-setup.service... Jul 15 11:32:58.089796 systemd[1]: Reloading. Jul 15 11:32:58.094591 systemd-tmpfiles[1077]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Jul 15 11:32:58.096343 systemd-tmpfiles[1077]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Jul 15 11:32:58.096869 ldconfig[1056]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Jul 15 11:32:58.098206 systemd-tmpfiles[1077]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Jul 15 11:32:58.148545 /usr/lib/systemd/system-generators/torcx-generator[1097]: time="2025-07-15T11:32:58Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" Jul 15 11:32:58.148911 /usr/lib/systemd/system-generators/torcx-generator[1097]: time="2025-07-15T11:32:58Z" level=info msg="torcx already run" Jul 15 11:32:58.381734 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 15 11:32:58.381755 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 15 11:32:58.398794 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 15 11:32:58.451000 audit: BPF prog-id=24 op=LOAD Jul 15 11:32:58.451000 audit: BPF prog-id=20 op=UNLOAD Jul 15 11:32:58.452000 audit: BPF prog-id=25 op=LOAD Jul 15 11:32:58.452000 audit: BPF prog-id=21 op=UNLOAD Jul 15 11:32:58.452000 audit: BPF prog-id=26 op=LOAD Jul 15 11:32:58.452000 audit: BPF prog-id=27 op=LOAD Jul 15 11:32:58.452000 audit: BPF prog-id=22 op=UNLOAD Jul 15 11:32:58.452000 audit: BPF prog-id=23 op=UNLOAD Jul 15 11:32:58.453000 audit: BPF prog-id=28 op=LOAD Jul 15 11:32:58.453000 audit: BPF prog-id=15 op=UNLOAD Jul 15 11:32:58.453000 audit: BPF prog-id=29 op=LOAD Jul 15 11:32:58.453000 audit: BPF prog-id=30 op=LOAD Jul 15 11:32:58.453000 audit: BPF prog-id=16 op=UNLOAD Jul 15 11:32:58.453000 audit: BPF prog-id=17 op=UNLOAD Jul 15 11:32:58.454000 audit: BPF prog-id=31 op=LOAD Jul 15 11:32:58.454000 audit: BPF prog-id=32 op=LOAD Jul 15 11:32:58.454000 audit: BPF prog-id=18 op=UNLOAD Jul 15 11:32:58.454000 audit: BPF prog-id=19 op=UNLOAD Jul 15 11:32:58.456760 systemd[1]: Finished systemd-tmpfiles-setup.service. Jul 15 11:32:58.457000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:58.461531 systemd[1]: Starting audit-rules.service... Jul 15 11:32:58.463362 systemd[1]: Starting clean-ca-certificates.service... Jul 15 11:32:58.465278 systemd[1]: Starting systemd-journal-catalog-update.service... Jul 15 11:32:58.466000 audit: BPF prog-id=33 op=LOAD Jul 15 11:32:58.467801 systemd[1]: Starting systemd-resolved.service... Jul 15 11:32:58.469000 audit: BPF prog-id=34 op=LOAD Jul 15 11:32:58.470064 systemd[1]: Starting systemd-timesyncd.service... Jul 15 11:32:58.471832 systemd[1]: Starting systemd-update-utmp.service... Jul 15 11:32:58.476256 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 15 11:32:58.476448 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 15 11:32:58.477742 systemd[1]: Starting modprobe@dm_mod.service... Jul 15 11:32:58.480072 systemd[1]: Starting modprobe@efi_pstore.service... Jul 15 11:32:58.482107 systemd[1]: Starting modprobe@loop.service... Jul 15 11:32:58.482902 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 15 11:32:58.483018 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 15 11:32:58.483161 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 15 11:32:58.484058 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 15 11:32:58.484190 systemd[1]: Finished modprobe@dm_mod.service. Jul 15 11:32:58.485000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:58.485000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:58.485422 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 15 11:32:58.485571 systemd[1]: Finished modprobe@efi_pstore.service. Jul 15 11:32:58.486000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:58.486000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:58.486810 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 15 11:32:58.486921 systemd[1]: Finished modprobe@loop.service. Jul 15 11:32:58.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:58.487000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:58.488031 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 15 11:32:58.488150 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 15 11:32:58.489840 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 15 11:32:58.490028 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 15 11:32:58.491333 systemd[1]: Starting modprobe@dm_mod.service... Jul 15 11:32:58.493251 systemd[1]: Starting modprobe@efi_pstore.service... Jul 15 11:32:58.495023 systemd[1]: Starting modprobe@loop.service... Jul 15 11:32:58.495802 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 15 11:32:58.495932 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 15 11:32:58.496037 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 15 11:32:58.496783 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 15 11:32:58.496907 systemd[1]: Finished modprobe@dm_mod.service. Jul 15 11:32:58.497000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:58.497000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:58.498137 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 15 11:32:58.498234 systemd[1]: Finished modprobe@efi_pstore.service. Jul 15 11:32:58.499000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:58.499000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:58.499439 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 15 11:32:58.499535 systemd[1]: Finished modprobe@loop.service. Jul 15 11:32:58.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:58.500000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:58.500632 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 15 11:32:58.500721 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 15 11:32:58.503026 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 15 11:32:58.503245 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 15 11:32:58.504550 systemd[1]: Starting modprobe@dm_mod.service... Jul 15 11:32:58.506603 systemd[1]: Starting modprobe@drm.service... Jul 15 11:32:58.508468 systemd[1]: Starting modprobe@efi_pstore.service... Jul 15 11:32:58.510366 systemd[1]: Starting modprobe@loop.service... Jul 15 11:32:58.511223 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 15 11:32:58.511396 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 15 11:32:58.516000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:58.516000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:58.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:58.518000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:58.519000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:58.520000 audit[1145]: SYSTEM_BOOT pid=1145 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jul 15 11:32:58.512764 systemd[1]: Starting systemd-networkd-wait-online.service... Jul 15 11:32:58.513974 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 15 11:32:58.515198 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 15 11:32:58.515349 systemd[1]: Finished modprobe@dm_mod.service. Jul 15 11:32:58.522000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:58.522000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:58.516929 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 15 11:32:58.517048 systemd[1]: Finished modprobe@drm.service. Jul 15 11:32:58.518476 systemd[1]: Finished clean-ca-certificates.service. Jul 15 11:32:58.519884 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 15 11:32:58.520038 systemd[1]: Finished modprobe@efi_pstore.service. Jul 15 11:32:58.527000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:58.526473 systemd[1]: Finished ensure-sysext.service. Jul 15 11:32:58.529023 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 15 11:32:58.529100 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 15 11:32:58.529775 systemd-resolved[1143]: Positive Trust Anchors: Jul 15 11:32:58.529788 systemd-resolved[1143]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 15 11:32:58.529830 systemd-resolved[1143]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 15 11:32:58.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:58.532000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:58.532000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:58.530710 systemd[1]: Finished systemd-update-utmp.service. Jul 15 11:32:58.532037 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 15 11:32:58.532164 systemd[1]: Finished modprobe@loop.service. Jul 15 11:32:58.533732 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 15 11:32:58.534499 systemd[1]: Started systemd-timesyncd.service. Jul 15 11:32:58.535000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:58.535735 systemd[1]: Reached target time-set.target. Jul 15 11:32:58.536948 systemd-timesyncd[1144]: Contacted time server 10.0.0.1:123 (10.0.0.1). Jul 15 11:32:58.539000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:58.537039 systemd-timesyncd[1144]: Initial clock synchronization to Tue 2025-07-15 11:32:58.771610 UTC. Jul 15 11:32:58.538866 systemd[1]: Finished systemd-journal-catalog-update.service. Jul 15 11:32:58.542203 systemd-resolved[1143]: Defaulting to hostname 'linux'. Jul 15 11:32:58.543690 systemd[1]: Started systemd-resolved.service. Jul 15 11:32:58.544583 systemd[1]: Reached target network.target. Jul 15 11:32:58.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:32:58.545368 systemd[1]: Reached target nss-lookup.target. Jul 15 11:32:58.548000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jul 15 11:32:58.548000 audit[1174]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff35293000 a2=420 a3=0 items=0 ppid=1140 pid=1174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:32:58.548000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Jul 15 11:32:58.548712 augenrules[1174]: No rules Jul 15 11:32:58.549035 systemd[1]: Finished audit-rules.service. Jul 15 11:32:58.650255 systemd-networkd[1024]: eth0: Gained IPv6LL Jul 15 11:32:58.651895 systemd[1]: Finished systemd-networkd-wait-online.service. Jul 15 11:32:58.652974 systemd[1]: Reached target network-online.target. Jul 15 11:32:58.709835 systemd[1]: Finished ldconfig.service. Jul 15 11:32:58.711960 systemd[1]: Starting systemd-update-done.service... Jul 15 11:32:58.717629 systemd[1]: Finished systemd-update-done.service. Jul 15 11:32:58.718741 systemd[1]: Reached target sysinit.target. Jul 15 11:32:58.719633 systemd[1]: Started motdgen.path. Jul 15 11:32:58.720410 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Jul 15 11:32:58.721715 systemd[1]: Started logrotate.timer. Jul 15 11:32:58.722544 systemd[1]: Started mdadm.timer. Jul 15 11:32:58.723263 systemd[1]: Started systemd-tmpfiles-clean.timer. Jul 15 11:32:58.733263 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 15 11:32:58.733293 systemd[1]: Reached target paths.target. Jul 15 11:32:58.734043 systemd[1]: Reached target timers.target. Jul 15 11:32:58.735084 systemd[1]: Listening on dbus.socket. Jul 15 11:32:58.736692 systemd[1]: Starting docker.socket... Jul 15 11:32:58.739527 systemd[1]: Listening on sshd.socket. Jul 15 11:32:58.740406 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 15 11:32:58.740764 systemd[1]: Listening on docker.socket. Jul 15 11:32:58.741607 systemd[1]: Reached target sockets.target. Jul 15 11:32:58.742403 systemd[1]: Reached target basic.target. Jul 15 11:32:58.743200 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 15 11:32:58.743226 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 15 11:32:58.743971 systemd[1]: Starting containerd.service... Jul 15 11:32:58.745472 systemd[1]: Starting dbus.service... Jul 15 11:32:58.747085 systemd[1]: Starting enable-oem-cloudinit.service... Jul 15 11:32:58.748932 systemd[1]: Starting extend-filesystems.service... Jul 15 11:32:58.749866 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Jul 15 11:32:58.753322 jq[1184]: false Jul 15 11:32:58.751434 systemd[1]: Starting kubelet.service... Jul 15 11:32:58.752945 systemd[1]: Starting motdgen.service... Jul 15 11:32:58.755053 systemd[1]: Starting ssh-key-proc-cmdline.service... Jul 15 11:32:58.757338 systemd[1]: Starting sshd-keygen.service... Jul 15 11:32:58.766786 systemd[1]: Starting systemd-logind.service... Jul 15 11:32:58.767603 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 15 11:32:58.767694 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Jul 15 11:32:58.768082 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Jul 15 11:32:58.768711 systemd[1]: Starting update-engine.service... Jul 15 11:32:58.770613 systemd[1]: Starting update-ssh-keys-after-ignition.service... Jul 15 11:32:58.772900 jq[1194]: true Jul 15 11:32:58.773620 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 15 11:32:58.773848 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Jul 15 11:32:58.784204 jq[1198]: true Jul 15 11:32:58.786770 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 15 11:32:58.787039 systemd[1]: Finished ssh-key-proc-cmdline.service. Jul 15 11:32:58.789942 extend-filesystems[1185]: Found loop1 Jul 15 11:32:58.790954 extend-filesystems[1185]: Found sr0 Jul 15 11:32:58.790954 extend-filesystems[1185]: Found vda Jul 15 11:32:58.790954 extend-filesystems[1185]: Found vda1 Jul 15 11:32:58.790954 extend-filesystems[1185]: Found vda2 Jul 15 11:32:58.790954 extend-filesystems[1185]: Found vda3 Jul 15 11:32:58.790954 extend-filesystems[1185]: Found usr Jul 15 11:32:58.790748 systemd[1]: motdgen.service: Deactivated successfully. Jul 15 11:32:58.800139 extend-filesystems[1185]: Found vda4 Jul 15 11:32:58.800139 extend-filesystems[1185]: Found vda6 Jul 15 11:32:58.800139 extend-filesystems[1185]: Found vda7 Jul 15 11:32:58.800139 extend-filesystems[1185]: Found vda9 Jul 15 11:32:58.800139 extend-filesystems[1185]: Checking size of /dev/vda9 Jul 15 11:32:58.790908 systemd[1]: Finished motdgen.service. Jul 15 11:32:58.842577 extend-filesystems[1185]: Resized partition /dev/vda9 Jul 15 11:32:58.845526 extend-filesystems[1232]: resize2fs 1.46.5 (30-Dec-2021) Jul 15 11:32:58.851541 dbus-daemon[1183]: [system] SELinux support is enabled Jul 15 11:32:58.849913 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Jul 15 11:32:58.850509 systemd[1]: Finished systemd-machine-id-commit.service. Jul 15 11:32:58.852188 systemd[1]: Started dbus.service. Jul 15 11:32:58.858148 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Jul 15 11:32:58.858083 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Jul 15 11:32:58.858137 systemd[1]: Reached target system-config.target. Jul 15 11:32:58.859416 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Jul 15 11:32:58.859442 systemd[1]: Reached target user-config.target. Jul 15 11:32:59.096613 env[1204]: time="2025-07-15T11:32:59.096430077Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Jul 15 11:32:59.111635 env[1204]: time="2025-07-15T11:32:59.111579680Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Jul 15 11:32:59.111810 env[1204]: time="2025-07-15T11:32:59.111754739Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Jul 15 11:32:59.113102 env[1204]: time="2025-07-15T11:32:59.113056599Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.188-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Jul 15 11:32:59.113102 env[1204]: time="2025-07-15T11:32:59.113085289Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Jul 15 11:32:59.113376 env[1204]: time="2025-07-15T11:32:59.113351904Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 15 11:32:59.113376 env[1204]: time="2025-07-15T11:32:59.113374552Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Jul 15 11:32:59.113438 env[1204]: time="2025-07-15T11:32:59.113387896Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Jul 15 11:32:59.113438 env[1204]: time="2025-07-15T11:32:59.113398240Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Jul 15 11:32:59.113502 env[1204]: time="2025-07-15T11:32:59.113485826Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Jul 15 11:32:59.113759 env[1204]: time="2025-07-15T11:32:59.113730691Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Jul 15 11:32:59.113888 env[1204]: time="2025-07-15T11:32:59.113867625Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 15 11:32:59.113918 env[1204]: time="2025-07-15T11:32:59.113888075Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Jul 15 11:32:59.113963 env[1204]: time="2025-07-15T11:32:59.113946403Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Jul 15 11:32:59.113993 env[1204]: time="2025-07-15T11:32:59.113963214Z" level=info msg="metadata content store policy set" policy=shared Jul 15 11:32:59.179455 systemd-logind[1192]: Watching system buttons on /dev/input/event1 (Power Button) Jul 15 11:32:59.179492 systemd-logind[1192]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Jul 15 11:32:59.180520 systemd-logind[1192]: New seat seat0. Jul 15 11:32:59.184046 update_engine[1193]: I0715 11:32:59.183701 1193 main.cc:92] Flatcar Update Engine starting Jul 15 11:32:59.188359 systemd[1]: Started systemd-logind.service. Jul 15 11:32:59.189977 systemd[1]: Started update-engine.service. Jul 15 11:32:59.191464 update_engine[1193]: I0715 11:32:59.190505 1193 update_check_scheduler.cc:74] Next update check in 3m9s Jul 15 11:32:59.193696 bash[1223]: Updated "/home/core/.ssh/authorized_keys" Jul 15 11:32:59.194020 systemd[1]: Started locksmithd.service. Jul 15 11:32:59.195151 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Jul 15 11:32:59.196790 systemd[1]: Finished update-ssh-keys-after-ignition.service. Jul 15 11:32:59.216933 extend-filesystems[1232]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Jul 15 11:32:59.216933 extend-filesystems[1232]: old_desc_blocks = 1, new_desc_blocks = 1 Jul 15 11:32:59.216933 extend-filesystems[1232]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Jul 15 11:32:59.264767 extend-filesystems[1185]: Resized filesystem in /dev/vda9 Jul 15 11:32:59.265963 env[1204]: time="2025-07-15T11:32:59.230240635Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Jul 15 11:32:59.265963 env[1204]: time="2025-07-15T11:32:59.230321962Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Jul 15 11:32:59.265963 env[1204]: time="2025-07-15T11:32:59.230335503Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Jul 15 11:32:59.265963 env[1204]: time="2025-07-15T11:32:59.230400793Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Jul 15 11:32:59.265963 env[1204]: time="2025-07-15T11:32:59.230416231Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Jul 15 11:32:59.265963 env[1204]: time="2025-07-15T11:32:59.230428616Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Jul 15 11:32:59.265963 env[1204]: time="2025-07-15T11:32:59.230454182Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Jul 15 11:32:59.265963 env[1204]: time="2025-07-15T11:32:59.230467680Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Jul 15 11:32:59.265963 env[1204]: time="2025-07-15T11:32:59.230480231Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Jul 15 11:32:59.265963 env[1204]: time="2025-07-15T11:32:59.230492318Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Jul 15 11:32:59.265963 env[1204]: time="2025-07-15T11:32:59.230503940Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Jul 15 11:32:59.265963 env[1204]: time="2025-07-15T11:32:59.230535395Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Jul 15 11:32:59.265963 env[1204]: time="2025-07-15T11:32:59.230665943Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Jul 15 11:32:59.265963 env[1204]: time="2025-07-15T11:32:59.230774681Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Jul 15 11:32:59.217404 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 15 11:32:59.266456 env[1204]: time="2025-07-15T11:32:59.231077226Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Jul 15 11:32:59.266456 env[1204]: time="2025-07-15T11:32:59.231108504Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Jul 15 11:32:59.266456 env[1204]: time="2025-07-15T11:32:59.231140278Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Jul 15 11:32:59.266456 env[1204]: time="2025-07-15T11:32:59.231211457Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Jul 15 11:32:59.266456 env[1204]: time="2025-07-15T11:32:59.231223718Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Jul 15 11:32:59.266456 env[1204]: time="2025-07-15T11:32:59.231234825Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Jul 15 11:32:59.266456 env[1204]: time="2025-07-15T11:32:59.231248356Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Jul 15 11:32:59.266456 env[1204]: time="2025-07-15T11:32:59.231259164Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Jul 15 11:32:59.266456 env[1204]: time="2025-07-15T11:32:59.231271189Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Jul 15 11:32:59.266456 env[1204]: time="2025-07-15T11:32:59.231295732Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Jul 15 11:32:59.266456 env[1204]: time="2025-07-15T11:32:59.231305653Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Jul 15 11:32:59.266456 env[1204]: time="2025-07-15T11:32:59.231318060Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Jul 15 11:32:59.266456 env[1204]: time="2025-07-15T11:32:59.231465831Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Jul 15 11:32:59.266456 env[1204]: time="2025-07-15T11:32:59.231484631Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Jul 15 11:32:59.266456 env[1204]: time="2025-07-15T11:32:59.231498852Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Jul 15 11:32:59.217627 systemd[1]: Finished extend-filesystems.service. Jul 15 11:32:59.266844 env[1204]: time="2025-07-15T11:32:59.231531616Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Jul 15 11:32:59.266844 env[1204]: time="2025-07-15T11:32:59.231555438Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Jul 15 11:32:59.266844 env[1204]: time="2025-07-15T11:32:59.231570403Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Jul 15 11:32:59.266844 env[1204]: time="2025-07-15T11:32:59.231628051Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Jul 15 11:32:59.266844 env[1204]: time="2025-07-15T11:32:59.231688999Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Jul 15 11:32:59.261471 systemd[1]: Started containerd.service. Jul 15 11:32:59.266979 env[1204]: time="2025-07-15T11:32:59.231954934Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Jul 15 11:32:59.266979 env[1204]: time="2025-07-15T11:32:59.232047718Z" level=info msg="Connect containerd service" Jul 15 11:32:59.266979 env[1204]: time="2025-07-15T11:32:59.232103973Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Jul 15 11:32:59.266979 env[1204]: time="2025-07-15T11:32:59.232708693Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 15 11:32:59.266979 env[1204]: time="2025-07-15T11:32:59.233079188Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Jul 15 11:32:59.266979 env[1204]: time="2025-07-15T11:32:59.233137888Z" level=info msg=serving... address=/run/containerd/containerd.sock Jul 15 11:32:59.266979 env[1204]: time="2025-07-15T11:32:59.233190793Z" level=info msg="containerd successfully booted in 0.371001s" Jul 15 11:32:59.266979 env[1204]: time="2025-07-15T11:32:59.265638731Z" level=info msg="Start subscribing containerd event" Jul 15 11:32:59.266979 env[1204]: time="2025-07-15T11:32:59.265718892Z" level=info msg="Start recovering state" Jul 15 11:32:59.266979 env[1204]: time="2025-07-15T11:32:59.265796753Z" level=info msg="Start event monitor" Jul 15 11:32:59.266979 env[1204]: time="2025-07-15T11:32:59.265814986Z" level=info msg="Start snapshots syncer" Jul 15 11:32:59.266979 env[1204]: time="2025-07-15T11:32:59.265823989Z" level=info msg="Start cni network conf syncer for default" Jul 15 11:32:59.266979 env[1204]: time="2025-07-15T11:32:59.265831043Z" level=info msg="Start streaming server" Jul 15 11:32:59.295837 locksmithd[1238]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Jul 15 11:32:59.466054 sshd_keygen[1208]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Jul 15 11:32:59.487842 systemd[1]: Finished sshd-keygen.service. Jul 15 11:32:59.491173 systemd[1]: Starting issuegen.service... Jul 15 11:32:59.496720 systemd[1]: issuegen.service: Deactivated successfully. Jul 15 11:32:59.496897 systemd[1]: Finished issuegen.service. Jul 15 11:32:59.499207 systemd[1]: Starting systemd-user-sessions.service... Jul 15 11:32:59.505828 systemd[1]: Finished systemd-user-sessions.service. Jul 15 11:32:59.508372 systemd[1]: Started getty@tty1.service. Jul 15 11:32:59.511038 systemd[1]: Started serial-getty@ttyS0.service. Jul 15 11:32:59.512159 systemd[1]: Reached target getty.target. Jul 15 11:33:00.267979 systemd[1]: Started kubelet.service. Jul 15 11:33:00.269381 systemd[1]: Reached target multi-user.target. Jul 15 11:33:00.271331 systemd[1]: Starting systemd-update-utmp-runlevel.service... Jul 15 11:33:00.316751 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 15 11:33:00.316975 systemd[1]: Finished systemd-update-utmp-runlevel.service. Jul 15 11:33:00.318412 systemd[1]: Startup finished in 799ms (kernel) + 4.704s (initrd) + 7.828s (userspace) = 13.332s. Jul 15 11:33:00.544057 systemd[1]: Created slice system-sshd.slice. Jul 15 11:33:00.545180 systemd[1]: Started sshd@0-10.0.0.93:22-10.0.0.1:36062.service. Jul 15 11:33:00.601371 sshd[1269]: Accepted publickey for core from 10.0.0.1 port 36062 ssh2: RSA SHA256:UAnaMym03FNQ3Em4JmRfExsPnzWeaW932gzAKk7u+5w Jul 15 11:33:00.603407 sshd[1269]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 15 11:33:00.612310 systemd-logind[1192]: New session 1 of user core. Jul 15 11:33:00.613201 systemd[1]: Created slice user-500.slice. Jul 15 11:33:00.614500 systemd[1]: Starting user-runtime-dir@500.service... Jul 15 11:33:00.624794 systemd[1]: Finished user-runtime-dir@500.service. Jul 15 11:33:00.626316 systemd[1]: Starting user@500.service... Jul 15 11:33:00.629233 (systemd)[1272]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Jul 15 11:33:00.704588 systemd[1272]: Queued start job for default target default.target. Jul 15 11:33:00.705082 systemd[1272]: Reached target paths.target. Jul 15 11:33:00.705103 systemd[1272]: Reached target sockets.target. Jul 15 11:33:00.705128 systemd[1272]: Reached target timers.target. Jul 15 11:33:00.705140 systemd[1272]: Reached target basic.target. Jul 15 11:33:00.705233 systemd[1]: Started user@500.service. Jul 15 11:33:00.706205 systemd[1]: Started session-1.scope. Jul 15 11:33:00.706372 systemd[1272]: Reached target default.target. Jul 15 11:33:00.706410 systemd[1272]: Startup finished in 71ms. Jul 15 11:33:00.783146 systemd[1]: Started sshd@1-10.0.0.93:22-10.0.0.1:36072.service. Jul 15 11:33:00.817727 sshd[1282]: Accepted publickey for core from 10.0.0.1 port 36072 ssh2: RSA SHA256:UAnaMym03FNQ3Em4JmRfExsPnzWeaW932gzAKk7u+5w Jul 15 11:33:00.819676 sshd[1282]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 15 11:33:00.824132 systemd-logind[1192]: New session 2 of user core. Jul 15 11:33:00.824876 systemd[1]: Started session-2.scope. Jul 15 11:33:00.883055 sshd[1282]: pam_unix(sshd:session): session closed for user core Jul 15 11:33:00.886075 systemd[1]: sshd@1-10.0.0.93:22-10.0.0.1:36072.service: Deactivated successfully. Jul 15 11:33:00.886687 systemd[1]: session-2.scope: Deactivated successfully. Jul 15 11:33:00.887188 systemd-logind[1192]: Session 2 logged out. Waiting for processes to exit. Jul 15 11:33:00.888639 systemd[1]: Started sshd@2-10.0.0.93:22-10.0.0.1:36084.service. Jul 15 11:33:00.890675 systemd-logind[1192]: Removed session 2. Jul 15 11:33:00.919889 sshd[1288]: Accepted publickey for core from 10.0.0.1 port 36084 ssh2: RSA SHA256:UAnaMym03FNQ3Em4JmRfExsPnzWeaW932gzAKk7u+5w Jul 15 11:33:00.920993 sshd[1288]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 15 11:33:00.923936 kubelet[1261]: E0715 11:33:00.923880 1261 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 15 11:33:00.924481 systemd-logind[1192]: New session 3 of user core. Jul 15 11:33:00.925431 systemd[1]: Started session-3.scope. Jul 15 11:33:00.925678 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 15 11:33:00.925799 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 15 11:33:00.926027 systemd[1]: kubelet.service: Consumed 1.549s CPU time. Jul 15 11:33:00.976046 sshd[1288]: pam_unix(sshd:session): session closed for user core Jul 15 11:33:00.978842 systemd[1]: sshd@2-10.0.0.93:22-10.0.0.1:36084.service: Deactivated successfully. Jul 15 11:33:00.979416 systemd[1]: session-3.scope: Deactivated successfully. Jul 15 11:33:00.979968 systemd-logind[1192]: Session 3 logged out. Waiting for processes to exit. Jul 15 11:33:00.981022 systemd[1]: Started sshd@3-10.0.0.93:22-10.0.0.1:36092.service. Jul 15 11:33:00.981653 systemd-logind[1192]: Removed session 3. Jul 15 11:33:01.011097 sshd[1294]: Accepted publickey for core from 10.0.0.1 port 36092 ssh2: RSA SHA256:UAnaMym03FNQ3Em4JmRfExsPnzWeaW932gzAKk7u+5w Jul 15 11:33:01.012154 sshd[1294]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 15 11:33:01.015432 systemd-logind[1192]: New session 4 of user core. Jul 15 11:33:01.016434 systemd[1]: Started session-4.scope. Jul 15 11:33:01.070304 sshd[1294]: pam_unix(sshd:session): session closed for user core Jul 15 11:33:01.073023 systemd[1]: sshd@3-10.0.0.93:22-10.0.0.1:36092.service: Deactivated successfully. Jul 15 11:33:01.073570 systemd[1]: session-4.scope: Deactivated successfully. Jul 15 11:33:01.074065 systemd-logind[1192]: Session 4 logged out. Waiting for processes to exit. Jul 15 11:33:01.075476 systemd[1]: Started sshd@4-10.0.0.93:22-10.0.0.1:36106.service. Jul 15 11:33:01.076257 systemd-logind[1192]: Removed session 4. Jul 15 11:33:01.107636 sshd[1300]: Accepted publickey for core from 10.0.0.1 port 36106 ssh2: RSA SHA256:UAnaMym03FNQ3Em4JmRfExsPnzWeaW932gzAKk7u+5w Jul 15 11:33:01.110803 sshd[1300]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 15 11:33:01.118594 systemd-logind[1192]: New session 5 of user core. Jul 15 11:33:01.120052 systemd[1]: Started session-5.scope. Jul 15 11:33:01.182465 sudo[1303]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Jul 15 11:33:01.182659 sudo[1303]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 15 11:33:01.191383 dbus-daemon[1183]: \xd0=x\xd5?V: received setenforce notice (enforcing=-1126508576) Jul 15 11:33:01.193259 sudo[1303]: pam_unix(sudo:session): session closed for user root Jul 15 11:33:01.195072 sshd[1300]: pam_unix(sshd:session): session closed for user core Jul 15 11:33:01.197867 systemd[1]: sshd@4-10.0.0.93:22-10.0.0.1:36106.service: Deactivated successfully. Jul 15 11:33:01.198414 systemd[1]: session-5.scope: Deactivated successfully. Jul 15 11:33:01.198921 systemd-logind[1192]: Session 5 logged out. Waiting for processes to exit. Jul 15 11:33:01.200001 systemd[1]: Started sshd@5-10.0.0.93:22-10.0.0.1:36118.service. Jul 15 11:33:01.200741 systemd-logind[1192]: Removed session 5. Jul 15 11:33:01.230166 sshd[1307]: Accepted publickey for core from 10.0.0.1 port 36118 ssh2: RSA SHA256:UAnaMym03FNQ3Em4JmRfExsPnzWeaW932gzAKk7u+5w Jul 15 11:33:01.231302 sshd[1307]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 15 11:33:01.234519 systemd-logind[1192]: New session 6 of user core. Jul 15 11:33:01.235310 systemd[1]: Started session-6.scope. Jul 15 11:33:01.289824 sudo[1311]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Jul 15 11:33:01.290024 sudo[1311]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 15 11:33:01.292998 sudo[1311]: pam_unix(sudo:session): session closed for user root Jul 15 11:33:01.298024 sudo[1310]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Jul 15 11:33:01.298275 sudo[1310]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 15 11:33:01.307624 systemd[1]: Stopping audit-rules.service... Jul 15 11:33:01.307000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 15 11:33:01.307000 audit[1314]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc1dd985d0 a2=420 a3=0 items=0 ppid=1 pid=1314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:01.307000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Jul 15 11:33:01.309331 auditctl[1314]: No rules Jul 15 11:33:01.309634 systemd[1]: audit-rules.service: Deactivated successfully. Jul 15 11:33:01.309816 systemd[1]: Stopped audit-rules.service. Jul 15 11:33:01.308000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:01.311527 systemd[1]: Starting audit-rules.service... Jul 15 11:33:01.335948 augenrules[1331]: No rules Jul 15 11:33:01.336842 systemd[1]: Finished audit-rules.service. Jul 15 11:33:01.336000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:01.338065 sudo[1310]: pam_unix(sudo:session): session closed for user root Jul 15 11:33:01.336000 audit[1310]: USER_END pid=1310 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:33:01.337000 audit[1310]: CRED_DISP pid=1310 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:33:01.339596 sshd[1307]: pam_unix(sshd:session): session closed for user core Jul 15 11:33:01.340000 audit[1307]: USER_END pid=1307 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:33:01.340000 audit[1307]: CRED_DISP pid=1307 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:33:01.342347 systemd[1]: sshd@5-10.0.0.93:22-10.0.0.1:36118.service: Deactivated successfully. Jul 15 11:33:01.342000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.93:22-10.0.0.1:36118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:01.342866 systemd[1]: session-6.scope: Deactivated successfully. Jul 15 11:33:01.343415 systemd-logind[1192]: Session 6 logged out. Waiting for processes to exit. Jul 15 11:33:01.344409 systemd[1]: Started sshd@6-10.0.0.93:22-10.0.0.1:36122.service. Jul 15 11:33:01.343000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.93:22-10.0.0.1:36122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:01.345322 systemd-logind[1192]: Removed session 6. Jul 15 11:33:01.377000 audit[1337]: USER_ACCT pid=1337 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:33:01.378454 sshd[1337]: Accepted publickey for core from 10.0.0.1 port 36122 ssh2: RSA SHA256:UAnaMym03FNQ3Em4JmRfExsPnzWeaW932gzAKk7u+5w Jul 15 11:33:01.378000 audit[1337]: CRED_ACQ pid=1337 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:33:01.378000 audit[1337]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe29286f00 a2=3 a3=0 items=0 ppid=1 pid=1337 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:01.378000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 15 11:33:01.379770 sshd[1337]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 15 11:33:01.383195 systemd-logind[1192]: New session 7 of user core. Jul 15 11:33:01.384017 systemd[1]: Started session-7.scope. Jul 15 11:33:01.390000 audit[1337]: USER_START pid=1337 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:33:01.392000 audit[1339]: CRED_ACQ pid=1339 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:33:01.444000 audit[1340]: USER_ACCT pid=1340 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:33:01.446079 sudo[1340]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Jul 15 11:33:01.445000 audit[1340]: CRED_REFR pid=1340 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:33:01.446416 sudo[1340]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 15 11:33:01.446000 audit[1340]: USER_START pid=1340 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:33:01.459481 systemd[1]: Starting coreos-metadata.service... Jul 15 11:33:01.468213 systemd[1]: coreos-metadata.service: Deactivated successfully. Jul 15 11:33:01.468435 systemd[1]: Finished coreos-metadata.service. Jul 15 11:33:01.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:01.467000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:02.089370 systemd[1]: Stopped kubelet.service. Jul 15 11:33:02.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:02.088000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:02.089533 systemd[1]: kubelet.service: Consumed 1.549s CPU time. Jul 15 11:33:02.091780 systemd[1]: Starting kubelet.service... Jul 15 11:33:02.114662 systemd[1]: Reloading. Jul 15 11:33:02.189286 /usr/lib/systemd/system-generators/torcx-generator[1399]: time="2025-07-15T11:33:02Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" Jul 15 11:33:02.189663 /usr/lib/systemd/system-generators/torcx-generator[1399]: time="2025-07-15T11:33:02Z" level=info msg="torcx already run" Jul 15 11:33:03.047547 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 15 11:33:03.047564 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 15 11:33:03.064849 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 15 11:33:03.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.126173 kernel: kauditd_printk_skb: 80 callbacks suppressed Jul 15 11:33:03.126222 kernel: audit: type=1400 audit(1752579183.124:228): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.131933 kernel: audit: type=1400 audit(1752579183.124:229): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.131978 kernel: audit: type=1400 audit(1752579183.124:230): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.134807 kernel: audit: type=1400 audit(1752579183.124:231): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.140589 kernel: audit: type=1400 audit(1752579183.124:232): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.140633 kernel: audit: type=1400 audit(1752579183.124:233): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.146319 kernel: audit: type=1400 audit(1752579183.124:234): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.146367 kernel: audit: type=1400 audit(1752579183.124:235): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.149163 kernel: audit: type=1400 audit(1752579183.124:236): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.154743 kernel: audit: type=1400 audit(1752579183.128:237): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.128000 audit: BPF prog-id=40 op=LOAD Jul 15 11:33:03.128000 audit: BPF prog-id=33 op=UNLOAD Jul 15 11:33:03.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.133000 audit: BPF prog-id=41 op=LOAD Jul 15 11:33:03.133000 audit: BPF prog-id=34 op=UNLOAD Jul 15 11:33:03.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.139000 audit: BPF prog-id=42 op=LOAD Jul 15 11:33:03.139000 audit: BPF prog-id=24 op=UNLOAD Jul 15 11:33:03.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.142000 audit: BPF prog-id=43 op=LOAD Jul 15 11:33:03.142000 audit: BPF prog-id=35 op=UNLOAD Jul 15 11:33:03.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.148000 audit: BPF prog-id=44 op=LOAD Jul 15 11:33:03.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.150000 audit: BPF prog-id=45 op=LOAD Jul 15 11:33:03.150000 audit: BPF prog-id=36 op=UNLOAD Jul 15 11:33:03.150000 audit: BPF prog-id=37 op=UNLOAD Jul 15 11:33:03.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.153000 audit: BPF prog-id=46 op=LOAD Jul 15 11:33:03.153000 audit: BPF prog-id=38 op=UNLOAD Jul 15 11:33:03.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.154000 audit: BPF prog-id=47 op=LOAD Jul 15 11:33:03.154000 audit: BPF prog-id=25 op=UNLOAD Jul 15 11:33:03.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.155000 audit: BPF prog-id=48 op=LOAD Jul 15 11:33:03.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.155000 audit: BPF prog-id=49 op=LOAD Jul 15 11:33:03.155000 audit: BPF prog-id=26 op=UNLOAD Jul 15 11:33:03.155000 audit: BPF prog-id=27 op=UNLOAD Jul 15 11:33:03.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.156000 audit: BPF prog-id=50 op=LOAD Jul 15 11:33:03.156000 audit: BPF prog-id=28 op=UNLOAD Jul 15 11:33:03.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.156000 audit: BPF prog-id=51 op=LOAD Jul 15 11:33:03.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.157000 audit: BPF prog-id=52 op=LOAD Jul 15 11:33:03.157000 audit: BPF prog-id=29 op=UNLOAD Jul 15 11:33:03.157000 audit: BPF prog-id=30 op=UNLOAD Jul 15 11:33:03.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.157000 audit: BPF prog-id=53 op=LOAD Jul 15 11:33:03.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.157000 audit: BPF prog-id=54 op=LOAD Jul 15 11:33:03.157000 audit: BPF prog-id=31 op=UNLOAD Jul 15 11:33:03.157000 audit: BPF prog-id=32 op=UNLOAD Jul 15 11:33:03.169055 systemd[1]: Started kubelet.service. Jul 15 11:33:03.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:03.170350 systemd[1]: Stopping kubelet.service... Jul 15 11:33:03.170609 systemd[1]: kubelet.service: Deactivated successfully. Jul 15 11:33:03.170768 systemd[1]: Stopped kubelet.service. Jul 15 11:33:03.169000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:03.172272 systemd[1]: Starting kubelet.service... Jul 15 11:33:03.267110 systemd[1]: Started kubelet.service. Jul 15 11:33:03.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:03.305517 kubelet[1447]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 15 11:33:03.305517 kubelet[1447]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Jul 15 11:33:03.305517 kubelet[1447]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 15 11:33:03.305946 kubelet[1447]: I0715 11:33:03.305493 1447 server.go:211] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 15 11:33:03.733656 kubelet[1447]: I0715 11:33:03.733521 1447 server.go:491] "Kubelet version" kubeletVersion="v1.31.8" Jul 15 11:33:03.733656 kubelet[1447]: I0715 11:33:03.733566 1447 server.go:493] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 15 11:33:03.733870 kubelet[1447]: I0715 11:33:03.733844 1447 server.go:934] "Client rotation is on, will bootstrap in background" Jul 15 11:33:03.758773 kubelet[1447]: I0715 11:33:03.758725 1447 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 15 11:33:03.767131 kubelet[1447]: E0715 11:33:03.767069 1447 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Jul 15 11:33:03.767131 kubelet[1447]: I0715 11:33:03.767127 1447 server.go:1408] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Jul 15 11:33:03.772454 kubelet[1447]: I0715 11:33:03.772428 1447 server.go:749] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 15 11:33:03.772595 kubelet[1447]: I0715 11:33:03.772574 1447 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Jul 15 11:33:03.772792 kubelet[1447]: I0715 11:33:03.772753 1447 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 15 11:33:03.773009 kubelet[1447]: I0715 11:33:03.772791 1447 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.0.0.93","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Jul 15 11:33:03.773157 kubelet[1447]: I0715 11:33:03.773027 1447 topology_manager.go:138] "Creating topology manager with none policy" Jul 15 11:33:03.773157 kubelet[1447]: I0715 11:33:03.773039 1447 container_manager_linux.go:300] "Creating device plugin manager" Jul 15 11:33:03.773251 kubelet[1447]: I0715 11:33:03.773188 1447 state_mem.go:36] "Initialized new in-memory state store" Jul 15 11:33:03.776488 kubelet[1447]: I0715 11:33:03.776459 1447 kubelet.go:408] "Attempting to sync node with API server" Jul 15 11:33:03.776556 kubelet[1447]: I0715 11:33:03.776496 1447 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 15 11:33:03.776593 kubelet[1447]: I0715 11:33:03.776560 1447 kubelet.go:314] "Adding apiserver pod source" Jul 15 11:33:03.776632 kubelet[1447]: I0715 11:33:03.776591 1447 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 15 11:33:03.776730 kubelet[1447]: E0715 11:33:03.776687 1447 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:03.776730 kubelet[1447]: E0715 11:33:03.776701 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:03.780511 kubelet[1447]: W0715 11:33:03.780488 1447 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "10.0.0.93" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Jul 15 11:33:03.780585 kubelet[1447]: E0715 11:33:03.780528 1447 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes \"10.0.0.93\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" Jul 15 11:33:03.781639 kubelet[1447]: I0715 11:33:03.781619 1447 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 15 11:33:03.782092 kubelet[1447]: I0715 11:33:03.782074 1447 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Jul 15 11:33:03.782169 kubelet[1447]: W0715 11:33:03.782160 1447 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Jul 15 11:33:03.784121 kubelet[1447]: W0715 11:33:03.784098 1447 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Jul 15 11:33:03.784199 kubelet[1447]: E0715 11:33:03.784147 1447 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" Jul 15 11:33:03.784333 kubelet[1447]: I0715 11:33:03.784306 1447 server.go:1274] "Started kubelet" Jul 15 11:33:03.784402 kubelet[1447]: I0715 11:33:03.784378 1447 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Jul 15 11:33:03.785695 kubelet[1447]: I0715 11:33:03.785656 1447 server.go:449] "Adding debug handlers to kubelet server" Jul 15 11:33:03.784000 audit[1447]: AVC avc: denied { mac_admin } for pid=1447 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.784000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 15 11:33:03.784000 audit[1447]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b068a0 a1=c000289680 a2=c000b06870 a3=25 items=0 ppid=1 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:03.784000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 15 11:33:03.784000 audit[1447]: AVC avc: denied { mac_admin } for pid=1447 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:03.784000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 15 11:33:03.784000 audit[1447]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0004832e0 a1=c000289698 a2=c000b06930 a3=25 items=0 ppid=1 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:03.784000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 15 11:33:03.786370 kubelet[1447]: I0715 11:33:03.785970 1447 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Jul 15 11:33:03.786370 kubelet[1447]: I0715 11:33:03.786058 1447 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Jul 15 11:33:03.786370 kubelet[1447]: I0715 11:33:03.786170 1447 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 15 11:33:03.786545 kubelet[1447]: I0715 11:33:03.786511 1447 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Jul 15 11:33:03.786739 kubelet[1447]: I0715 11:33:03.786704 1447 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 15 11:33:03.786957 kubelet[1447]: I0715 11:33:03.786936 1447 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Jul 15 11:33:03.788858 kubelet[1447]: E0715 11:33:03.788833 1447 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.93\" not found" Jul 15 11:33:03.788952 kubelet[1447]: I0715 11:33:03.788871 1447 volume_manager.go:289] "Starting Kubelet Volume Manager" Jul 15 11:33:03.789100 kubelet[1447]: I0715 11:33:03.789072 1447 desired_state_of_world_populator.go:147] "Desired state populator starts to run" Jul 15 11:33:03.789164 kubelet[1447]: I0715 11:33:03.789126 1447 reconciler.go:26] "Reconciler: start to sync state" Jul 15 11:33:03.789792 kubelet[1447]: I0715 11:33:03.789759 1447 factory.go:221] Registration of the systemd container factory successfully Jul 15 11:33:03.789852 kubelet[1447]: I0715 11:33:03.789833 1447 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Jul 15 11:33:03.790886 kubelet[1447]: I0715 11:33:03.790865 1447 factory.go:221] Registration of the containerd container factory successfully Jul 15 11:33:03.798512 kubelet[1447]: E0715 11:33:03.798482 1447 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Jul 15 11:33:03.800561 kubelet[1447]: W0715 11:33:03.800529 1447 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Jul 15 11:33:03.800619 kubelet[1447]: E0715 11:33:03.800582 1447 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User \"system:anonymous\" cannot list resource \"csidrivers\" in API group \"storage.k8s.io\" at the cluster scope" logger="UnhandledError" Jul 15 11:33:03.805191 kubelet[1447]: I0715 11:33:03.805164 1447 cpu_manager.go:214] "Starting CPU manager" policy="none" Jul 15 11:33:03.805191 kubelet[1447]: I0715 11:33:03.805188 1447 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Jul 15 11:33:03.805293 kubelet[1447]: I0715 11:33:03.805214 1447 state_mem.go:36] "Initialized new in-memory state store" Jul 15 11:33:03.819000 audit[1464]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1464 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:03.819000 audit[1464]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffefaa70500 a2=0 a3=7ffefaa704ec items=0 ppid=1447 pid=1464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:03.819000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 15 11:33:03.820000 audit[1469]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1469 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:03.820000 audit[1469]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffe2840df30 a2=0 a3=7ffe2840df1c items=0 ppid=1447 pid=1469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:03.820000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 15 11:33:03.839302 kubelet[1447]: E0715 11:33:03.839233 1447 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.0.0.93\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Jul 15 11:33:03.889979 kubelet[1447]: E0715 11:33:03.889923 1447 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.93\" not found" Jul 15 11:33:03.991093 kubelet[1447]: E0715 11:33:03.990912 1447 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.93\" not found" Jul 15 11:33:04.043643 kubelet[1447]: E0715 11:33:04.043577 1447 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.0.0.93\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="400ms" Jul 15 11:33:04.091183 kubelet[1447]: E0715 11:33:04.091140 1447 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.93\" not found" Jul 15 11:33:04.191858 kubelet[1447]: E0715 11:33:04.191781 1447 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.93\" not found" Jul 15 11:33:04.292784 kubelet[1447]: E0715 11:33:04.292613 1447 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.93\" not found" Jul 15 11:33:04.393313 kubelet[1447]: E0715 11:33:04.393226 1447 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.93\" not found" Jul 15 11:33:03.822000 audit[1471]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1471 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:03.822000 audit[1471]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffed6eaa930 a2=0 a3=7ffed6eaa91c items=0 ppid=1447 pid=1471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:03.822000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 15 11:33:04.394000 audit[1476]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1476 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:04.394000 audit[1476]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffda63c6f80 a2=0 a3=7ffda63c6f6c items=0 ppid=1447 pid=1476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:04.394000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 15 11:33:04.398216 kubelet[1447]: I0715 11:33:04.398109 1447 policy_none.go:49] "None policy: Start" Jul 15 11:33:04.398591 kubelet[1447]: E0715 11:33:03.839234 1447 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.0.0.93.1852697b6a34b111 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.0.0.93,UID:10.0.0.93,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:10.0.0.93,},FirstTimestamp:2025-07-15 11:33:03.784276241 +0000 UTC m=+0.510493919,LastTimestamp:2025-07-15 11:33:03.784276241 +0000 UTC m=+0.510493919,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.0.0.93,}" Jul 15 11:33:04.399731 kubelet[1447]: I0715 11:33:04.399709 1447 memory_manager.go:170] "Starting memorymanager" policy="None" Jul 15 11:33:04.399848 kubelet[1447]: I0715 11:33:04.399741 1447 state_mem.go:35] "Initializing new in-memory state store" Jul 15 11:33:04.408916 systemd[1]: Created slice kubepods.slice. Jul 15 11:33:04.413802 systemd[1]: Created slice kubepods-burstable.slice. Jul 15 11:33:04.416954 systemd[1]: Created slice kubepods-besteffort.slice. Jul 15 11:33:04.423163 kubelet[1447]: I0715 11:33:04.423102 1447 manager.go:513] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Jul 15 11:33:04.423000 audit[1447]: AVC avc: denied { mac_admin } for pid=1447 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:04.423000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 15 11:33:04.423000 audit[1447]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0007d6660 a1=c000d188d0 a2=c0007d6630 a3=25 items=0 ppid=1 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:04.423000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 15 11:33:04.423790 kubelet[1447]: I0715 11:33:04.423219 1447 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Jul 15 11:33:04.423790 kubelet[1447]: I0715 11:33:04.423474 1447 eviction_manager.go:189] "Eviction manager: starting control loop" Jul 15 11:33:04.423790 kubelet[1447]: I0715 11:33:04.423497 1447 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Jul 15 11:33:04.425017 kubelet[1447]: I0715 11:33:04.424310 1447 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 15 11:33:04.425364 kubelet[1447]: E0715 11:33:04.425327 1447 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.93\" not found" Jul 15 11:33:04.434000 audit[1481]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1481 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:04.434000 audit[1481]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffedbc1a320 a2=0 a3=7ffedbc1a30c items=0 ppid=1447 pid=1481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:04.434000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Jul 15 11:33:04.436096 kubelet[1447]: I0715 11:33:04.435968 1447 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Jul 15 11:33:04.435000 audit[1482]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1482 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:04.435000 audit[1482]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff8a74b7c0 a2=0 a3=7fff8a74b7ac items=0 ppid=1447 pid=1482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:04.435000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 15 11:33:04.437293 kubelet[1447]: I0715 11:33:04.437274 1447 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Jul 15 11:33:04.437330 kubelet[1447]: I0715 11:33:04.437312 1447 status_manager.go:217] "Starting to sync pod status with apiserver" Jul 15 11:33:04.437357 kubelet[1447]: I0715 11:33:04.437351 1447 kubelet.go:2321] "Starting kubelet main sync loop" Jul 15 11:33:04.437424 kubelet[1447]: E0715 11:33:04.437404 1447 kubelet.go:2345] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Jul 15 11:33:04.436000 audit[1483]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1483 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:04.436000 audit[1483]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe1c1a0310 a2=0 a3=7ffe1c1a02fc items=0 ppid=1447 pid=1483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:04.436000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 15 11:33:04.436000 audit[1484]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1484 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:04.436000 audit[1484]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd91b90dc0 a2=0 a3=7ffd91b90dac items=0 ppid=1447 pid=1484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:04.436000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 15 11:33:04.438000 audit[1485]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1485 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:04.438000 audit[1485]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd45332fd0 a2=0 a3=7ffd45332fbc items=0 ppid=1447 pid=1485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:04.438000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 15 11:33:04.438000 audit[1486]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1486 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:04.438000 audit[1486]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffca996fd80 a2=0 a3=10e3 items=0 ppid=1447 pid=1486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:04.438000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 15 11:33:04.439000 audit[1487]: NETFILTER_CFG table=filter:12 family=10 entries=2 op=nft_register_chain pid=1487 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:04.439000 audit[1487]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffccd73b90 a2=0 a3=7fffccd73b7c items=0 ppid=1447 pid=1487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:04.439000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 15 11:33:04.439000 audit[1488]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_chain pid=1488 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:04.439000 audit[1488]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd2e92ba60 a2=0 a3=7ffd2e92ba4c items=0 ppid=1447 pid=1488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:04.439000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 15 11:33:04.447329 kubelet[1447]: E0715 11:33:04.447282 1447 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.0.0.93\" not found" node="10.0.0.93" Jul 15 11:33:04.525497 kubelet[1447]: I0715 11:33:04.525451 1447 kubelet_node_status.go:72] "Attempting to register node" node="10.0.0.93" Jul 15 11:33:04.530634 kubelet[1447]: I0715 11:33:04.530592 1447 kubelet_node_status.go:75] "Successfully registered node" node="10.0.0.93" Jul 15 11:33:04.530634 kubelet[1447]: E0715 11:33:04.530631 1447 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"10.0.0.93\": node \"10.0.0.93\" not found" Jul 15 11:33:04.543145 kubelet[1447]: E0715 11:33:04.543034 1447 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.93\" not found" Jul 15 11:33:04.643249 kubelet[1447]: E0715 11:33:04.643172 1447 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.93\" not found" Jul 15 11:33:04.735903 kubelet[1447]: I0715 11:33:04.735857 1447 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Jul 15 11:33:04.736096 kubelet[1447]: W0715 11:33:04.735994 1447 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Jul 15 11:33:04.736096 kubelet[1447]: W0715 11:33:04.736029 1447 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.Node ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Jul 15 11:33:04.744508 kubelet[1447]: I0715 11:33:04.744479 1447 kuberuntime_manager.go:1635] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Jul 15 11:33:04.744872 env[1204]: time="2025-07-15T11:33:04.744800562Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Jul 15 11:33:04.745290 kubelet[1447]: I0715 11:33:04.744983 1447 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Jul 15 11:33:04.776892 kubelet[1447]: I0715 11:33:04.776843 1447 apiserver.go:52] "Watching apiserver" Jul 15 11:33:04.777058 kubelet[1447]: E0715 11:33:04.776923 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:04.781603 kubelet[1447]: E0715 11:33:04.781576 1447 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hr46c" podUID="9b48e368-c013-407a-bd57-d9a453d3ba47" Jul 15 11:33:04.787048 systemd[1]: Created slice kubepods-besteffort-podc56d2ed0_a15c_415e_9fc1_b31c7fa0bd54.slice. Jul 15 11:33:04.790553 kubelet[1447]: I0715 11:33:04.790517 1447 desired_state_of_world_populator.go:155] "Finished populating initial desired state of world" Jul 15 11:33:04.796084 kubelet[1447]: I0715 11:33:04.795535 1447 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/ca5f000d-b92e-4351-a3f9-00a801e87bf9-cni-bin-dir\") pod \"calico-node-52jh6\" (UID: \"ca5f000d-b92e-4351-a3f9-00a801e87bf9\") " pod="calico-system/calico-node-52jh6" Jul 15 11:33:04.796084 kubelet[1447]: I0715 11:33:04.795578 1447 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/ca5f000d-b92e-4351-a3f9-00a801e87bf9-tigera-ca-bundle\") pod \"calico-node-52jh6\" (UID: \"ca5f000d-b92e-4351-a3f9-00a801e87bf9\") " pod="calico-system/calico-node-52jh6" Jul 15 11:33:04.796084 kubelet[1447]: I0715 11:33:04.795629 1447 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/c56d2ed0-a15c-415e-9fc1-b31c7fa0bd54-xtables-lock\") pod \"kube-proxy-2trb6\" (UID: \"c56d2ed0-a15c-415e-9fc1-b31c7fa0bd54\") " pod="kube-system/kube-proxy-2trb6" Jul 15 11:33:04.796084 kubelet[1447]: I0715 11:33:04.795646 1447 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/ca5f000d-b92e-4351-a3f9-00a801e87bf9-node-certs\") pod \"calico-node-52jh6\" (UID: \"ca5f000d-b92e-4351-a3f9-00a801e87bf9\") " pod="calico-system/calico-node-52jh6" Jul 15 11:33:04.796084 kubelet[1447]: I0715 11:33:04.795659 1447 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/9b48e368-c013-407a-bd57-d9a453d3ba47-socket-dir\") pod \"csi-node-driver-hr46c\" (UID: \"9b48e368-c013-407a-bd57-d9a453d3ba47\") " pod="calico-system/csi-node-driver-hr46c" Jul 15 11:33:04.795882 systemd[1]: Created slice kubepods-besteffort-podca5f000d_b92e_4351_a3f9_00a801e87bf9.slice. Jul 15 11:33:04.796743 kubelet[1447]: I0715 11:33:04.795671 1447 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/9b48e368-c013-407a-bd57-d9a453d3ba47-varrun\") pod \"csi-node-driver-hr46c\" (UID: \"9b48e368-c013-407a-bd57-d9a453d3ba47\") " pod="calico-system/csi-node-driver-hr46c" Jul 15 11:33:04.796743 kubelet[1447]: I0715 11:33:04.795685 1447 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lb98r\" (UniqueName: \"kubernetes.io/projected/9b48e368-c013-407a-bd57-d9a453d3ba47-kube-api-access-lb98r\") pod \"csi-node-driver-hr46c\" (UID: \"9b48e368-c013-407a-bd57-d9a453d3ba47\") " pod="calico-system/csi-node-driver-hr46c" Jul 15 11:33:04.796743 kubelet[1447]: I0715 11:33:04.795699 1447 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/c56d2ed0-a15c-415e-9fc1-b31c7fa0bd54-lib-modules\") pod \"kube-proxy-2trb6\" (UID: \"c56d2ed0-a15c-415e-9fc1-b31c7fa0bd54\") " pod="kube-system/kube-proxy-2trb6" Jul 15 11:33:04.796743 kubelet[1447]: I0715 11:33:04.795712 1447 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9bw4l\" (UniqueName: \"kubernetes.io/projected/c56d2ed0-a15c-415e-9fc1-b31c7fa0bd54-kube-api-access-9bw4l\") pod \"kube-proxy-2trb6\" (UID: \"c56d2ed0-a15c-415e-9fc1-b31c7fa0bd54\") " pod="kube-system/kube-proxy-2trb6" Jul 15 11:33:04.796743 kubelet[1447]: I0715 11:33:04.795725 1447 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/ca5f000d-b92e-4351-a3f9-00a801e87bf9-cni-log-dir\") pod \"calico-node-52jh6\" (UID: \"ca5f000d-b92e-4351-a3f9-00a801e87bf9\") " pod="calico-system/calico-node-52jh6" Jul 15 11:33:04.796907 kubelet[1447]: I0715 11:33:04.795738 1447 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/ca5f000d-b92e-4351-a3f9-00a801e87bf9-var-lib-calico\") pod \"calico-node-52jh6\" (UID: \"ca5f000d-b92e-4351-a3f9-00a801e87bf9\") " pod="calico-system/calico-node-52jh6" Jul 15 11:33:04.796907 kubelet[1447]: I0715 11:33:04.795750 1447 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/c56d2ed0-a15c-415e-9fc1-b31c7fa0bd54-kube-proxy\") pod \"kube-proxy-2trb6\" (UID: \"c56d2ed0-a15c-415e-9fc1-b31c7fa0bd54\") " pod="kube-system/kube-proxy-2trb6" Jul 15 11:33:04.796907 kubelet[1447]: I0715 11:33:04.795780 1447 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mnvpl\" (UniqueName: \"kubernetes.io/projected/ca5f000d-b92e-4351-a3f9-00a801e87bf9-kube-api-access-mnvpl\") pod \"calico-node-52jh6\" (UID: \"ca5f000d-b92e-4351-a3f9-00a801e87bf9\") " pod="calico-system/calico-node-52jh6" Jul 15 11:33:04.796907 kubelet[1447]: I0715 11:33:04.795792 1447 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/9b48e368-c013-407a-bd57-d9a453d3ba47-kubelet-dir\") pod \"csi-node-driver-hr46c\" (UID: \"9b48e368-c013-407a-bd57-d9a453d3ba47\") " pod="calico-system/csi-node-driver-hr46c" Jul 15 11:33:04.796907 kubelet[1447]: I0715 11:33:04.795805 1447 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/ca5f000d-b92e-4351-a3f9-00a801e87bf9-cni-net-dir\") pod \"calico-node-52jh6\" (UID: \"ca5f000d-b92e-4351-a3f9-00a801e87bf9\") " pod="calico-system/calico-node-52jh6" Jul 15 11:33:04.797067 kubelet[1447]: I0715 11:33:04.795820 1447 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/ca5f000d-b92e-4351-a3f9-00a801e87bf9-flexvol-driver-host\") pod \"calico-node-52jh6\" (UID: \"ca5f000d-b92e-4351-a3f9-00a801e87bf9\") " pod="calico-system/calico-node-52jh6" Jul 15 11:33:04.797067 kubelet[1447]: I0715 11:33:04.795833 1447 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/ca5f000d-b92e-4351-a3f9-00a801e87bf9-lib-modules\") pod \"calico-node-52jh6\" (UID: \"ca5f000d-b92e-4351-a3f9-00a801e87bf9\") " pod="calico-system/calico-node-52jh6" Jul 15 11:33:04.797067 kubelet[1447]: I0715 11:33:04.795844 1447 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/ca5f000d-b92e-4351-a3f9-00a801e87bf9-policysync\") pod \"calico-node-52jh6\" (UID: \"ca5f000d-b92e-4351-a3f9-00a801e87bf9\") " pod="calico-system/calico-node-52jh6" Jul 15 11:33:04.797067 kubelet[1447]: I0715 11:33:04.795859 1447 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/ca5f000d-b92e-4351-a3f9-00a801e87bf9-var-run-calico\") pod \"calico-node-52jh6\" (UID: \"ca5f000d-b92e-4351-a3f9-00a801e87bf9\") " pod="calico-system/calico-node-52jh6" Jul 15 11:33:04.797067 kubelet[1447]: I0715 11:33:04.795874 1447 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/ca5f000d-b92e-4351-a3f9-00a801e87bf9-xtables-lock\") pod \"calico-node-52jh6\" (UID: \"ca5f000d-b92e-4351-a3f9-00a801e87bf9\") " pod="calico-system/calico-node-52jh6" Jul 15 11:33:04.797252 kubelet[1447]: I0715 11:33:04.795885 1447 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/9b48e368-c013-407a-bd57-d9a453d3ba47-registration-dir\") pod \"csi-node-driver-hr46c\" (UID: \"9b48e368-c013-407a-bd57-d9a453d3ba47\") " pod="calico-system/csi-node-driver-hr46c" Jul 15 11:33:04.898015 kubelet[1447]: I0715 11:33:04.897966 1447 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Jul 15 11:33:04.898958 kubelet[1447]: E0715 11:33:04.898904 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:04.898958 kubelet[1447]: W0715 11:33:04.898926 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:04.898958 kubelet[1447]: E0715 11:33:04.898950 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:04.901667 kubelet[1447]: E0715 11:33:04.901641 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:04.901667 kubelet[1447]: W0715 11:33:04.901661 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:04.901851 kubelet[1447]: E0715 11:33:04.901678 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:04.936000 audit[1340]: USER_END pid=1340 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:33:04.936000 audit[1340]: CRED_DISP pid=1340 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:33:04.938822 kubelet[1447]: E0715 11:33:04.935654 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:04.938822 kubelet[1447]: W0715 11:33:04.935679 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:04.938822 kubelet[1447]: E0715 11:33:04.935731 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:04.938822 kubelet[1447]: E0715 11:33:04.936550 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:04.938822 kubelet[1447]: W0715 11:33:04.936563 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:04.938822 kubelet[1447]: E0715 11:33:04.936576 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:04.937845 sudo[1340]: pam_unix(sudo:session): session closed for user root Jul 15 11:33:04.943951 kubelet[1447]: E0715 11:33:04.943624 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:04.943951 kubelet[1447]: W0715 11:33:04.943656 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:04.943951 kubelet[1447]: E0715 11:33:04.943679 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:04.944093 sshd[1337]: pam_unix(sshd:session): session closed for user core Jul 15 11:33:04.944000 audit[1337]: USER_END pid=1337 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:33:04.945000 audit[1337]: CRED_DISP pid=1337 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:33:04.948145 systemd[1]: sshd@6-10.0.0.93:22-10.0.0.1:36122.service: Deactivated successfully. Jul 15 11:33:04.947000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.93:22-10.0.0.1:36122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:04.949168 systemd[1]: session-7.scope: Deactivated successfully. Jul 15 11:33:04.949872 systemd-logind[1192]: Session 7 logged out. Waiting for processes to exit. Jul 15 11:33:04.950787 systemd-logind[1192]: Removed session 7. Jul 15 11:33:05.094771 kubelet[1447]: E0715 11:33:05.094635 1447 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 15 11:33:05.095555 env[1204]: time="2025-07-15T11:33:05.095515851Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-2trb6,Uid:c56d2ed0-a15c-415e-9fc1-b31c7fa0bd54,Namespace:kube-system,Attempt:0,}" Jul 15 11:33:05.099227 env[1204]: time="2025-07-15T11:33:05.099190124Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-52jh6,Uid:ca5f000d-b92e-4351-a3f9-00a801e87bf9,Namespace:calico-system,Attempt:0,}" Jul 15 11:33:05.777890 kubelet[1447]: E0715 11:33:05.777847 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:06.438405 kubelet[1447]: E0715 11:33:06.438342 1447 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hr46c" podUID="9b48e368-c013-407a-bd57-d9a453d3ba47" Jul 15 11:33:06.648628 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2003752238.mount: Deactivated successfully. Jul 15 11:33:06.659078 env[1204]: time="2025-07-15T11:33:06.659042262Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:06.661525 env[1204]: time="2025-07-15T11:33:06.661493963Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:06.662508 env[1204]: time="2025-07-15T11:33:06.662468369Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:06.664841 env[1204]: time="2025-07-15T11:33:06.664800871Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:06.666713 env[1204]: time="2025-07-15T11:33:06.666685471Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:06.668254 env[1204]: time="2025-07-15T11:33:06.668177806Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:06.670528 env[1204]: time="2025-07-15T11:33:06.670496152Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:06.671845 env[1204]: time="2025-07-15T11:33:06.671800111Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:06.690711 env[1204]: time="2025-07-15T11:33:06.690570068Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 15 11:33:06.690711 env[1204]: time="2025-07-15T11:33:06.690619056Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 15 11:33:06.690711 env[1204]: time="2025-07-15T11:33:06.690668319Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 15 11:33:06.690938 env[1204]: time="2025-07-15T11:33:06.690888424Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/74667e945dec53aff7fa5870eaf84eabfdeea583be90c7a350d1e45628781265 pid=1508 runtime=io.containerd.runc.v2 Jul 15 11:33:06.699446 env[1204]: time="2025-07-15T11:33:06.698961750Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 15 11:33:06.699446 env[1204]: time="2025-07-15T11:33:06.699054265Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 15 11:33:06.699446 env[1204]: time="2025-07-15T11:33:06.699082934Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 15 11:33:06.699709 env[1204]: time="2025-07-15T11:33:06.699665581Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4f416aa192b09be3bd7ea52df45841600f78ccb9e3ef91f961937ddd8dd3851f pid=1524 runtime=io.containerd.runc.v2 Jul 15 11:33:06.711260 systemd[1]: Started cri-containerd-74667e945dec53aff7fa5870eaf84eabfdeea583be90c7a350d1e45628781265.scope. Jul 15 11:33:06.756547 systemd[1]: Started cri-containerd-4f416aa192b09be3bd7ea52df45841600f78ccb9e3ef91f961937ddd8dd3851f.scope. Jul 15 11:33:06.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.769000 audit: BPF prog-id=55 op=LOAD Jul 15 11:33:06.769000 audit[1529]: AVC avc: denied { bpf } for pid=1529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.769000 audit[1529]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=1508 pid=1529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:06.769000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734363637653934356465633533616666376661353837306561663834 Jul 15 11:33:06.770000 audit[1529]: AVC avc: denied { perfmon } for pid=1529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.770000 audit[1529]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019f6b0 a2=3c a3=c items=0 ppid=1508 pid=1529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:06.770000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734363637653934356465633533616666376661353837306561663834 Jul 15 11:33:06.770000 audit[1529]: AVC avc: denied { bpf } for pid=1529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.770000 audit[1529]: AVC avc: denied { bpf } for pid=1529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.770000 audit[1529]: AVC avc: denied { bpf } for pid=1529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.770000 audit[1529]: AVC avc: denied { perfmon } for pid=1529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.770000 audit[1529]: AVC avc: denied { perfmon } for pid=1529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.770000 audit[1529]: AVC avc: denied { perfmon } for pid=1529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.770000 audit[1529]: AVC avc: denied { perfmon } for pid=1529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.770000 audit[1529]: AVC avc: denied { perfmon } for pid=1529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.770000 audit[1529]: AVC avc: denied { bpf } for pid=1529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.770000 audit[1529]: AVC avc: denied { bpf } for pid=1529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.770000 audit: BPF prog-id=56 op=LOAD Jul 15 11:33:06.770000 audit[1529]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019f9d8 a2=78 a3=c000330b90 items=0 ppid=1508 pid=1529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:06.770000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734363637653934356465633533616666376661353837306561663834 Jul 15 11:33:06.771000 audit[1529]: AVC avc: denied { bpf } for pid=1529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.771000 audit[1529]: AVC avc: denied { bpf } for pid=1529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.771000 audit[1529]: AVC avc: denied { perfmon } for pid=1529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.771000 audit[1529]: AVC avc: denied { perfmon } for pid=1529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.771000 audit[1529]: AVC avc: denied { perfmon } for pid=1529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.771000 audit[1529]: AVC avc: denied { perfmon } for pid=1529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.771000 audit[1529]: AVC avc: denied { perfmon } for pid=1529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.771000 audit[1529]: AVC avc: denied { bpf } for pid=1529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.771000 audit[1529]: AVC avc: denied { bpf } for pid=1529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.771000 audit: BPF prog-id=57 op=LOAD Jul 15 11:33:06.771000 audit[1529]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019f770 a2=78 a3=c000330bd8 items=0 ppid=1508 pid=1529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:06.771000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734363637653934356465633533616666376661353837306561663834 Jul 15 11:33:06.771000 audit: BPF prog-id=57 op=UNLOAD Jul 15 11:33:06.771000 audit: BPF prog-id=56 op=UNLOAD Jul 15 11:33:06.771000 audit[1529]: AVC avc: denied { bpf } for pid=1529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.771000 audit[1529]: AVC avc: denied { bpf } for pid=1529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.771000 audit[1529]: AVC avc: denied { bpf } for pid=1529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.771000 audit[1529]: AVC avc: denied { perfmon } for pid=1529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.771000 audit[1529]: AVC avc: denied { perfmon } for pid=1529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.771000 audit[1529]: AVC avc: denied { perfmon } for pid=1529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.771000 audit[1529]: AVC avc: denied { perfmon } for pid=1529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.771000 audit[1529]: AVC avc: denied { perfmon } for pid=1529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.771000 audit[1529]: AVC avc: denied { bpf } for pid=1529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.771000 audit[1529]: AVC avc: denied { bpf } for pid=1529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.771000 audit: BPF prog-id=58 op=LOAD Jul 15 11:33:06.771000 audit[1529]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019fc30 a2=78 a3=c000330fe8 items=0 ppid=1508 pid=1529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:06.771000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734363637653934356465633533616666376661353837306561663834 Jul 15 11:33:06.778022 kubelet[1447]: E0715 11:33:06.777988 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:06.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.784000 audit: BPF prog-id=59 op=LOAD Jul 15 11:33:06.784000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.784000 audit[1540]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1524 pid=1540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:06.784000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466343136616131393262303962653362643765613532646634353834 Jul 15 11:33:06.784000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.784000 audit[1540]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1524 pid=1540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:06.784000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466343136616131393262303962653362643765613532646634353834 Jul 15 11:33:06.784000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.784000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.784000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.784000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.784000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.784000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.784000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.784000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.784000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.784000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.784000 audit: BPF prog-id=60 op=LOAD Jul 15 11:33:06.784000 audit[1540]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000182360 items=0 ppid=1524 pid=1540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:06.784000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466343136616131393262303962653362643765613532646634353834 Jul 15 11:33:06.784000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.784000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.784000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.784000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.784000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.784000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.784000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.784000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.784000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.784000 audit: BPF prog-id=61 op=LOAD Jul 15 11:33:06.784000 audit[1540]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0001823a8 items=0 ppid=1524 pid=1540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:06.784000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466343136616131393262303962653362643765613532646634353834 Jul 15 11:33:06.784000 audit: BPF prog-id=61 op=UNLOAD Jul 15 11:33:06.784000 audit: BPF prog-id=60 op=UNLOAD Jul 15 11:33:06.784000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.784000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.784000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.784000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.784000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.784000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.784000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.784000 audit[1540]: AVC avc: denied { perfmon } for pid=1540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.784000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.784000 audit[1540]: AVC avc: denied { bpf } for pid=1540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:06.784000 audit: BPF prog-id=62 op=LOAD Jul 15 11:33:06.784000 audit[1540]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0001827b8 items=0 ppid=1524 pid=1540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:06.784000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466343136616131393262303962653362643765613532646634353834 Jul 15 11:33:06.794009 env[1204]: time="2025-07-15T11:33:06.793950169Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-2trb6,Uid:c56d2ed0-a15c-415e-9fc1-b31c7fa0bd54,Namespace:kube-system,Attempt:0,} returns sandbox id \"74667e945dec53aff7fa5870eaf84eabfdeea583be90c7a350d1e45628781265\"" Jul 15 11:33:06.795945 kubelet[1447]: E0715 11:33:06.795095 1447 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 15 11:33:06.796100 env[1204]: time="2025-07-15T11:33:06.796053567Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-52jh6,Uid:ca5f000d-b92e-4351-a3f9-00a801e87bf9,Namespace:calico-system,Attempt:0,} returns sandbox id \"4f416aa192b09be3bd7ea52df45841600f78ccb9e3ef91f961937ddd8dd3851f\"" Jul 15 11:33:06.797244 env[1204]: time="2025-07-15T11:33:06.797220067Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.10\"" Jul 15 11:33:07.778590 kubelet[1447]: E0715 11:33:07.778514 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:08.438268 kubelet[1447]: E0715 11:33:08.438197 1447 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hr46c" podUID="9b48e368-c013-407a-bd57-d9a453d3ba47" Jul 15 11:33:08.703981 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount315826108.mount: Deactivated successfully. Jul 15 11:33:08.778779 kubelet[1447]: E0715 11:33:08.778733 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:09.779158 kubelet[1447]: E0715 11:33:09.779043 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:10.193942 env[1204]: time="2025-07-15T11:33:10.193788964Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:10.195908 env[1204]: time="2025-07-15T11:33:10.195868085Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3ed600862d3e69931e0f9f4dbf5c2b46343af40aa079772434f13de771bdc30c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:10.197405 env[1204]: time="2025-07-15T11:33:10.197368959Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:10.198809 env[1204]: time="2025-07-15T11:33:10.198764853Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:bcbb293812bdf587b28ea98369a8c347ca84884160046296761acdf12b27029d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:10.199264 env[1204]: time="2025-07-15T11:33:10.199216574Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.10\" returns image reference \"sha256:3ed600862d3e69931e0f9f4dbf5c2b46343af40aa079772434f13de771bdc30c\"" Jul 15 11:33:10.200461 env[1204]: time="2025-07-15T11:33:10.200411566Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2\"" Jul 15 11:33:10.201613 env[1204]: time="2025-07-15T11:33:10.201579517Z" level=info msg="CreateContainer within sandbox \"74667e945dec53aff7fa5870eaf84eabfdeea583be90c7a350d1e45628781265\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Jul 15 11:33:10.220108 env[1204]: time="2025-07-15T11:33:10.220053647Z" level=info msg="CreateContainer within sandbox \"74667e945dec53aff7fa5870eaf84eabfdeea583be90c7a350d1e45628781265\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"ed37e4dc30859a42730e777fd0df712aa5b0e0217994191e71969992e925e5ca\"" Jul 15 11:33:10.220793 env[1204]: time="2025-07-15T11:33:10.220760656Z" level=info msg="StartContainer for \"ed37e4dc30859a42730e777fd0df712aa5b0e0217994191e71969992e925e5ca\"" Jul 15 11:33:10.248315 systemd[1]: run-containerd-runc-k8s.io-ed37e4dc30859a42730e777fd0df712aa5b0e0217994191e71969992e925e5ca-runc.4nqavX.mount: Deactivated successfully. Jul 15 11:33:10.252498 systemd[1]: Started cri-containerd-ed37e4dc30859a42730e777fd0df712aa5b0e0217994191e71969992e925e5ca.scope. Jul 15 11:33:10.331000 audit[1588]: AVC avc: denied { perfmon } for pid=1588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:10.344671 kernel: kauditd_printk_skb: 340 callbacks suppressed Jul 15 11:33:10.344803 kernel: audit: type=1400 audit(1752579190.331:455): avc: denied { perfmon } for pid=1588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:10.344829 kernel: audit: type=1300 audit(1752579190.331:455): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f4fb608bda8 items=0 ppid=1508 pid=1588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.344845 kernel: audit: type=1327 audit(1752579190.331:455): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564333765346463333038353961343237333065373737666430646637 Jul 15 11:33:10.331000 audit[1588]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f4fb608bda8 items=0 ppid=1508 pid=1588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.331000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564333765346463333038353961343237333065373737666430646637 Jul 15 11:33:10.347842 kernel: audit: type=1400 audit(1752579190.331:456): avc: denied { bpf } for pid=1588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:10.331000 audit[1588]: AVC avc: denied { bpf } for pid=1588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:10.350969 kernel: audit: type=1400 audit(1752579190.331:456): avc: denied { bpf } for pid=1588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:10.331000 audit[1588]: AVC avc: denied { bpf } for pid=1588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:10.331000 audit[1588]: AVC avc: denied { bpf } for pid=1588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:10.353942 kernel: audit: type=1400 audit(1752579190.331:456): avc: denied { bpf } for pid=1588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:10.354001 kernel: audit: type=1400 audit(1752579190.331:456): avc: denied { perfmon } for pid=1588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:10.331000 audit[1588]: AVC avc: denied { perfmon } for pid=1588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:10.331000 audit[1588]: AVC avc: denied { perfmon } for pid=1588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:10.359787 kernel: audit: type=1400 audit(1752579190.331:456): avc: denied { perfmon } for pid=1588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:10.359864 kernel: audit: type=1400 audit(1752579190.331:456): avc: denied { perfmon } for pid=1588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:10.331000 audit[1588]: AVC avc: denied { perfmon } for pid=1588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:10.331000 audit[1588]: AVC avc: denied { perfmon } for pid=1588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:10.364627 env[1204]: time="2025-07-15T11:33:10.364585658Z" level=info msg="StartContainer for \"ed37e4dc30859a42730e777fd0df712aa5b0e0217994191e71969992e925e5ca\" returns successfully" Jul 15 11:33:10.365979 kernel: audit: type=1400 audit(1752579190.331:456): avc: denied { perfmon } for pid=1588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:10.331000 audit[1588]: AVC avc: denied { perfmon } for pid=1588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:10.331000 audit[1588]: AVC avc: denied { bpf } for pid=1588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:10.331000 audit[1588]: AVC avc: denied { bpf } for pid=1588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:10.331000 audit: BPF prog-id=63 op=LOAD Jul 15 11:33:10.331000 audit[1588]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003e24d8 items=0 ppid=1508 pid=1588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.331000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564333765346463333038353961343237333065373737666430646637 Jul 15 11:33:10.335000 audit[1588]: AVC avc: denied { bpf } for pid=1588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:10.335000 audit[1588]: AVC avc: denied { bpf } for pid=1588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:10.335000 audit[1588]: AVC avc: denied { perfmon } for pid=1588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:10.335000 audit[1588]: AVC avc: denied { perfmon } for pid=1588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:10.335000 audit[1588]: AVC avc: denied { perfmon } for pid=1588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:10.335000 audit[1588]: AVC avc: denied { perfmon } for pid=1588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:10.335000 audit[1588]: AVC avc: denied { perfmon } for pid=1588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:10.335000 audit[1588]: AVC avc: denied { bpf } for pid=1588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:10.335000 audit[1588]: AVC avc: denied { bpf } for pid=1588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:10.335000 audit: BPF prog-id=64 op=LOAD Jul 15 11:33:10.335000 audit[1588]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003e2528 items=0 ppid=1508 pid=1588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.335000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564333765346463333038353961343237333065373737666430646637 Jul 15 11:33:10.343000 audit: BPF prog-id=64 op=UNLOAD Jul 15 11:33:10.343000 audit: BPF prog-id=63 op=UNLOAD Jul 15 11:33:10.343000 audit[1588]: AVC avc: denied { bpf } for pid=1588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:10.343000 audit[1588]: AVC avc: denied { bpf } for pid=1588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:10.343000 audit[1588]: AVC avc: denied { bpf } for pid=1588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:10.343000 audit[1588]: AVC avc: denied { perfmon } for pid=1588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:10.343000 audit[1588]: AVC avc: denied { perfmon } for pid=1588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:10.343000 audit[1588]: AVC avc: denied { perfmon } for pid=1588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:10.343000 audit[1588]: AVC avc: denied { perfmon } for pid=1588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:10.343000 audit[1588]: AVC avc: denied { perfmon } for pid=1588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:10.343000 audit[1588]: AVC avc: denied { bpf } for pid=1588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:10.343000 audit[1588]: AVC avc: denied { bpf } for pid=1588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:10.343000 audit: BPF prog-id=65 op=LOAD Jul 15 11:33:10.343000 audit[1588]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003e25b8 items=0 ppid=1508 pid=1588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.343000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564333765346463333038353961343237333065373737666430646637 Jul 15 11:33:10.438472 kubelet[1447]: E0715 11:33:10.438395 1447 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hr46c" podUID="9b48e368-c013-407a-bd57-d9a453d3ba47" Jul 15 11:33:10.451635 kubelet[1447]: E0715 11:33:10.451523 1447 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 15 11:33:10.459447 kubelet[1447]: I0715 11:33:10.459369 1447 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-2trb6" podStartSLOduration=3.05574399 podStartE2EDuration="6.459336107s" podCreationTimestamp="2025-07-15 11:33:04 +0000 UTC" firstStartedPulling="2025-07-15 11:33:06.796637642 +0000 UTC m=+3.522855319" lastFinishedPulling="2025-07-15 11:33:10.200229759 +0000 UTC m=+6.926447436" observedRunningTime="2025-07-15 11:33:10.459165696 +0000 UTC m=+7.185383373" watchObservedRunningTime="2025-07-15 11:33:10.459336107 +0000 UTC m=+7.185553784" Jul 15 11:33:10.475000 audit[1649]: NETFILTER_CFG table=mangle:14 family=10 entries=1 op=nft_register_chain pid=1649 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:10.475000 audit[1649]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcaf79bc60 a2=0 a3=7ffcaf79bc4c items=0 ppid=1599 pid=1649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.475000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 15 11:33:10.475000 audit[1648]: NETFILTER_CFG table=mangle:15 family=2 entries=1 op=nft_register_chain pid=1648 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:10.475000 audit[1648]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd816b08d0 a2=0 a3=7ffd816b08bc items=0 ppid=1599 pid=1648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.475000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 15 11:33:10.477000 audit[1650]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=1650 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:10.477000 audit[1650]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff91511480 a2=0 a3=7fff9151146c items=0 ppid=1599 pid=1650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.477000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 15 11:33:10.477000 audit[1651]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=1651 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:10.477000 audit[1651]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdb058ea60 a2=0 a3=7ffdb058ea4c items=0 ppid=1599 pid=1651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.477000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 15 11:33:10.478000 audit[1652]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=1652 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:10.478000 audit[1652]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdf9678af0 a2=0 a3=7ffdf9678adc items=0 ppid=1599 pid=1652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.478000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 15 11:33:10.479000 audit[1653]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1653 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:10.479000 audit[1653]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe0f22b3d0 a2=0 a3=7ffe0f22b3bc items=0 ppid=1599 pid=1653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.479000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 15 11:33:10.528050 kubelet[1447]: E0715 11:33:10.527993 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:10.528050 kubelet[1447]: W0715 11:33:10.528028 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:10.528050 kubelet[1447]: E0715 11:33:10.528056 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:10.528397 kubelet[1447]: E0715 11:33:10.528378 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:10.528397 kubelet[1447]: W0715 11:33:10.528392 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:10.528493 kubelet[1447]: E0715 11:33:10.528404 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:10.528697 kubelet[1447]: E0715 11:33:10.528678 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:10.528697 kubelet[1447]: W0715 11:33:10.528692 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:10.528764 kubelet[1447]: E0715 11:33:10.528704 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:10.528915 kubelet[1447]: E0715 11:33:10.528898 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:10.528915 kubelet[1447]: W0715 11:33:10.528911 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:10.528977 kubelet[1447]: E0715 11:33:10.528922 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:10.529147 kubelet[1447]: E0715 11:33:10.529129 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:10.529147 kubelet[1447]: W0715 11:33:10.529144 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:10.529225 kubelet[1447]: E0715 11:33:10.529154 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:10.529350 kubelet[1447]: E0715 11:33:10.529332 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:10.529350 kubelet[1447]: W0715 11:33:10.529345 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:10.529431 kubelet[1447]: E0715 11:33:10.529355 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:10.529542 kubelet[1447]: E0715 11:33:10.529524 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:10.529542 kubelet[1447]: W0715 11:33:10.529537 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:10.529617 kubelet[1447]: E0715 11:33:10.529548 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:10.529735 kubelet[1447]: E0715 11:33:10.529718 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:10.529735 kubelet[1447]: W0715 11:33:10.529731 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:10.529786 kubelet[1447]: E0715 11:33:10.529743 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:10.529946 kubelet[1447]: E0715 11:33:10.529928 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:10.529946 kubelet[1447]: W0715 11:33:10.529941 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:10.530022 kubelet[1447]: E0715 11:33:10.529954 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:10.530174 kubelet[1447]: E0715 11:33:10.530157 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:10.530174 kubelet[1447]: W0715 11:33:10.530170 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:10.530243 kubelet[1447]: E0715 11:33:10.530180 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:10.530370 kubelet[1447]: E0715 11:33:10.530351 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:10.530370 kubelet[1447]: W0715 11:33:10.530365 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:10.530475 kubelet[1447]: E0715 11:33:10.530376 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:10.530576 kubelet[1447]: E0715 11:33:10.530558 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:10.530576 kubelet[1447]: W0715 11:33:10.530570 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:10.530643 kubelet[1447]: E0715 11:33:10.530580 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:10.530788 kubelet[1447]: E0715 11:33:10.530770 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:10.530788 kubelet[1447]: W0715 11:33:10.530783 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:10.530871 kubelet[1447]: E0715 11:33:10.530793 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:10.530961 kubelet[1447]: E0715 11:33:10.530946 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:10.530961 kubelet[1447]: W0715 11:33:10.530956 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:10.531029 kubelet[1447]: E0715 11:33:10.530967 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:10.531134 kubelet[1447]: E0715 11:33:10.531103 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:10.531134 kubelet[1447]: W0715 11:33:10.531111 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:10.531216 kubelet[1447]: E0715 11:33:10.531147 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:10.531318 kubelet[1447]: E0715 11:33:10.531302 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:10.531318 kubelet[1447]: W0715 11:33:10.531311 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:10.531318 kubelet[1447]: E0715 11:33:10.531319 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:10.531479 kubelet[1447]: E0715 11:33:10.531462 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:10.531479 kubelet[1447]: W0715 11:33:10.531472 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:10.531479 kubelet[1447]: E0715 11:33:10.531481 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:10.531640 kubelet[1447]: E0715 11:33:10.531625 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:10.531640 kubelet[1447]: W0715 11:33:10.531639 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:10.531688 kubelet[1447]: E0715 11:33:10.531649 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:10.531840 kubelet[1447]: E0715 11:33:10.531821 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:10.531840 kubelet[1447]: W0715 11:33:10.531834 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:10.531919 kubelet[1447]: E0715 11:33:10.531844 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:10.532010 kubelet[1447]: E0715 11:33:10.531994 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:10.532010 kubelet[1447]: W0715 11:33:10.532003 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:10.532010 kubelet[1447]: E0715 11:33:10.532011 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:10.538572 kubelet[1447]: E0715 11:33:10.538525 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:10.538572 kubelet[1447]: W0715 11:33:10.538555 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:10.538779 kubelet[1447]: E0715 11:33:10.538589 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:10.538919 kubelet[1447]: E0715 11:33:10.538882 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:10.538919 kubelet[1447]: W0715 11:33:10.538894 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:10.538919 kubelet[1447]: E0715 11:33:10.538909 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:10.539182 kubelet[1447]: E0715 11:33:10.539166 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:10.539182 kubelet[1447]: W0715 11:33:10.539179 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:10.539250 kubelet[1447]: E0715 11:33:10.539199 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:10.539402 kubelet[1447]: E0715 11:33:10.539387 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:10.539402 kubelet[1447]: W0715 11:33:10.539399 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:10.539454 kubelet[1447]: E0715 11:33:10.539413 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:10.539611 kubelet[1447]: E0715 11:33:10.539596 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:10.539646 kubelet[1447]: W0715 11:33:10.539610 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:10.539646 kubelet[1447]: E0715 11:33:10.539625 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:10.539847 kubelet[1447]: E0715 11:33:10.539828 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:10.539874 kubelet[1447]: W0715 11:33:10.539846 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:10.539874 kubelet[1447]: E0715 11:33:10.539862 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:10.540088 kubelet[1447]: E0715 11:33:10.540073 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:10.540136 kubelet[1447]: W0715 11:33:10.540087 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:10.540136 kubelet[1447]: E0715 11:33:10.540102 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:10.540336 kubelet[1447]: E0715 11:33:10.540316 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:10.540336 kubelet[1447]: W0715 11:33:10.540331 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:10.540405 kubelet[1447]: E0715 11:33:10.540347 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:10.540559 kubelet[1447]: E0715 11:33:10.540541 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:10.540559 kubelet[1447]: W0715 11:33:10.540554 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:10.540644 kubelet[1447]: E0715 11:33:10.540568 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:10.540762 kubelet[1447]: E0715 11:33:10.540743 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:10.540762 kubelet[1447]: W0715 11:33:10.540757 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:10.540830 kubelet[1447]: E0715 11:33:10.540774 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:10.540991 kubelet[1447]: E0715 11:33:10.540974 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:10.540991 kubelet[1447]: W0715 11:33:10.540986 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:10.540991 kubelet[1447]: E0715 11:33:10.540996 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:10.541360 kubelet[1447]: E0715 11:33:10.541343 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:10.541360 kubelet[1447]: W0715 11:33:10.541354 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:10.541360 kubelet[1447]: E0715 11:33:10.541362 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:10.579000 audit[1686]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1686 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:10.579000 audit[1686]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffeac7f8af0 a2=0 a3=7ffeac7f8adc items=0 ppid=1599 pid=1686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.579000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 15 11:33:10.581000 audit[1688]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1688 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:10.581000 audit[1688]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff107ac370 a2=0 a3=7fff107ac35c items=0 ppid=1599 pid=1688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.581000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Jul 15 11:33:10.584000 audit[1691]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1691 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:10.584000 audit[1691]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff82075130 a2=0 a3=7fff8207511c items=0 ppid=1599 pid=1691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.584000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Jul 15 11:33:10.585000 audit[1692]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1692 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:10.585000 audit[1692]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd02fc3ac0 a2=0 a3=7ffd02fc3aac items=0 ppid=1599 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.585000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 15 11:33:10.587000 audit[1694]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1694 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:10.587000 audit[1694]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcedb10640 a2=0 a3=7ffcedb1062c items=0 ppid=1599 pid=1694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.587000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 15 11:33:10.588000 audit[1695]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1695 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:10.588000 audit[1695]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe4624ab20 a2=0 a3=7ffe4624ab0c items=0 ppid=1599 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.588000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 15 11:33:10.590000 audit[1697]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1697 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:10.590000 audit[1697]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcc6182290 a2=0 a3=7ffcc618227c items=0 ppid=1599 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.590000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 15 11:33:10.593000 audit[1700]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1700 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:10.593000 audit[1700]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffd25bbb40 a2=0 a3=7fffd25bbb2c items=0 ppid=1599 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.593000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Jul 15 11:33:10.594000 audit[1701]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1701 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:10.594000 audit[1701]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc6a5e2300 a2=0 a3=7ffc6a5e22ec items=0 ppid=1599 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.594000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 15 11:33:10.596000 audit[1703]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1703 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:10.596000 audit[1703]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe2f0d22d0 a2=0 a3=7ffe2f0d22bc items=0 ppid=1599 pid=1703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.596000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 15 11:33:10.597000 audit[1704]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1704 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:10.597000 audit[1704]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffde4c31830 a2=0 a3=7ffde4c3181c items=0 ppid=1599 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.597000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 15 11:33:10.599000 audit[1706]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1706 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:10.599000 audit[1706]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe000c12e0 a2=0 a3=7ffe000c12cc items=0 ppid=1599 pid=1706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.599000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 15 11:33:10.603000 audit[1709]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1709 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:10.603000 audit[1709]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe5378ee50 a2=0 a3=7ffe5378ee3c items=0 ppid=1599 pid=1709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.603000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 15 11:33:10.606000 audit[1712]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1712 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:10.606000 audit[1712]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc09c1c2c0 a2=0 a3=7ffc09c1c2ac items=0 ppid=1599 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.606000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 15 11:33:10.607000 audit[1713]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1713 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:10.607000 audit[1713]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc252679a0 a2=0 a3=7ffc2526798c items=0 ppid=1599 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.607000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 15 11:33:10.609000 audit[1715]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1715 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:10.609000 audit[1715]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffeadec4780 a2=0 a3=7ffeadec476c items=0 ppid=1599 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.609000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 15 11:33:10.629000 audit[1719]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1719 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:10.629000 audit[1719]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff8bffa340 a2=0 a3=7fff8bffa32c items=0 ppid=1599 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.629000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 15 11:33:10.630000 audit[1720]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1720 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:10.630000 audit[1720]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffde9817c20 a2=0 a3=7ffde9817c0c items=0 ppid=1599 pid=1720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.630000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 15 11:33:10.632000 audit[1722]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1722 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:10.632000 audit[1722]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd1ab76d40 a2=0 a3=7ffd1ab76d2c items=0 ppid=1599 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.632000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 15 11:33:10.654000 audit[1729]: NETFILTER_CFG table=filter:39 family=2 entries=11 op=nft_register_rule pid=1729 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:33:10.654000 audit[1729]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7fff944c63f0 a2=0 a3=7fff944c63dc items=0 ppid=1599 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.654000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:33:10.673000 audit[1729]: NETFILTER_CFG table=nat:40 family=2 entries=21 op=nft_register_chain pid=1729 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:33:10.673000 audit[1729]: SYSCALL arch=c000003e syscall=46 success=yes exit=9084 a0=3 a1=7fff944c63f0 a2=0 a3=7fff944c63dc items=0 ppid=1599 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.673000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:33:10.674000 audit[1736]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1736 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:10.674000 audit[1736]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd19bb5dd0 a2=0 a3=7ffd19bb5dbc items=0 ppid=1599 pid=1736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.674000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 15 11:33:10.676000 audit[1738]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1738 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:10.676000 audit[1738]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc1fe31460 a2=0 a3=7ffc1fe3144c items=0 ppid=1599 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.676000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Jul 15 11:33:10.680000 audit[1741]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1741 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:10.680000 audit[1741]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe30eb2df0 a2=0 a3=7ffe30eb2ddc items=0 ppid=1599 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.680000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Jul 15 11:33:10.681000 audit[1742]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1742 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:10.681000 audit[1742]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcbb827d10 a2=0 a3=7ffcbb827cfc items=0 ppid=1599 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.681000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 15 11:33:10.683000 audit[1744]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1744 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:10.683000 audit[1744]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd74ba3b00 a2=0 a3=7ffd74ba3aec items=0 ppid=1599 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.683000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 15 11:33:10.683000 audit[1745]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1745 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:10.683000 audit[1745]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdbc075900 a2=0 a3=7ffdbc0758ec items=0 ppid=1599 pid=1745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.683000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 15 11:33:10.687000 audit[1747]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1747 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:10.687000 audit[1747]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff4c098720 a2=0 a3=7fff4c09870c items=0 ppid=1599 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.687000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Jul 15 11:33:10.690000 audit[1750]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1750 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:10.690000 audit[1750]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd7c520240 a2=0 a3=7ffd7c52022c items=0 ppid=1599 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.690000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 15 11:33:10.691000 audit[1751]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1751 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:10.691000 audit[1751]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffccc174bf0 a2=0 a3=7ffccc174bdc items=0 ppid=1599 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.691000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 15 11:33:10.693000 audit[1753]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1753 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:10.693000 audit[1753]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcac1fbb50 a2=0 a3=7ffcac1fbb3c items=0 ppid=1599 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.693000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 15 11:33:10.694000 audit[1754]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1754 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:10.694000 audit[1754]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc5587fea0 a2=0 a3=7ffc5587fe8c items=0 ppid=1599 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.694000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 15 11:33:10.696000 audit[1756]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1756 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:10.696000 audit[1756]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff916ca4c0 a2=0 a3=7fff916ca4ac items=0 ppid=1599 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.696000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 15 11:33:10.700000 audit[1759]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1759 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:10.700000 audit[1759]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcfc4c5df0 a2=0 a3=7ffcfc4c5ddc items=0 ppid=1599 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.700000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 15 11:33:10.703000 audit[1762]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1762 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:10.703000 audit[1762]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcecb9da10 a2=0 a3=7ffcecb9d9fc items=0 ppid=1599 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.703000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Jul 15 11:33:10.703000 audit[1763]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1763 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:10.703000 audit[1763]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff6432ed90 a2=0 a3=7fff6432ed7c items=0 ppid=1599 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.703000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 15 11:33:10.705000 audit[1765]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1765 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:10.705000 audit[1765]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc7ce77740 a2=0 a3=7ffc7ce7772c items=0 ppid=1599 pid=1765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.705000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 15 11:33:10.709000 audit[1768]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1768 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:10.709000 audit[1768]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe70b9cf40 a2=0 a3=7ffe70b9cf2c items=0 ppid=1599 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.709000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 15 11:33:10.710000 audit[1769]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1769 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:10.710000 audit[1769]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd87d1b900 a2=0 a3=7ffd87d1b8ec items=0 ppid=1599 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.710000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 15 11:33:10.712000 audit[1771]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1771 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:10.712000 audit[1771]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc93d084c0 a2=0 a3=7ffc93d084ac items=0 ppid=1599 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.712000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 15 11:33:10.712000 audit[1772]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1772 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:10.712000 audit[1772]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffff4298300 a2=0 a3=7ffff42982ec items=0 ppid=1599 pid=1772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.712000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 15 11:33:10.714000 audit[1774]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1774 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:10.714000 audit[1774]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff47a08360 a2=0 a3=7fff47a0834c items=0 ppid=1599 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.714000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 15 11:33:10.717000 audit[1777]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1777 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:10.717000 audit[1777]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd0d517780 a2=0 a3=7ffd0d51776c items=0 ppid=1599 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.717000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 15 11:33:10.720000 audit[1779]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1779 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 15 11:33:10.720000 audit[1779]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffd73d31dd0 a2=0 a3=7ffd73d31dbc items=0 ppid=1599 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.720000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:33:10.720000 audit[1779]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1779 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 15 11:33:10.720000 audit[1779]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffd73d31dd0 a2=0 a3=7ffd73d31dbc items=0 ppid=1599 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:10.720000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:33:10.780046 kubelet[1447]: E0715 11:33:10.779992 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:11.453294 kubelet[1447]: E0715 11:33:11.453245 1447 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 15 11:33:11.538778 kubelet[1447]: E0715 11:33:11.538699 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:11.538778 kubelet[1447]: W0715 11:33:11.538747 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:11.538778 kubelet[1447]: E0715 11:33:11.538776 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:11.539030 kubelet[1447]: E0715 11:33:11.538929 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:11.539030 kubelet[1447]: W0715 11:33:11.538942 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:11.539030 kubelet[1447]: E0715 11:33:11.538952 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:11.539134 kubelet[1447]: E0715 11:33:11.539109 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:11.539165 kubelet[1447]: W0715 11:33:11.539139 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:11.539165 kubelet[1447]: E0715 11:33:11.539152 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:11.539312 kubelet[1447]: E0715 11:33:11.539279 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:11.539312 kubelet[1447]: W0715 11:33:11.539290 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:11.539312 kubelet[1447]: E0715 11:33:11.539298 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:11.539538 kubelet[1447]: E0715 11:33:11.539411 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:11.539538 kubelet[1447]: W0715 11:33:11.539418 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:11.539538 kubelet[1447]: E0715 11:33:11.539425 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:11.539538 kubelet[1447]: E0715 11:33:11.539533 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:11.539538 kubelet[1447]: W0715 11:33:11.539540 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:11.539674 kubelet[1447]: E0715 11:33:11.539547 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:11.539699 kubelet[1447]: E0715 11:33:11.539680 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:11.539699 kubelet[1447]: W0715 11:33:11.539689 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:11.539699 kubelet[1447]: E0715 11:33:11.539697 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:11.539845 kubelet[1447]: E0715 11:33:11.539830 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:11.539845 kubelet[1447]: W0715 11:33:11.539840 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:11.539893 kubelet[1447]: E0715 11:33:11.539847 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:11.539977 kubelet[1447]: E0715 11:33:11.539965 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:11.539977 kubelet[1447]: W0715 11:33:11.539975 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:11.540034 kubelet[1447]: E0715 11:33:11.539982 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:11.540141 kubelet[1447]: E0715 11:33:11.540113 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:11.540141 kubelet[1447]: W0715 11:33:11.540139 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:11.540195 kubelet[1447]: E0715 11:33:11.540149 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:11.540283 kubelet[1447]: E0715 11:33:11.540270 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:11.540283 kubelet[1447]: W0715 11:33:11.540279 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:11.540352 kubelet[1447]: E0715 11:33:11.540287 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:11.540525 kubelet[1447]: E0715 11:33:11.540511 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:11.540525 kubelet[1447]: W0715 11:33:11.540521 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:11.540591 kubelet[1447]: E0715 11:33:11.540528 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:11.540712 kubelet[1447]: E0715 11:33:11.540692 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:11.540712 kubelet[1447]: W0715 11:33:11.540703 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:11.540712 kubelet[1447]: E0715 11:33:11.540711 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:11.540883 kubelet[1447]: E0715 11:33:11.540862 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:11.540883 kubelet[1447]: W0715 11:33:11.540871 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:11.540883 kubelet[1447]: E0715 11:33:11.540880 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:11.541016 kubelet[1447]: E0715 11:33:11.540991 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:11.541016 kubelet[1447]: W0715 11:33:11.541000 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:11.541016 kubelet[1447]: E0715 11:33:11.541006 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:11.541152 kubelet[1447]: E0715 11:33:11.541138 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:11.541152 kubelet[1447]: W0715 11:33:11.541148 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:11.541202 kubelet[1447]: E0715 11:33:11.541155 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:11.541308 kubelet[1447]: E0715 11:33:11.541292 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:11.541308 kubelet[1447]: W0715 11:33:11.541302 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:11.541308 kubelet[1447]: E0715 11:33:11.541309 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:11.541472 kubelet[1447]: E0715 11:33:11.541458 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:11.541472 kubelet[1447]: W0715 11:33:11.541467 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:11.541472 kubelet[1447]: E0715 11:33:11.541474 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:11.541619 kubelet[1447]: E0715 11:33:11.541604 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:11.541619 kubelet[1447]: W0715 11:33:11.541613 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:11.541619 kubelet[1447]: E0715 11:33:11.541620 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:11.541807 kubelet[1447]: E0715 11:33:11.541790 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:11.541807 kubelet[1447]: W0715 11:33:11.541801 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:11.541807 kubelet[1447]: E0715 11:33:11.541811 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:11.546256 kubelet[1447]: E0715 11:33:11.546203 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:11.546256 kubelet[1447]: W0715 11:33:11.546228 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:11.546256 kubelet[1447]: E0715 11:33:11.546253 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:11.546491 kubelet[1447]: E0715 11:33:11.546451 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:11.546491 kubelet[1447]: W0715 11:33:11.546463 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:11.546491 kubelet[1447]: E0715 11:33:11.546476 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:11.546669 kubelet[1447]: E0715 11:33:11.546652 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:11.546669 kubelet[1447]: W0715 11:33:11.546662 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:11.546754 kubelet[1447]: E0715 11:33:11.546678 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:11.546867 kubelet[1447]: E0715 11:33:11.546844 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:11.546867 kubelet[1447]: W0715 11:33:11.546855 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:11.546867 kubelet[1447]: E0715 11:33:11.546866 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:11.547047 kubelet[1447]: E0715 11:33:11.547027 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:11.547047 kubelet[1447]: W0715 11:33:11.547039 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:11.547099 kubelet[1447]: E0715 11:33:11.547053 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:11.547376 kubelet[1447]: E0715 11:33:11.547355 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:11.547376 kubelet[1447]: W0715 11:33:11.547371 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:11.547445 kubelet[1447]: E0715 11:33:11.547398 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:11.547734 kubelet[1447]: E0715 11:33:11.547696 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:11.547734 kubelet[1447]: W0715 11:33:11.547724 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:11.547806 kubelet[1447]: E0715 11:33:11.547750 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:11.547982 kubelet[1447]: E0715 11:33:11.547964 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:11.547982 kubelet[1447]: W0715 11:33:11.547976 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:11.548050 kubelet[1447]: E0715 11:33:11.547994 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:11.548274 kubelet[1447]: E0715 11:33:11.548245 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:11.548274 kubelet[1447]: W0715 11:33:11.548261 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:11.548352 kubelet[1447]: E0715 11:33:11.548280 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:11.548573 kubelet[1447]: E0715 11:33:11.548547 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:11.548573 kubelet[1447]: W0715 11:33:11.548562 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:11.548622 kubelet[1447]: E0715 11:33:11.548580 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:11.548894 kubelet[1447]: E0715 11:33:11.548843 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:11.548894 kubelet[1447]: W0715 11:33:11.548861 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:11.548894 kubelet[1447]: E0715 11:33:11.548878 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:11.549130 kubelet[1447]: E0715 11:33:11.549100 1447 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:11.549177 kubelet[1447]: W0715 11:33:11.549114 1447 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:11.549177 kubelet[1447]: E0715 11:33:11.549147 1447 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:11.609203 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3163556345.mount: Deactivated successfully. Jul 15 11:33:11.766315 env[1204]: time="2025-07-15T11:33:11.766219724Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:11.768191 env[1204]: time="2025-07-15T11:33:11.768132779Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:639615519fa6f7bc4b4756066ba9780068fd291eacc36c120f6c555e62f2b00e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:11.769641 env[1204]: time="2025-07-15T11:33:11.769605073Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:11.771098 env[1204]: time="2025-07-15T11:33:11.771040944Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:972be127eaecd7d1a2d5393b8d14f1ae8f88550bee83e0519e9590c7e15eb41b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:11.771716 env[1204]: time="2025-07-15T11:33:11.771519023Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2\" returns image reference \"sha256:639615519fa6f7bc4b4756066ba9780068fd291eacc36c120f6c555e62f2b00e\"" Jul 15 11:33:11.773575 env[1204]: time="2025-07-15T11:33:11.773539026Z" level=info msg="CreateContainer within sandbox \"4f416aa192b09be3bd7ea52df45841600f78ccb9e3ef91f961937ddd8dd3851f\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Jul 15 11:33:11.780288 kubelet[1447]: E0715 11:33:11.780245 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:11.789349 env[1204]: time="2025-07-15T11:33:11.789280345Z" level=info msg="CreateContainer within sandbox \"4f416aa192b09be3bd7ea52df45841600f78ccb9e3ef91f961937ddd8dd3851f\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"f03f420c3bee672df018b1b11f91fd55bf6e93fbcb7c98b8a18be1ed3d964c18\"" Jul 15 11:33:11.789754 env[1204]: time="2025-07-15T11:33:11.789725712Z" level=info msg="StartContainer for \"f03f420c3bee672df018b1b11f91fd55bf6e93fbcb7c98b8a18be1ed3d964c18\"" Jul 15 11:33:11.806984 systemd[1]: Started cri-containerd-f03f420c3bee672df018b1b11f91fd55bf6e93fbcb7c98b8a18be1ed3d964c18.scope. Jul 15 11:33:11.822000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:11.822000 audit[1819]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7fe0845d5298 items=0 ppid=1524 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:11.822000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630336634323063336265653637326466303138623162313166393166 Jul 15 11:33:11.822000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:11.822000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:11.822000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:11.822000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:11.822000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:11.822000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:11.822000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:11.822000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:11.822000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:11.822000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:11.822000 audit: BPF prog-id=66 op=LOAD Jul 15 11:33:11.822000 audit[1819]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0001ebf58 items=0 ppid=1524 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:11.822000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630336634323063336265653637326466303138623162313166393166 Jul 15 11:33:11.822000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:11.822000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:11.822000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:11.822000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:11.822000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:11.822000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:11.822000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:11.822000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:11.822000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:11.822000 audit: BPF prog-id=67 op=LOAD Jul 15 11:33:11.822000 audit[1819]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0001ebfa8 items=0 ppid=1524 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:11.822000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630336634323063336265653637326466303138623162313166393166 Jul 15 11:33:11.822000 audit: BPF prog-id=67 op=UNLOAD Jul 15 11:33:11.822000 audit: BPF prog-id=66 op=UNLOAD Jul 15 11:33:11.822000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:11.822000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:11.822000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:11.822000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:11.822000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:11.822000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:11.822000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:11.822000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:11.822000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:11.822000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:11.822000 audit: BPF prog-id=68 op=LOAD Jul 15 11:33:11.822000 audit[1819]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c000338038 items=0 ppid=1524 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:11.822000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630336634323063336265653637326466303138623162313166393166 Jul 15 11:33:11.843775 systemd[1]: cri-containerd-f03f420c3bee672df018b1b11f91fd55bf6e93fbcb7c98b8a18be1ed3d964c18.scope: Deactivated successfully. Jul 15 11:33:11.849000 audit: BPF prog-id=68 op=UNLOAD Jul 15 11:33:11.984468 env[1204]: time="2025-07-15T11:33:11.984392993Z" level=info msg="StartContainer for \"f03f420c3bee672df018b1b11f91fd55bf6e93fbcb7c98b8a18be1ed3d964c18\" returns successfully" Jul 15 11:33:12.352087 env[1204]: time="2025-07-15T11:33:12.352014381Z" level=info msg="shim disconnected" id=f03f420c3bee672df018b1b11f91fd55bf6e93fbcb7c98b8a18be1ed3d964c18 Jul 15 11:33:12.352087 env[1204]: time="2025-07-15T11:33:12.352076014Z" level=warning msg="cleaning up after shim disconnected" id=f03f420c3bee672df018b1b11f91fd55bf6e93fbcb7c98b8a18be1ed3d964c18 namespace=k8s.io Jul 15 11:33:12.352087 env[1204]: time="2025-07-15T11:33:12.352084987Z" level=info msg="cleaning up dead shim" Jul 15 11:33:12.359277 env[1204]: time="2025-07-15T11:33:12.359201591Z" level=warning msg="cleanup warnings time=\"2025-07-15T11:33:12Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1856 runtime=io.containerd.runc.v2\n" Jul 15 11:33:12.438584 kubelet[1447]: E0715 11:33:12.438496 1447 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hr46c" podUID="9b48e368-c013-407a-bd57-d9a453d3ba47" Jul 15 11:33:12.456465 env[1204]: time="2025-07-15T11:33:12.456395618Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.2\"" Jul 15 11:33:12.780704 kubelet[1447]: E0715 11:33:12.780641 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:13.781491 kubelet[1447]: E0715 11:33:13.781417 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:14.438417 kubelet[1447]: E0715 11:33:14.438335 1447 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hr46c" podUID="9b48e368-c013-407a-bd57-d9a453d3ba47" Jul 15 11:33:14.781695 kubelet[1447]: E0715 11:33:14.781628 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:15.134000 audit[1874]: NETFILTER_CFG table=filter:65 family=2 entries=19 op=nft_register_rule pid=1874 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:33:15.134000 audit[1874]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffd41145dc0 a2=0 a3=7ffd41145dac items=0 ppid=1599 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:15.134000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:33:15.140000 audit[1874]: NETFILTER_CFG table=nat:66 family=2 entries=21 op=nft_register_chain pid=1874 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:33:15.140000 audit[1874]: SYSCALL arch=c000003e syscall=46 success=yes exit=7044 a0=3 a1=7ffd41145dc0 a2=0 a3=7ffd41145dac items=0 ppid=1599 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:15.140000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:33:15.160000 audit[1876]: NETFILTER_CFG table=filter:67 family=2 entries=15 op=nft_register_rule pid=1876 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:33:15.160000 audit[1876]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7fffd848dd70 a2=0 a3=7fffd848dd5c items=0 ppid=1599 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:15.160000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:33:15.164000 audit[1876]: NETFILTER_CFG table=nat:68 family=2 entries=37 op=nft_register_chain pid=1876 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:33:15.164000 audit[1876]: SYSCALL arch=c000003e syscall=46 success=yes exit=14964 a0=3 a1=7fffd848dd70 a2=0 a3=7fffd848dd5c items=0 ppid=1599 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:15.164000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:33:15.782295 kubelet[1447]: E0715 11:33:15.782220 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:15.945452 env[1204]: time="2025-07-15T11:33:15.945373494Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:15.947164 env[1204]: time="2025-07-15T11:33:15.947133609Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:77a357d0d33e3016e61153f7d2b7de72371579c4aaeb767fb7ef0af606fe1630,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:15.948603 env[1204]: time="2025-07-15T11:33:15.948550065Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:15.950210 env[1204]: time="2025-07-15T11:33:15.950155115Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:50686775cc60acb78bd92a66fa2d84e1700b2d8e43a718fbadbf35e59baefb4d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:15.950583 env[1204]: time="2025-07-15T11:33:15.950544757Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.2\" returns image reference \"sha256:77a357d0d33e3016e61153f7d2b7de72371579c4aaeb767fb7ef0af606fe1630\"" Jul 15 11:33:15.952642 env[1204]: time="2025-07-15T11:33:15.952609061Z" level=info msg="CreateContainer within sandbox \"4f416aa192b09be3bd7ea52df45841600f78ccb9e3ef91f961937ddd8dd3851f\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Jul 15 11:33:16.052329 env[1204]: time="2025-07-15T11:33:16.052185755Z" level=info msg="CreateContainer within sandbox \"4f416aa192b09be3bd7ea52df45841600f78ccb9e3ef91f961937ddd8dd3851f\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"e95afcebcf28bb16b730ad762c7d620dd202bd33f5763457c6d27d0302880900\"" Jul 15 11:33:16.052610 env[1204]: time="2025-07-15T11:33:16.052564427Z" level=info msg="StartContainer for \"e95afcebcf28bb16b730ad762c7d620dd202bd33f5763457c6d27d0302880900\"" Jul 15 11:33:16.069542 systemd[1]: Started cri-containerd-e95afcebcf28bb16b730ad762c7d620dd202bd33f5763457c6d27d0302880900.scope. Jul 15 11:33:16.080000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:16.081783 kernel: kauditd_printk_skb: 242 callbacks suppressed Jul 15 11:33:16.081851 kernel: audit: type=1400 audit(1752579196.080:523): avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:16.080000 audit[1887]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019f6b0 a2=3c a3=7ff4241a2de8 items=0 ppid=1524 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:16.088939 kernel: audit: type=1300 audit(1752579196.080:523): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019f6b0 a2=3c a3=7ff4241a2de8 items=0 ppid=1524 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:16.089008 kernel: audit: type=1327 audit(1752579196.080:523): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539356166636562636632386262313662373330616437363263376436 Jul 15 11:33:16.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539356166636562636632386262313662373330616437363263376436 Jul 15 11:33:16.092772 kernel: audit: type=1400 audit(1752579196.080:524): avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:16.080000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:16.080000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:16.098405 kernel: audit: type=1400 audit(1752579196.080:524): avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:16.080000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:16.101347 kernel: audit: type=1400 audit(1752579196.080:524): avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:16.101395 kernel: audit: type=1400 audit(1752579196.080:524): avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:16.080000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:16.104235 kernel: audit: type=1400 audit(1752579196.080:524): avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:16.080000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:16.107133 kernel: audit: type=1400 audit(1752579196.080:524): avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:16.080000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:16.110087 env[1204]: time="2025-07-15T11:33:16.110034958Z" level=info msg="StartContainer for \"e95afcebcf28bb16b730ad762c7d620dd202bd33f5763457c6d27d0302880900\" returns successfully" Jul 15 11:33:16.080000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:16.113368 kernel: audit: type=1400 audit(1752579196.080:524): avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:16.080000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:16.080000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:16.080000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:16.080000 audit: BPF prog-id=69 op=LOAD Jul 15 11:33:16.080000 audit[1887]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019f9d8 a2=78 a3=c000300bb8 items=0 ppid=1524 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:16.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539356166636562636632386262313662373330616437363263376436 Jul 15 11:33:16.080000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:16.080000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:16.080000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:16.080000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:16.080000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:16.080000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:16.080000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:16.080000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:16.080000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:16.080000 audit: BPF prog-id=70 op=LOAD Jul 15 11:33:16.080000 audit[1887]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00019f770 a2=78 a3=c000300c08 items=0 ppid=1524 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:16.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539356166636562636632386262313662373330616437363263376436 Jul 15 11:33:16.087000 audit: BPF prog-id=70 op=UNLOAD Jul 15 11:33:16.087000 audit: BPF prog-id=69 op=UNLOAD Jul 15 11:33:16.087000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:16.087000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:16.087000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:16.087000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:16.087000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:16.087000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:16.087000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:16.087000 audit[1887]: AVC avc: denied { perfmon } for pid=1887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:16.087000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:16.087000 audit[1887]: AVC avc: denied { bpf } for pid=1887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:16.087000 audit: BPF prog-id=71 op=LOAD Jul 15 11:33:16.087000 audit[1887]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019fc30 a2=78 a3=c000300c98 items=0 ppid=1524 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:16.087000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539356166636562636632386262313662373330616437363263376436 Jul 15 11:33:16.188000 audit[1916]: NETFILTER_CFG table=filter:69 family=2 entries=12 op=nft_register_rule pid=1916 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:33:16.188000 audit[1916]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffe4f4ace80 a2=0 a3=7ffe4f4ace6c items=0 ppid=1599 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:16.188000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:33:16.202000 audit[1916]: NETFILTER_CFG table=nat:70 family=2 entries=58 op=nft_register_chain pid=1916 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:33:16.202000 audit[1916]: SYSCALL arch=c000003e syscall=46 success=yes exit=20628 a0=3 a1=7ffe4f4ace80 a2=0 a3=7ffe4f4ace6c items=0 ppid=1599 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:16.202000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:33:16.499109 kubelet[1447]: E0715 11:33:16.438440 1447 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hr46c" podUID="9b48e368-c013-407a-bd57-d9a453d3ba47" Jul 15 11:33:16.783235 kubelet[1447]: E0715 11:33:16.783066 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:17.784171 kubelet[1447]: E0715 11:33:17.784128 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:17.933798 systemd[1]: cri-containerd-e95afcebcf28bb16b730ad762c7d620dd202bd33f5763457c6d27d0302880900.scope: Deactivated successfully. Jul 15 11:33:17.936000 audit: BPF prog-id=71 op=UNLOAD Jul 15 11:33:17.951850 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e95afcebcf28bb16b730ad762c7d620dd202bd33f5763457c6d27d0302880900-rootfs.mount: Deactivated successfully. Jul 15 11:33:17.985076 kubelet[1447]: I0715 11:33:17.985050 1447 kubelet_node_status.go:488] "Fast updating node status as it just became ready" Jul 15 11:33:18.230423 env[1204]: time="2025-07-15T11:33:18.230251559Z" level=info msg="shim disconnected" id=e95afcebcf28bb16b730ad762c7d620dd202bd33f5763457c6d27d0302880900 Jul 15 11:33:18.230423 env[1204]: time="2025-07-15T11:33:18.230304752Z" level=warning msg="cleaning up after shim disconnected" id=e95afcebcf28bb16b730ad762c7d620dd202bd33f5763457c6d27d0302880900 namespace=k8s.io Jul 15 11:33:18.230423 env[1204]: time="2025-07-15T11:33:18.230314081Z" level=info msg="cleaning up dead shim" Jul 15 11:33:18.236360 env[1204]: time="2025-07-15T11:33:18.236324478Z" level=warning msg="cleanup warnings time=\"2025-07-15T11:33:18Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1931 runtime=io.containerd.runc.v2\n" Jul 15 11:33:18.400000 audit[1944]: NETFILTER_CFG table=filter:71 family=2 entries=12 op=nft_register_rule pid=1944 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:33:18.400000 audit[1944]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffe88acc530 a2=0 a3=7ffe88acc51c items=0 ppid=1599 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:18.400000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:33:18.405000 audit[1944]: NETFILTER_CFG table=nat:72 family=2 entries=22 op=nft_register_rule pid=1944 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:33:18.405000 audit[1944]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe88acc530 a2=0 a3=7ffe88acc51c items=0 ppid=1599 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:18.405000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:33:18.415000 audit[1946]: NETFILTER_CFG table=filter:73 family=2 entries=12 op=nft_register_rule pid=1946 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:33:18.415000 audit[1946]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffff6f233f0 a2=0 a3=7ffff6f233dc items=0 ppid=1599 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:18.415000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:33:18.426000 audit[1946]: NETFILTER_CFG table=nat:74 family=2 entries=22 op=nft_register_rule pid=1946 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:33:18.426000 audit[1946]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffff6f233f0 a2=0 a3=7ffff6f233dc items=0 ppid=1599 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:18.426000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:33:18.443723 systemd[1]: Created slice kubepods-besteffort-pod9b48e368_c013_407a_bd57_d9a453d3ba47.slice. Jul 15 11:33:18.445616 env[1204]: time="2025-07-15T11:33:18.445578146Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-hr46c,Uid:9b48e368-c013-407a-bd57-d9a453d3ba47,Namespace:calico-system,Attempt:0,}" Jul 15 11:33:18.469877 env[1204]: time="2025-07-15T11:33:18.469833924Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.2\"" Jul 15 11:33:18.504417 env[1204]: time="2025-07-15T11:33:18.504300471Z" level=error msg="Failed to destroy network for sandbox \"2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 15 11:33:18.505719 env[1204]: time="2025-07-15T11:33:18.505677786Z" level=error msg="encountered an error cleaning up failed sandbox \"2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 15 11:33:18.505825 env[1204]: time="2025-07-15T11:33:18.505744354Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-hr46c,Uid:9b48e368-c013-407a-bd57-d9a453d3ba47,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 15 11:33:18.506101 kubelet[1447]: E0715 11:33:18.506052 1447 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 15 11:33:18.506224 kubelet[1447]: E0715 11:33:18.506187 1447 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-hr46c" Jul 15 11:33:18.506294 kubelet[1447]: E0715 11:33:18.506228 1447 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-hr46c" Jul 15 11:33:18.506328 kubelet[1447]: E0715 11:33:18.506293 1447 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-hr46c_calico-system(9b48e368-c013-407a-bd57-d9a453d3ba47)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-hr46c_calico-system(9b48e368-c013-407a-bd57-d9a453d3ba47)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-hr46c" podUID="9b48e368-c013-407a-bd57-d9a453d3ba47" Jul 15 11:33:18.506953 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98-shm.mount: Deactivated successfully. Jul 15 11:33:18.784703 kubelet[1447]: E0715 11:33:18.784529 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:19.471238 kubelet[1447]: I0715 11:33:19.471191 1447 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98" Jul 15 11:33:19.471842 env[1204]: time="2025-07-15T11:33:19.471801359Z" level=info msg="StopPodSandbox for \"2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98\"" Jul 15 11:33:19.493474 env[1204]: time="2025-07-15T11:33:19.493395189Z" level=error msg="StopPodSandbox for \"2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98\" failed" error="failed to destroy network for sandbox \"2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 15 11:33:19.493737 kubelet[1447]: E0715 11:33:19.493693 1447 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98" Jul 15 11:33:19.493826 kubelet[1447]: E0715 11:33:19.493762 1447 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98"} Jul 15 11:33:19.493893 kubelet[1447]: E0715 11:33:19.493824 1447 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9b48e368-c013-407a-bd57-d9a453d3ba47\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 15 11:33:19.493893 kubelet[1447]: E0715 11:33:19.493846 1447 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9b48e368-c013-407a-bd57-d9a453d3ba47\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-hr46c" podUID="9b48e368-c013-407a-bd57-d9a453d3ba47" Jul 15 11:33:19.785706 kubelet[1447]: E0715 11:33:19.785633 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:20.786315 kubelet[1447]: E0715 11:33:20.786220 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:21.787327 kubelet[1447]: E0715 11:33:21.787258 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:22.787487 kubelet[1447]: E0715 11:33:22.787409 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:23.001183 systemd[1]: Created slice kubepods-besteffort-pod80fa4cc0_c178_4747_9505_57a0c7197bf4.slice. Jul 15 11:33:23.012510 kubelet[1447]: I0715 11:33:23.012463 1447 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4cs8n\" (UniqueName: \"kubernetes.io/projected/80fa4cc0-c178-4747-9505-57a0c7197bf4-kube-api-access-4cs8n\") pod \"nginx-deployment-8587fbcb89-hrpzx\" (UID: \"80fa4cc0-c178-4747-9505-57a0c7197bf4\") " pod="default/nginx-deployment-8587fbcb89-hrpzx" Jul 15 11:33:23.087000 audit[2001]: NETFILTER_CFG table=filter:75 family=2 entries=12 op=nft_register_rule pid=2001 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:33:23.099739 kernel: kauditd_printk_skb: 52 callbacks suppressed Jul 15 11:33:23.099898 kernel: audit: type=1325 audit(1752579203.087:536): table=filter:75 family=2 entries=12 op=nft_register_rule pid=2001 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:33:23.099918 kernel: audit: type=1300 audit(1752579203.087:536): arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffd16843be0 a2=0 a3=7ffd16843bcc items=0 ppid=1599 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:23.099937 kernel: audit: type=1327 audit(1752579203.087:536): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:33:23.087000 audit[2001]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffd16843be0 a2=0 a3=7ffd16843bcc items=0 ppid=1599 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:23.087000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:33:23.111492 kernel: audit: type=1325 audit(1752579203.100:537): table=nat:76 family=2 entries=22 op=nft_register_rule pid=2001 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:33:23.111545 kernel: audit: type=1300 audit(1752579203.100:537): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd16843be0 a2=0 a3=7ffd16843bcc items=0 ppid=1599 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:23.111561 kernel: audit: type=1327 audit(1752579203.100:537): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:33:23.100000 audit[2001]: NETFILTER_CFG table=nat:76 family=2 entries=22 op=nft_register_rule pid=2001 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:33:23.100000 audit[2001]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd16843be0 a2=0 a3=7ffd16843bcc items=0 ppid=1599 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:23.100000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:33:23.304763 env[1204]: time="2025-07-15T11:33:23.304698373Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-hrpzx,Uid:80fa4cc0-c178-4747-9505-57a0c7197bf4,Namespace:default,Attempt:0,}" Jul 15 11:33:23.586686 env[1204]: time="2025-07-15T11:33:23.586608038Z" level=error msg="Failed to destroy network for sandbox \"fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 15 11:33:23.587028 env[1204]: time="2025-07-15T11:33:23.586995364Z" level=error msg="encountered an error cleaning up failed sandbox \"fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 15 11:33:23.587072 env[1204]: time="2025-07-15T11:33:23.587047674Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-hrpzx,Uid:80fa4cc0-c178-4747-9505-57a0c7197bf4,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 15 11:33:23.587362 kubelet[1447]: E0715 11:33:23.587321 1447 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 15 11:33:23.587442 kubelet[1447]: E0715 11:33:23.587392 1447 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-hrpzx" Jul 15 11:33:23.587442 kubelet[1447]: E0715 11:33:23.587411 1447 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-hrpzx" Jul 15 11:33:23.587497 kubelet[1447]: E0715 11:33:23.587451 1447 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-8587fbcb89-hrpzx_default(80fa4cc0-c178-4747-9505-57a0c7197bf4)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-8587fbcb89-hrpzx_default(80fa4cc0-c178-4747-9505-57a0c7197bf4)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-hrpzx" podUID="80fa4cc0-c178-4747-9505-57a0c7197bf4" Jul 15 11:33:23.588469 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e-shm.mount: Deactivated successfully. Jul 15 11:33:23.777325 kubelet[1447]: E0715 11:33:23.777261 1447 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:23.787851 kubelet[1447]: E0715 11:33:23.787751 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:24.477412 kubelet[1447]: I0715 11:33:24.477377 1447 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e" Jul 15 11:33:24.477856 env[1204]: time="2025-07-15T11:33:24.477813875Z" level=info msg="StopPodSandbox for \"fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e\"" Jul 15 11:33:24.500079 env[1204]: time="2025-07-15T11:33:24.499998904Z" level=error msg="StopPodSandbox for \"fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e\" failed" error="failed to destroy network for sandbox \"fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 15 11:33:24.500385 kubelet[1447]: E0715 11:33:24.500336 1447 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e" Jul 15 11:33:24.500455 kubelet[1447]: E0715 11:33:24.500396 1447 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e"} Jul 15 11:33:24.500455 kubelet[1447]: E0715 11:33:24.500439 1447 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"80fa4cc0-c178-4747-9505-57a0c7197bf4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 15 11:33:24.500564 kubelet[1447]: E0715 11:33:24.500464 1447 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"80fa4cc0-c178-4747-9505-57a0c7197bf4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-hrpzx" podUID="80fa4cc0-c178-4747-9505-57a0c7197bf4" Jul 15 11:33:24.788590 kubelet[1447]: E0715 11:33:24.788521 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:25.263982 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1251584527.mount: Deactivated successfully. Jul 15 11:33:25.788698 kubelet[1447]: E0715 11:33:25.788629 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:26.530468 env[1204]: time="2025-07-15T11:33:26.530417249Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:26.533528 env[1204]: time="2025-07-15T11:33:26.533472396Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cc52550d767f73458fee2ee68db9db5de30d175e8fa4569ebdb43610127b6d20,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:26.536884 env[1204]: time="2025-07-15T11:33:26.536820435Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:26.538617 env[1204]: time="2025-07-15T11:33:26.538564381Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e94d49349cc361ef2216d27dda4a097278984d778279f66e79b0616c827c6760,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:26.539193 env[1204]: time="2025-07-15T11:33:26.539156111Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.2\" returns image reference \"sha256:cc52550d767f73458fee2ee68db9db5de30d175e8fa4569ebdb43610127b6d20\"" Jul 15 11:33:26.549521 env[1204]: time="2025-07-15T11:33:26.549480447Z" level=info msg="CreateContainer within sandbox \"4f416aa192b09be3bd7ea52df45841600f78ccb9e3ef91f961937ddd8dd3851f\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Jul 15 11:33:26.617231 env[1204]: time="2025-07-15T11:33:26.617170868Z" level=info msg="CreateContainer within sandbox \"4f416aa192b09be3bd7ea52df45841600f78ccb9e3ef91f961937ddd8dd3851f\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"dc5c2aab3b7ba4b75b0ad05d87df20085b8c7297255d25517bd579de1b013912\"" Jul 15 11:33:26.617865 env[1204]: time="2025-07-15T11:33:26.617822437Z" level=info msg="StartContainer for \"dc5c2aab3b7ba4b75b0ad05d87df20085b8c7297255d25517bd579de1b013912\"" Jul 15 11:33:26.632670 systemd[1]: Started cri-containerd-dc5c2aab3b7ba4b75b0ad05d87df20085b8c7297255d25517bd579de1b013912.scope. Jul 15 11:33:26.646000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:26.646000 audit[2066]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f3ffc773ef8 items=0 ppid=1524 pid=2066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:26.657133 kernel: audit: type=1400 audit(1752579206.646:538): avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:26.657194 kernel: audit: type=1300 audit(1752579206.646:538): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f3ffc773ef8 items=0 ppid=1524 pid=2066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:26.657225 kernel: audit: type=1327 audit(1752579206.646:538): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463356332616162336237626134623735623061643035643837646632 Jul 15 11:33:26.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463356332616162336237626134623735623061643035643837646632 Jul 15 11:33:26.646000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:26.665955 kernel: audit: type=1400 audit(1752579206.646:539): avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:26.646000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:26.646000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:26.646000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:26.646000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:26.646000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:26.646000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:26.646000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:26.646000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:26.646000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:26.646000 audit: BPF prog-id=72 op=LOAD Jul 15 11:33:26.646000 audit[2066]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003865b8 items=0 ppid=1524 pid=2066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:26.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463356332616162336237626134623735623061643035643837646632 Jul 15 11:33:26.656000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:26.656000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:26.656000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:26.656000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:26.656000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:26.656000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:26.656000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:26.656000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:26.656000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:26.656000 audit: BPF prog-id=73 op=LOAD Jul 15 11:33:26.656000 audit[2066]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000386608 items=0 ppid=1524 pid=2066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:26.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463356332616162336237626134623735623061643035643837646632 Jul 15 11:33:26.661000 audit: BPF prog-id=73 op=UNLOAD Jul 15 11:33:26.661000 audit: BPF prog-id=72 op=UNLOAD Jul 15 11:33:26.661000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:26.661000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:26.661000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:26.661000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:26.661000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:26.661000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:26.661000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:26.661000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:26.661000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:26.661000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:26.661000 audit: BPF prog-id=74 op=LOAD Jul 15 11:33:26.661000 audit[2066]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000386698 items=0 ppid=1524 pid=2066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:26.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463356332616162336237626134623735623061643035643837646632 Jul 15 11:33:26.679491 env[1204]: time="2025-07-15T11:33:26.679430268Z" level=info msg="StartContainer for \"dc5c2aab3b7ba4b75b0ad05d87df20085b8c7297255d25517bd579de1b013912\" returns successfully" Jul 15 11:33:26.765068 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Jul 15 11:33:26.765194 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Jul 15 11:33:26.789869 kubelet[1447]: E0715 11:33:26.789713 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:27.584416 kubelet[1447]: I0715 11:33:27.584317 1447 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-52jh6" podStartSLOduration=3.841238106 podStartE2EDuration="23.584286153s" podCreationTimestamp="2025-07-15 11:33:04 +0000 UTC" firstStartedPulling="2025-07-15 11:33:06.797039981 +0000 UTC m=+3.523257659" lastFinishedPulling="2025-07-15 11:33:26.540088029 +0000 UTC m=+23.266305706" observedRunningTime="2025-07-15 11:33:27.579273978 +0000 UTC m=+24.305491655" watchObservedRunningTime="2025-07-15 11:33:27.584286153 +0000 UTC m=+24.310503830" Jul 15 11:33:27.790077 kubelet[1447]: E0715 11:33:27.790001 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:28.143880 kernel: kauditd_printk_skb: 39 callbacks suppressed Jul 15 11:33:28.144022 kernel: audit: type=1400 audit(1752579208.137:544): avc: denied { write } for pid=2182 comm="tee" name="fd" dev="proc" ino=19053 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 15 11:33:28.144044 kernel: audit: type=1300 audit(1752579208.137:544): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffec31757e1 a2=241 a3=1b6 items=1 ppid=2159 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.137000 audit[2182]: AVC avc: denied { write } for pid=2182 comm="tee" name="fd" dev="proc" ino=19053 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 15 11:33:28.137000 audit[2182]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffec31757e1 a2=241 a3=1b6 items=1 ppid=2159 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.148133 kernel: audit: type=1307 audit(1752579208.137:544): cwd="/etc/service/enabled/confd/log" Jul 15 11:33:28.137000 audit: CWD cwd="/etc/service/enabled/confd/log" Jul 15 11:33:28.137000 audit: PATH item=0 name="/dev/fd/63" inode=19047 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:28.152160 kernel: audit: type=1302 audit(1752579208.137:544): item=0 name="/dev/fd/63" inode=19047 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:28.137000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 15 11:33:28.139000 audit[2185]: AVC avc: denied { write } for pid=2185 comm="tee" name="fd" dev="proc" ino=19057 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 15 11:33:28.158823 kernel: audit: type=1327 audit(1752579208.137:544): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 15 11:33:28.158867 kernel: audit: type=1400 audit(1752579208.139:545): avc: denied { write } for pid=2185 comm="tee" name="fd" dev="proc" ino=19057 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 15 11:33:28.159011 kernel: audit: type=1300 audit(1752579208.139:545): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe25d9a7e3 a2=241 a3=1b6 items=1 ppid=2171 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.139000 audit[2185]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe25d9a7e3 a2=241 a3=1b6 items=1 ppid=2171 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.139000 audit: CWD cwd="/etc/service/enabled/cni/log" Jul 15 11:33:28.139000 audit: PATH item=0 name="/dev/fd/63" inode=19050 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:28.167203 kernel: audit: type=1307 audit(1752579208.139:545): cwd="/etc/service/enabled/cni/log" Jul 15 11:33:28.167265 kernel: audit: type=1302 audit(1752579208.139:545): item=0 name="/dev/fd/63" inode=19050 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:28.167284 kernel: audit: type=1327 audit(1752579208.139:545): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 15 11:33:28.139000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 15 11:33:28.152000 audit[2214]: AVC avc: denied { write } for pid=2214 comm="tee" name="fd" dev="proc" ino=19079 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 15 11:33:28.152000 audit[2214]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd3180c7e1 a2=241 a3=1b6 items=1 ppid=2165 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.152000 audit: CWD cwd="/etc/service/enabled/felix/log" Jul 15 11:33:28.152000 audit: PATH item=0 name="/dev/fd/63" inode=19953 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:28.152000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 15 11:33:28.155000 audit[2213]: AVC avc: denied { write } for pid=2213 comm="tee" name="fd" dev="proc" ino=19083 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 15 11:33:28.155000 audit[2213]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc8c8287d2 a2=241 a3=1b6 items=1 ppid=2163 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.155000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Jul 15 11:33:28.155000 audit: PATH item=0 name="/dev/fd/63" inode=19076 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:28.155000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 15 11:33:28.171000 audit[2209]: AVC avc: denied { write } for pid=2209 comm="tee" name="fd" dev="proc" ino=21740 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 15 11:33:28.171000 audit[2209]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff6b1827d1 a2=241 a3=1b6 items=1 ppid=2168 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.171000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Jul 15 11:33:28.171000 audit: PATH item=0 name="/dev/fd/63" inode=21730 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:28.171000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 15 11:33:28.172000 audit[2200]: AVC avc: denied { write } for pid=2200 comm="tee" name="fd" dev="proc" ino=21744 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 15 11:33:28.172000 audit[2200]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffffcbbc7e2 a2=241 a3=1b6 items=1 ppid=2157 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.172000 audit: CWD cwd="/etc/service/enabled/bird/log" Jul 15 11:33:28.172000 audit: PATH item=0 name="/dev/fd/63" inode=19067 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:28.172000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 15 11:33:28.191000 audit[2239]: AVC avc: denied { write } for pid=2239 comm="tee" name="fd" dev="proc" ino=19088 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 15 11:33:28.191000 audit[2239]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff3b7ed7e1 a2=241 a3=1b6 items=1 ppid=2176 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.191000 audit: CWD cwd="/etc/service/enabled/bird6/log" Jul 15 11:33:28.191000 audit: PATH item=0 name="/dev/fd/63" inode=20784 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:28.191000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 15 11:33:28.299000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.299000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.299000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.299000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.299000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.299000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.299000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.299000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.299000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.299000 audit: BPF prog-id=75 op=LOAD Jul 15 11:33:28.299000 audit[2255]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffe587b1f0 a2=98 a3=1fffffffffffffff items=0 ppid=2167 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.299000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 15 11:33:28.299000 audit: BPF prog-id=75 op=UNLOAD Jul 15 11:33:28.300000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.300000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.300000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.300000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.300000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.300000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.300000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.300000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.300000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.300000 audit: BPF prog-id=76 op=LOAD Jul 15 11:33:28.300000 audit[2255]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffe587b0d0 a2=94 a3=3 items=0 ppid=2167 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.300000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 15 11:33:28.300000 audit: BPF prog-id=76 op=UNLOAD Jul 15 11:33:28.300000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.300000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.300000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.300000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.300000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.300000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.300000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.300000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.300000 audit[2255]: AVC avc: denied { bpf } for pid=2255 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.300000 audit: BPF prog-id=77 op=LOAD Jul 15 11:33:28.300000 audit[2255]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffe587b110 a2=94 a3=7fffe587b2f0 items=0 ppid=2167 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.300000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 15 11:33:28.300000 audit: BPF prog-id=77 op=UNLOAD Jul 15 11:33:28.300000 audit[2255]: AVC avc: denied { perfmon } for pid=2255 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.300000 audit[2255]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7fffe587b1e0 a2=50 a3=a000000085 items=0 ppid=2167 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.300000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 15 11:33:28.300000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.300000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.300000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.300000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.300000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.300000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.300000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.300000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.300000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.300000 audit: BPF prog-id=78 op=LOAD Jul 15 11:33:28.300000 audit[2256]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe9b3201e0 a2=98 a3=3 items=0 ppid=2167 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.300000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:33:28.301000 audit: BPF prog-id=78 op=UNLOAD Jul 15 11:33:28.301000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.301000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.301000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.301000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.301000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.301000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.301000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.301000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.301000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.301000 audit: BPF prog-id=79 op=LOAD Jul 15 11:33:28.301000 audit[2256]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe9b31ffd0 a2=94 a3=54428f items=0 ppid=2167 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.301000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:33:28.301000 audit: BPF prog-id=79 op=UNLOAD Jul 15 11:33:28.301000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.301000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.301000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.301000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.301000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.301000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.301000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.301000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.301000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.301000 audit: BPF prog-id=80 op=LOAD Jul 15 11:33:28.301000 audit[2256]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe9b320000 a2=94 a3=2 items=0 ppid=2167 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.301000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:33:28.301000 audit: BPF prog-id=80 op=UNLOAD Jul 15 11:33:28.403000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.403000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.403000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.403000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.403000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.403000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.403000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.403000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.403000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.403000 audit: BPF prog-id=81 op=LOAD Jul 15 11:33:28.403000 audit[2256]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe9b31fec0 a2=94 a3=1 items=0 ppid=2167 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.403000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:33:28.403000 audit: BPF prog-id=81 op=UNLOAD Jul 15 11:33:28.403000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.403000 audit[2256]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe9b31ff90 a2=50 a3=7ffe9b320070 items=0 ppid=2167 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.403000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:33:28.411000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.411000 audit[2256]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe9b31fed0 a2=28 a3=0 items=0 ppid=2167 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.411000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:33:28.411000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.411000 audit[2256]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9b31ff00 a2=28 a3=0 items=0 ppid=2167 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.411000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:33:28.411000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.411000 audit[2256]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9b31fe10 a2=28 a3=0 items=0 ppid=2167 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.411000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:33:28.411000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.411000 audit[2256]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe9b31ff20 a2=28 a3=0 items=0 ppid=2167 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.411000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:33:28.411000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.411000 audit[2256]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe9b31ff00 a2=28 a3=0 items=0 ppid=2167 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.411000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:33:28.411000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.411000 audit[2256]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe9b31fef0 a2=28 a3=0 items=0 ppid=2167 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.411000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:33:28.411000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.411000 audit[2256]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe9b31ff20 a2=28 a3=0 items=0 ppid=2167 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.411000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:33:28.411000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.411000 audit[2256]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9b31ff00 a2=28 a3=0 items=0 ppid=2167 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.411000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:33:28.411000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.411000 audit[2256]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9b31ff20 a2=28 a3=0 items=0 ppid=2167 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.411000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:33:28.411000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.411000 audit[2256]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9b31fef0 a2=28 a3=0 items=0 ppid=2167 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.411000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:33:28.411000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.411000 audit[2256]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe9b31ff60 a2=28 a3=0 items=0 ppid=2167 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.411000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:33:28.411000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.411000 audit[2256]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe9b31fd10 a2=50 a3=1 items=0 ppid=2167 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.411000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:33:28.411000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.411000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.411000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.411000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.411000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.411000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.411000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.411000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.411000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.411000 audit: BPF prog-id=82 op=LOAD Jul 15 11:33:28.411000 audit[2256]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe9b31fd10 a2=94 a3=5 items=0 ppid=2167 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.411000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:33:28.411000 audit: BPF prog-id=82 op=UNLOAD Jul 15 11:33:28.411000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.411000 audit[2256]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe9b31fdc0 a2=50 a3=1 items=0 ppid=2167 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.411000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:33:28.411000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.411000 audit[2256]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe9b31fee0 a2=4 a3=38 items=0 ppid=2167 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.411000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:33:28.411000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.411000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.411000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.411000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.411000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.411000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.411000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.411000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.411000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.411000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.411000 audit[2256]: AVC avc: denied { confidentiality } for pid=2256 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:28.411000 audit[2256]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe9b31ff30 a2=94 a3=6 items=0 ppid=2167 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.411000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:33:28.412000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.412000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.412000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.412000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.412000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.412000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.412000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.412000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.412000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.412000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.412000 audit[2256]: AVC avc: denied { confidentiality } for pid=2256 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:28.412000 audit[2256]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe9b31f6e0 a2=94 a3=88 items=0 ppid=2167 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.412000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:33:28.412000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.412000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.412000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.412000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.412000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.412000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.412000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.412000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.412000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.412000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.412000 audit[2256]: AVC avc: denied { confidentiality } for pid=2256 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:28.412000 audit[2256]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe9b31f6e0 a2=94 a3=88 items=0 ppid=2167 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.412000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:33:28.419000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.419000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.419000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.419000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.419000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.419000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.419000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.419000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.419000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.419000 audit: BPF prog-id=83 op=LOAD Jul 15 11:33:28.419000 audit[2259]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffef39bf610 a2=98 a3=1999999999999999 items=0 ppid=2167 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.419000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Jul 15 11:33:28.419000 audit: BPF prog-id=83 op=UNLOAD Jul 15 11:33:28.419000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.419000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.419000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.419000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.419000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.419000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.419000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.419000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.419000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.419000 audit: BPF prog-id=84 op=LOAD Jul 15 11:33:28.419000 audit[2259]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffef39bf4f0 a2=94 a3=ffff items=0 ppid=2167 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.419000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Jul 15 11:33:28.419000 audit: BPF prog-id=84 op=UNLOAD Jul 15 11:33:28.419000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.419000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.419000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.419000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.419000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.419000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.419000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.419000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.419000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.419000 audit: BPF prog-id=85 op=LOAD Jul 15 11:33:28.419000 audit[2259]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffef39bf530 a2=94 a3=7ffef39bf710 items=0 ppid=2167 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.419000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Jul 15 11:33:28.419000 audit: BPF prog-id=85 op=UNLOAD Jul 15 11:33:28.471435 systemd-networkd[1024]: vxlan.calico: Link UP Jul 15 11:33:28.471448 systemd-networkd[1024]: vxlan.calico: Gained carrier Jul 15 11:33:28.502000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.502000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.502000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.502000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.502000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.502000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.502000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.502000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.502000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.502000 audit: BPF prog-id=86 op=LOAD Jul 15 11:33:28.502000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff32f4dd40 a2=98 a3=0 items=0 ppid=2167 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.502000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:33:28.502000 audit: BPF prog-id=86 op=UNLOAD Jul 15 11:33:28.502000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.502000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.502000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.502000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.502000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.502000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.502000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.502000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.502000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.502000 audit: BPF prog-id=87 op=LOAD Jul 15 11:33:28.502000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff32f4db50 a2=94 a3=54428f items=0 ppid=2167 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.502000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:33:28.502000 audit: BPF prog-id=87 op=UNLOAD Jul 15 11:33:28.502000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.502000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.502000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.502000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.502000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.502000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.502000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.502000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.502000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.502000 audit: BPF prog-id=88 op=LOAD Jul 15 11:33:28.502000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff32f4db80 a2=94 a3=2 items=0 ppid=2167 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.502000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:33:28.502000 audit: BPF prog-id=88 op=UNLOAD Jul 15 11:33:28.502000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.502000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff32f4da50 a2=28 a3=0 items=0 ppid=2167 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.502000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:33:28.502000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.502000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff32f4da80 a2=28 a3=0 items=0 ppid=2167 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.502000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:33:28.502000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.502000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff32f4d990 a2=28 a3=0 items=0 ppid=2167 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.502000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:33:28.502000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.502000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff32f4daa0 a2=28 a3=0 items=0 ppid=2167 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.502000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:33:28.502000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.502000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff32f4da80 a2=28 a3=0 items=0 ppid=2167 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.502000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:33:28.502000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.502000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff32f4da70 a2=28 a3=0 items=0 ppid=2167 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.502000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:33:28.502000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.502000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff32f4daa0 a2=28 a3=0 items=0 ppid=2167 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.502000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:33:28.502000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.502000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff32f4da80 a2=28 a3=0 items=0 ppid=2167 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.502000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:33:28.502000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.502000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff32f4daa0 a2=28 a3=0 items=0 ppid=2167 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.502000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:33:28.502000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.502000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff32f4da70 a2=28 a3=0 items=0 ppid=2167 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.502000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:33:28.502000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.502000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff32f4dae0 a2=28 a3=0 items=0 ppid=2167 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.502000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:33:28.502000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.502000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.502000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.502000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.502000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.502000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.502000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.502000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.502000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.502000 audit: BPF prog-id=89 op=LOAD Jul 15 11:33:28.502000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff32f4d950 a2=94 a3=0 items=0 ppid=2167 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.502000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:33:28.502000 audit: BPF prog-id=89 op=UNLOAD Jul 15 11:33:28.503000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.503000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fff32f4d940 a2=50 a3=2800 items=0 ppid=2167 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.503000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:33:28.503000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.503000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fff32f4d940 a2=50 a3=2800 items=0 ppid=2167 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.503000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:33:28.503000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.503000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.503000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.503000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.503000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.503000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.503000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.503000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.503000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.503000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.503000 audit: BPF prog-id=90 op=LOAD Jul 15 11:33:28.503000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff32f4d160 a2=94 a3=2 items=0 ppid=2167 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.503000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:33:28.503000 audit: BPF prog-id=90 op=UNLOAD Jul 15 11:33:28.503000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.503000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.503000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.503000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.503000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.503000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.503000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.503000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.503000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.503000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.503000 audit: BPF prog-id=91 op=LOAD Jul 15 11:33:28.503000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff32f4d260 a2=94 a3=30 items=0 ppid=2167 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.503000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:33:28.508000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.508000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.508000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.508000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.508000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.508000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.508000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.508000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.508000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.508000 audit: BPF prog-id=92 op=LOAD Jul 15 11:33:28.508000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe88bd42e0 a2=98 a3=0 items=0 ppid=2167 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.508000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:33:28.508000 audit: BPF prog-id=92 op=UNLOAD Jul 15 11:33:28.508000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.508000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.508000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.508000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.508000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.508000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.508000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.508000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.508000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.508000 audit: BPF prog-id=93 op=LOAD Jul 15 11:33:28.508000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe88bd40d0 a2=94 a3=54428f items=0 ppid=2167 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.508000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:33:28.508000 audit: BPF prog-id=93 op=UNLOAD Jul 15 11:33:28.508000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.508000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.508000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.508000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.508000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.508000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.508000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.508000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.508000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.508000 audit: BPF prog-id=94 op=LOAD Jul 15 11:33:28.508000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe88bd4100 a2=94 a3=2 items=0 ppid=2167 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.508000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:33:28.508000 audit: BPF prog-id=94 op=UNLOAD Jul 15 11:33:28.507717 systemd[1]: run-containerd-runc-k8s.io-dc5c2aab3b7ba4b75b0ad05d87df20085b8c7297255d25517bd579de1b013912-runc.4kfyQD.mount: Deactivated successfully. Jul 15 11:33:28.626000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.626000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.626000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.626000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.626000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.626000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.626000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.626000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.626000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.626000 audit: BPF prog-id=95 op=LOAD Jul 15 11:33:28.626000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe88bd3fc0 a2=94 a3=1 items=0 ppid=2167 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.626000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:33:28.626000 audit: BPF prog-id=95 op=UNLOAD Jul 15 11:33:28.626000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.626000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe88bd4090 a2=50 a3=7ffe88bd4170 items=0 ppid=2167 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.626000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:33:28.634000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.634000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe88bd3fd0 a2=28 a3=0 items=0 ppid=2167 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.634000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:33:28.634000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.634000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe88bd4000 a2=28 a3=0 items=0 ppid=2167 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.634000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:33:28.634000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.634000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe88bd3f10 a2=28 a3=0 items=0 ppid=2167 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.634000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:33:28.634000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.634000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe88bd4020 a2=28 a3=0 items=0 ppid=2167 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.634000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:33:28.634000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.634000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe88bd4000 a2=28 a3=0 items=0 ppid=2167 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.634000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:33:28.634000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.634000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe88bd3ff0 a2=28 a3=0 items=0 ppid=2167 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.634000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:33:28.634000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.634000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe88bd4020 a2=28 a3=0 items=0 ppid=2167 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.634000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:33:28.634000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.634000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe88bd4000 a2=28 a3=0 items=0 ppid=2167 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.634000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:33:28.634000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.634000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe88bd4020 a2=28 a3=0 items=0 ppid=2167 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.634000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:33:28.634000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.634000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe88bd3ff0 a2=28 a3=0 items=0 ppid=2167 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.634000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:33:28.635000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.635000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe88bd4060 a2=28 a3=0 items=0 ppid=2167 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.635000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:33:28.635000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.635000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe88bd3e10 a2=50 a3=1 items=0 ppid=2167 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.635000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:33:28.635000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.635000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.635000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.635000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.635000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.635000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.635000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.635000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.635000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.635000 audit: BPF prog-id=96 op=LOAD Jul 15 11:33:28.635000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe88bd3e10 a2=94 a3=5 items=0 ppid=2167 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.635000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:33:28.635000 audit: BPF prog-id=96 op=UNLOAD Jul 15 11:33:28.635000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.635000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe88bd3ec0 a2=50 a3=1 items=0 ppid=2167 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.635000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:33:28.635000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.635000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe88bd3fe0 a2=4 a3=38 items=0 ppid=2167 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.635000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:33:28.635000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.635000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.635000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.635000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.635000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.635000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.635000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.635000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.635000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.635000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.635000 audit[2319]: AVC avc: denied { confidentiality } for pid=2319 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:28.635000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe88bd4030 a2=94 a3=6 items=0 ppid=2167 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.635000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:33:28.635000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.635000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.635000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.635000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.635000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.635000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.635000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.635000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.635000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.635000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.635000 audit[2319]: AVC avc: denied { confidentiality } for pid=2319 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:28.635000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe88bd37e0 a2=94 a3=88 items=0 ppid=2167 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.635000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:33:28.635000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.635000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.635000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.635000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.635000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.635000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.635000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.635000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.635000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.635000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.635000 audit[2319]: AVC avc: denied { confidentiality } for pid=2319 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:33:28.635000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe88bd37e0 a2=94 a3=88 items=0 ppid=2167 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.635000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:33:28.636000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.636000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe88bd5210 a2=10 a3=208 items=0 ppid=2167 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.636000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:33:28.636000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.636000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe88bd50b0 a2=10 a3=3 items=0 ppid=2167 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.636000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:33:28.636000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.636000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe88bd5050 a2=10 a3=3 items=0 ppid=2167 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.636000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:33:28.636000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:28.636000 audit[2319]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe88bd5050 a2=10 a3=7 items=0 ppid=2167 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.636000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:33:28.643000 audit: BPF prog-id=91 op=UNLOAD Jul 15 11:33:28.684000 audit[2360]: NETFILTER_CFG table=mangle:77 family=2 entries=16 op=nft_register_chain pid=2360 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 15 11:33:28.684000 audit[2360]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffe013dcd10 a2=0 a3=7ffe013dccfc items=0 ppid=2167 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.684000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 15 11:33:28.689000 audit[2359]: NETFILTER_CFG table=nat:78 family=2 entries=15 op=nft_register_chain pid=2359 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 15 11:33:28.689000 audit[2359]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd0287a1e0 a2=0 a3=7ffd0287a1cc items=0 ppid=2167 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.689000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 15 11:33:28.692000 audit[2358]: NETFILTER_CFG table=raw:79 family=2 entries=21 op=nft_register_chain pid=2358 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 15 11:33:28.692000 audit[2358]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7fff68e89080 a2=0 a3=7fff68e8906c items=0 ppid=2167 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.692000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 15 11:33:28.696000 audit[2363]: NETFILTER_CFG table=filter:80 family=2 entries=39 op=nft_register_chain pid=2363 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 15 11:33:28.696000 audit[2363]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffd3f171070 a2=0 a3=7ffd3f17105c items=0 ppid=2167 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:28.696000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 15 11:33:28.790597 kubelet[1447]: E0715 11:33:28.790526 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:29.790938 kubelet[1447]: E0715 11:33:29.790857 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:30.202667 systemd-networkd[1024]: vxlan.calico: Gained IPv6LL Jul 15 11:33:30.791839 kubelet[1447]: E0715 11:33:30.791760 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:31.792186 kubelet[1447]: E0715 11:33:31.792098 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:32.792904 kubelet[1447]: E0715 11:33:32.792816 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:33.793672 kubelet[1447]: E0715 11:33:33.793607 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:34.438137 env[1204]: time="2025-07-15T11:33:34.438070377Z" level=info msg="StopPodSandbox for \"2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98\"" Jul 15 11:33:34.512959 env[1204]: 2025-07-15 11:33:34.481 [INFO][2390] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98" Jul 15 11:33:34.512959 env[1204]: 2025-07-15 11:33:34.481 [INFO][2390] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98" iface="eth0" netns="/var/run/netns/cni-b0f7aff2-8417-e158-97a2-f6b978a0110b" Jul 15 11:33:34.512959 env[1204]: 2025-07-15 11:33:34.482 [INFO][2390] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98" iface="eth0" netns="/var/run/netns/cni-b0f7aff2-8417-e158-97a2-f6b978a0110b" Jul 15 11:33:34.512959 env[1204]: 2025-07-15 11:33:34.482 [INFO][2390] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98" iface="eth0" netns="/var/run/netns/cni-b0f7aff2-8417-e158-97a2-f6b978a0110b" Jul 15 11:33:34.512959 env[1204]: 2025-07-15 11:33:34.482 [INFO][2390] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98" Jul 15 11:33:34.512959 env[1204]: 2025-07-15 11:33:34.482 [INFO][2390] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98" Jul 15 11:33:34.512959 env[1204]: 2025-07-15 11:33:34.501 [INFO][2399] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98" HandleID="k8s-pod-network.2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98" Workload="10.0.0.93-k8s-csi--node--driver--hr46c-eth0" Jul 15 11:33:34.512959 env[1204]: 2025-07-15 11:33:34.501 [INFO][2399] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 15 11:33:34.512959 env[1204]: 2025-07-15 11:33:34.502 [INFO][2399] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 15 11:33:34.512959 env[1204]: 2025-07-15 11:33:34.507 [WARNING][2399] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98" HandleID="k8s-pod-network.2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98" Workload="10.0.0.93-k8s-csi--node--driver--hr46c-eth0" Jul 15 11:33:34.512959 env[1204]: 2025-07-15 11:33:34.507 [INFO][2399] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98" HandleID="k8s-pod-network.2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98" Workload="10.0.0.93-k8s-csi--node--driver--hr46c-eth0" Jul 15 11:33:34.512959 env[1204]: 2025-07-15 11:33:34.509 [INFO][2399] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 15 11:33:34.512959 env[1204]: 2025-07-15 11:33:34.511 [INFO][2390] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98" Jul 15 11:33:34.513460 env[1204]: time="2025-07-15T11:33:34.513220723Z" level=info msg="TearDown network for sandbox \"2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98\" successfully" Jul 15 11:33:34.513460 env[1204]: time="2025-07-15T11:33:34.513256908Z" level=info msg="StopPodSandbox for \"2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98\" returns successfully" Jul 15 11:33:34.514302 env[1204]: time="2025-07-15T11:33:34.514244443Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-hr46c,Uid:9b48e368-c013-407a-bd57-d9a453d3ba47,Namespace:calico-system,Attempt:1,}" Jul 15 11:33:34.515134 systemd[1]: run-netns-cni\x2db0f7aff2\x2d8417\x2de158\x2d97a2\x2df6b978a0110b.mount: Deactivated successfully. Jul 15 11:33:34.608904 systemd-networkd[1024]: calie87f9cc6e72: Link UP Jul 15 11:33:34.611356 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 15 11:33:34.611615 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie87f9cc6e72: link becomes ready Jul 15 11:33:34.611649 systemd-networkd[1024]: calie87f9cc6e72: Gained carrier Jul 15 11:33:34.623571 env[1204]: 2025-07-15 11:33:34.554 [INFO][2406] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.93-k8s-csi--node--driver--hr46c-eth0 csi-node-driver- calico-system 9b48e368-c013-407a-bd57-d9a453d3ba47 1247 0 2025-07-15 11:33:04 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:57bd658777 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.0.0.93 csi-node-driver-hr46c eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calie87f9cc6e72 [] [] }} ContainerID="342260c893099b68018f0ae58d8cc4fcd768fd094ffcc4ab20ca9e58d86baa4b" Namespace="calico-system" Pod="csi-node-driver-hr46c" WorkloadEndpoint="10.0.0.93-k8s-csi--node--driver--hr46c-" Jul 15 11:33:34.623571 env[1204]: 2025-07-15 11:33:34.554 [INFO][2406] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="342260c893099b68018f0ae58d8cc4fcd768fd094ffcc4ab20ca9e58d86baa4b" Namespace="calico-system" Pod="csi-node-driver-hr46c" WorkloadEndpoint="10.0.0.93-k8s-csi--node--driver--hr46c-eth0" Jul 15 11:33:34.623571 env[1204]: 2025-07-15 11:33:34.576 [INFO][2421] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="342260c893099b68018f0ae58d8cc4fcd768fd094ffcc4ab20ca9e58d86baa4b" HandleID="k8s-pod-network.342260c893099b68018f0ae58d8cc4fcd768fd094ffcc4ab20ca9e58d86baa4b" Workload="10.0.0.93-k8s-csi--node--driver--hr46c-eth0" Jul 15 11:33:34.623571 env[1204]: 2025-07-15 11:33:34.576 [INFO][2421] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="342260c893099b68018f0ae58d8cc4fcd768fd094ffcc4ab20ca9e58d86baa4b" HandleID="k8s-pod-network.342260c893099b68018f0ae58d8cc4fcd768fd094ffcc4ab20ca9e58d86baa4b" Workload="10.0.0.93-k8s-csi--node--driver--hr46c-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004f7b0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.93", "pod":"csi-node-driver-hr46c", "timestamp":"2025-07-15 11:33:34.576042997 +0000 UTC"}, Hostname:"10.0.0.93", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 15 11:33:34.623571 env[1204]: 2025-07-15 11:33:34.576 [INFO][2421] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 15 11:33:34.623571 env[1204]: 2025-07-15 11:33:34.576 [INFO][2421] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 15 11:33:34.623571 env[1204]: 2025-07-15 11:33:34.576 [INFO][2421] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.93' Jul 15 11:33:34.623571 env[1204]: 2025-07-15 11:33:34.583 [INFO][2421] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.342260c893099b68018f0ae58d8cc4fcd768fd094ffcc4ab20ca9e58d86baa4b" host="10.0.0.93" Jul 15 11:33:34.623571 env[1204]: 2025-07-15 11:33:34.587 [INFO][2421] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.93" Jul 15 11:33:34.623571 env[1204]: 2025-07-15 11:33:34.591 [INFO][2421] ipam/ipam.go 511: Trying affinity for 192.168.75.192/26 host="10.0.0.93" Jul 15 11:33:34.623571 env[1204]: 2025-07-15 11:33:34.592 [INFO][2421] ipam/ipam.go 158: Attempting to load block cidr=192.168.75.192/26 host="10.0.0.93" Jul 15 11:33:34.623571 env[1204]: 2025-07-15 11:33:34.594 [INFO][2421] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.75.192/26 host="10.0.0.93" Jul 15 11:33:34.623571 env[1204]: 2025-07-15 11:33:34.594 [INFO][2421] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.75.192/26 handle="k8s-pod-network.342260c893099b68018f0ae58d8cc4fcd768fd094ffcc4ab20ca9e58d86baa4b" host="10.0.0.93" Jul 15 11:33:34.623571 env[1204]: 2025-07-15 11:33:34.596 [INFO][2421] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.342260c893099b68018f0ae58d8cc4fcd768fd094ffcc4ab20ca9e58d86baa4b Jul 15 11:33:34.623571 env[1204]: 2025-07-15 11:33:34.599 [INFO][2421] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.75.192/26 handle="k8s-pod-network.342260c893099b68018f0ae58d8cc4fcd768fd094ffcc4ab20ca9e58d86baa4b" host="10.0.0.93" Jul 15 11:33:34.623571 env[1204]: 2025-07-15 11:33:34.604 [INFO][2421] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.75.193/26] block=192.168.75.192/26 handle="k8s-pod-network.342260c893099b68018f0ae58d8cc4fcd768fd094ffcc4ab20ca9e58d86baa4b" host="10.0.0.93" Jul 15 11:33:34.623571 env[1204]: 2025-07-15 11:33:34.604 [INFO][2421] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.75.193/26] handle="k8s-pod-network.342260c893099b68018f0ae58d8cc4fcd768fd094ffcc4ab20ca9e58d86baa4b" host="10.0.0.93" Jul 15 11:33:34.623571 env[1204]: 2025-07-15 11:33:34.604 [INFO][2421] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 15 11:33:34.623571 env[1204]: 2025-07-15 11:33:34.604 [INFO][2421] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.75.193/26] IPv6=[] ContainerID="342260c893099b68018f0ae58d8cc4fcd768fd094ffcc4ab20ca9e58d86baa4b" HandleID="k8s-pod-network.342260c893099b68018f0ae58d8cc4fcd768fd094ffcc4ab20ca9e58d86baa4b" Workload="10.0.0.93-k8s-csi--node--driver--hr46c-eth0" Jul 15 11:33:34.624262 env[1204]: 2025-07-15 11:33:34.606 [INFO][2406] cni-plugin/k8s.go 418: Populated endpoint ContainerID="342260c893099b68018f0ae58d8cc4fcd768fd094ffcc4ab20ca9e58d86baa4b" Namespace="calico-system" Pod="csi-node-driver-hr46c" WorkloadEndpoint="10.0.0.93-k8s-csi--node--driver--hr46c-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.93-k8s-csi--node--driver--hr46c-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"9b48e368-c013-407a-bd57-d9a453d3ba47", ResourceVersion:"1247", Generation:0, CreationTimestamp:time.Date(2025, time.July, 15, 11, 33, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"57bd658777", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.93", ContainerID:"", Pod:"csi-node-driver-hr46c", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.75.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calie87f9cc6e72", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 15 11:33:34.624262 env[1204]: 2025-07-15 11:33:34.606 [INFO][2406] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.75.193/32] ContainerID="342260c893099b68018f0ae58d8cc4fcd768fd094ffcc4ab20ca9e58d86baa4b" Namespace="calico-system" Pod="csi-node-driver-hr46c" WorkloadEndpoint="10.0.0.93-k8s-csi--node--driver--hr46c-eth0" Jul 15 11:33:34.624262 env[1204]: 2025-07-15 11:33:34.606 [INFO][2406] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calie87f9cc6e72 ContainerID="342260c893099b68018f0ae58d8cc4fcd768fd094ffcc4ab20ca9e58d86baa4b" Namespace="calico-system" Pod="csi-node-driver-hr46c" WorkloadEndpoint="10.0.0.93-k8s-csi--node--driver--hr46c-eth0" Jul 15 11:33:34.624262 env[1204]: 2025-07-15 11:33:34.611 [INFO][2406] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="342260c893099b68018f0ae58d8cc4fcd768fd094ffcc4ab20ca9e58d86baa4b" Namespace="calico-system" Pod="csi-node-driver-hr46c" WorkloadEndpoint="10.0.0.93-k8s-csi--node--driver--hr46c-eth0" Jul 15 11:33:34.624262 env[1204]: 2025-07-15 11:33:34.612 [INFO][2406] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="342260c893099b68018f0ae58d8cc4fcd768fd094ffcc4ab20ca9e58d86baa4b" Namespace="calico-system" Pod="csi-node-driver-hr46c" WorkloadEndpoint="10.0.0.93-k8s-csi--node--driver--hr46c-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.93-k8s-csi--node--driver--hr46c-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"9b48e368-c013-407a-bd57-d9a453d3ba47", ResourceVersion:"1247", Generation:0, CreationTimestamp:time.Date(2025, time.July, 15, 11, 33, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"57bd658777", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.93", ContainerID:"342260c893099b68018f0ae58d8cc4fcd768fd094ffcc4ab20ca9e58d86baa4b", Pod:"csi-node-driver-hr46c", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.75.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calie87f9cc6e72", MAC:"e2:aa:1e:2f:a0:ef", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 15 11:33:34.624262 env[1204]: 2025-07-15 11:33:34.621 [INFO][2406] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="342260c893099b68018f0ae58d8cc4fcd768fd094ffcc4ab20ca9e58d86baa4b" Namespace="calico-system" Pod="csi-node-driver-hr46c" WorkloadEndpoint="10.0.0.93-k8s-csi--node--driver--hr46c-eth0" Jul 15 11:33:34.633019 env[1204]: time="2025-07-15T11:33:34.632964062Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 15 11:33:34.633211 env[1204]: time="2025-07-15T11:33:34.633174153Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 15 11:33:34.633330 env[1204]: time="2025-07-15T11:33:34.633297707Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 15 11:33:34.633625 env[1204]: time="2025-07-15T11:33:34.633556344Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/342260c893099b68018f0ae58d8cc4fcd768fd094ffcc4ab20ca9e58d86baa4b pid=2449 runtime=io.containerd.runc.v2 Jul 15 11:33:34.646618 systemd[1]: Started cri-containerd-342260c893099b68018f0ae58d8cc4fcd768fd094ffcc4ab20ca9e58d86baa4b.scope. Jul 15 11:33:34.634000 audit[2443]: NETFILTER_CFG table=filter:81 family=2 entries=38 op=nft_register_chain pid=2443 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 15 11:33:34.651646 kernel: kauditd_printk_skb: 547 callbacks suppressed Jul 15 11:33:34.651694 kernel: audit: type=1325 audit(1752579214.634:653): table=filter:81 family=2 entries=38 op=nft_register_chain pid=2443 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 15 11:33:34.634000 audit[2443]: SYSCALL arch=c000003e syscall=46 success=yes exit=21364 a0=3 a1=7ffcc624d1f0 a2=0 a3=7ffcc624d1dc items=0 ppid=2167 pid=2443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:34.658277 kernel: audit: type=1300 audit(1752579214.634:653): arch=c000003e syscall=46 success=yes exit=21364 a0=3 a1=7ffcc624d1f0 a2=0 a3=7ffcc624d1dc items=0 ppid=2167 pid=2443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:34.658325 kernel: audit: type=1327 audit(1752579214.634:653): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 15 11:33:34.634000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 15 11:33:34.660789 kernel: audit: type=1400 audit(1752579214.658:654): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:34.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:34.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:34.666363 kernel: audit: type=1400 audit(1752579214.658:655): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:34.666413 kernel: audit: type=1400 audit(1752579214.658:656): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:34.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:34.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:34.672272 kernel: audit: type=1400 audit(1752579214.658:657): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:34.672320 kernel: audit: type=1400 audit(1752579214.658:658): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:34.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:34.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:34.675251 systemd-resolved[1143]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 15 11:33:34.678080 kernel: audit: type=1400 audit(1752579214.658:659): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:34.681056 kernel: audit: type=1400 audit(1752579214.658:660): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:34.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:34.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:34.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:34.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:34.663000 audit: BPF prog-id=97 op=LOAD Jul 15 11:33:34.663000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:34.663000 audit[2459]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2449 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:34.663000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334323236306338393330393962363830313866306165353864386363 Jul 15 11:33:34.663000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:34.663000 audit[2459]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2449 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:34.663000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334323236306338393330393962363830313866306165353864386363 Jul 15 11:33:34.663000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:34.663000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:34.663000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:34.663000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:34.663000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:34.663000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:34.663000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:34.663000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:34.663000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:34.663000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:34.663000 audit: BPF prog-id=98 op=LOAD Jul 15 11:33:34.663000 audit[2459]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000202cb0 items=0 ppid=2449 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:34.663000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334323236306338393330393962363830313866306165353864386363 Jul 15 11:33:34.666000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:34.666000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:34.666000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:34.666000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:34.666000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:34.666000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:34.666000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:34.666000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:34.666000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:34.666000 audit: BPF prog-id=99 op=LOAD Jul 15 11:33:34.666000 audit[2459]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000202cf8 items=0 ppid=2449 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:34.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334323236306338393330393962363830313866306165353864386363 Jul 15 11:33:34.669000 audit: BPF prog-id=99 op=UNLOAD Jul 15 11:33:34.669000 audit: BPF prog-id=98 op=UNLOAD Jul 15 11:33:34.669000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:34.669000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:34.669000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:34.669000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:34.669000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:34.669000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:34.669000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:34.669000 audit[2459]: AVC avc: denied { perfmon } for pid=2459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:34.669000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:34.669000 audit[2459]: AVC avc: denied { bpf } for pid=2459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:34.669000 audit: BPF prog-id=100 op=LOAD Jul 15 11:33:34.669000 audit[2459]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000203108 items=0 ppid=2449 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:34.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334323236306338393330393962363830313866306165353864386363 Jul 15 11:33:34.690521 env[1204]: time="2025-07-15T11:33:34.690409407Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-hr46c,Uid:9b48e368-c013-407a-bd57-d9a453d3ba47,Namespace:calico-system,Attempt:1,} returns sandbox id \"342260c893099b68018f0ae58d8cc4fcd768fd094ffcc4ab20ca9e58d86baa4b\"" Jul 15 11:33:34.692875 env[1204]: time="2025-07-15T11:33:34.692826209Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.2\"" Jul 15 11:33:34.794766 kubelet[1447]: E0715 11:33:34.794707 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:35.795540 kubelet[1447]: E0715 11:33:35.795461 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:36.282410 systemd-networkd[1024]: calie87f9cc6e72: Gained IPv6LL Jul 15 11:33:36.482581 env[1204]: time="2025-07-15T11:33:36.482526789Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:36.484760 env[1204]: time="2025-07-15T11:33:36.484707642Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c7fd1cc652979d89a51bbcc125e28e90c9815c0bd8f922a5bd36eed4e1927c6d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:36.486267 env[1204]: time="2025-07-15T11:33:36.486229348Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:36.487793 env[1204]: time="2025-07-15T11:33:36.487768806Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e570128aa8067a2f06b96d3cc98afa2e0a4b9790b435ee36ca051c8e72aeb8d0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:36.488214 env[1204]: time="2025-07-15T11:33:36.488191782Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.2\" returns image reference \"sha256:c7fd1cc652979d89a51bbcc125e28e90c9815c0bd8f922a5bd36eed4e1927c6d\"" Jul 15 11:33:36.490284 env[1204]: time="2025-07-15T11:33:36.490260202Z" level=info msg="CreateContainer within sandbox \"342260c893099b68018f0ae58d8cc4fcd768fd094ffcc4ab20ca9e58d86baa4b\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Jul 15 11:33:36.505306 env[1204]: time="2025-07-15T11:33:36.505264441Z" level=info msg="CreateContainer within sandbox \"342260c893099b68018f0ae58d8cc4fcd768fd094ffcc4ab20ca9e58d86baa4b\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"876fd37daa22592d82cd096f99f5b4da6e8640bdff42383fe6e7055bd7c70d35\"" Jul 15 11:33:36.505767 env[1204]: time="2025-07-15T11:33:36.505732632Z" level=info msg="StartContainer for \"876fd37daa22592d82cd096f99f5b4da6e8640bdff42383fe6e7055bd7c70d35\"" Jul 15 11:33:36.524496 systemd[1]: run-containerd-runc-k8s.io-876fd37daa22592d82cd096f99f5b4da6e8640bdff42383fe6e7055bd7c70d35-runc.lfwKXH.mount: Deactivated successfully. Jul 15 11:33:36.526345 systemd[1]: Started cri-containerd-876fd37daa22592d82cd096f99f5b4da6e8640bdff42383fe6e7055bd7c70d35.scope. Jul 15 11:33:36.537000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:36.537000 audit[2492]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f0b207961b8 items=0 ppid=2449 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:36.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837366664333764616132323539326438326364303936663939663562 Jul 15 11:33:36.537000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:36.537000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:36.537000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:36.537000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:36.537000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:36.537000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:36.537000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:36.537000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:36.537000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:36.537000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:36.537000 audit: BPF prog-id=101 op=LOAD Jul 15 11:33:36.537000 audit[2492]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000340b58 items=0 ppid=2449 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:36.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837366664333764616132323539326438326364303936663939663562 Jul 15 11:33:36.537000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:36.537000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:36.537000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:36.537000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:36.537000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:36.537000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:36.537000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:36.537000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:36.537000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:36.537000 audit: BPF prog-id=102 op=LOAD Jul 15 11:33:36.537000 audit[2492]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000340ba8 items=0 ppid=2449 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:36.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837366664333764616132323539326438326364303936663939663562 Jul 15 11:33:36.537000 audit: BPF prog-id=102 op=UNLOAD Jul 15 11:33:36.537000 audit: BPF prog-id=101 op=UNLOAD Jul 15 11:33:36.537000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:36.537000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:36.537000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:36.537000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:36.537000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:36.537000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:36.537000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:36.537000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:36.537000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:36.537000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:36.537000 audit: BPF prog-id=103 op=LOAD Jul 15 11:33:36.537000 audit[2492]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000340c38 items=0 ppid=2449 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:36.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837366664333764616132323539326438326364303936663939663562 Jul 15 11:33:36.551197 env[1204]: time="2025-07-15T11:33:36.551089979Z" level=info msg="StartContainer for \"876fd37daa22592d82cd096f99f5b4da6e8640bdff42383fe6e7055bd7c70d35\" returns successfully" Jul 15 11:33:36.552452 env[1204]: time="2025-07-15T11:33:36.552427847Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2\"" Jul 15 11:33:36.796371 kubelet[1447]: E0715 11:33:36.796209 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:37.797315 kubelet[1447]: E0715 11:33:37.797259 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:38.797703 kubelet[1447]: E0715 11:33:38.797612 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:39.305487 env[1204]: time="2025-07-15T11:33:39.305417038Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:39.307422 env[1204]: time="2025-07-15T11:33:39.307362368Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9e48822a4fe26f4ed9231b361fdd1357ea3567f1fc0a8db4d616622fe570a866,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:39.308599 env[1204]: time="2025-07-15T11:33:39.308576305Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:39.310399 env[1204]: time="2025-07-15T11:33:39.310377389Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:8fec2de12dfa51bae89d941938a07af2598eb8bfcab55d0dded1d9c193d7b99f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:39.310723 env[1204]: time="2025-07-15T11:33:39.310681808Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2\" returns image reference \"sha256:9e48822a4fe26f4ed9231b361fdd1357ea3567f1fc0a8db4d616622fe570a866\"" Jul 15 11:33:39.313227 env[1204]: time="2025-07-15T11:33:39.313188969Z" level=info msg="CreateContainer within sandbox \"342260c893099b68018f0ae58d8cc4fcd768fd094ffcc4ab20ca9e58d86baa4b\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Jul 15 11:33:39.328293 env[1204]: time="2025-07-15T11:33:39.328241620Z" level=info msg="CreateContainer within sandbox \"342260c893099b68018f0ae58d8cc4fcd768fd094ffcc4ab20ca9e58d86baa4b\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"948ab6e2021b8c96fc4e6a85905f91232a16a024987fa7d180b1db05ad88ba83\"" Jul 15 11:33:39.328804 env[1204]: time="2025-07-15T11:33:39.328761717Z" level=info msg="StartContainer for \"948ab6e2021b8c96fc4e6a85905f91232a16a024987fa7d180b1db05ad88ba83\"" Jul 15 11:33:39.353226 systemd[1]: Started cri-containerd-948ab6e2021b8c96fc4e6a85905f91232a16a024987fa7d180b1db05ad88ba83.scope. Jul 15 11:33:39.365000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.365000 audit[2535]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fa348ae1b58 items=0 ppid=2449 pid=2535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:39.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934386162366532303231623863393666633465366138353930356639 Jul 15 11:33:39.366000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.366000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.366000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.366000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.366000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.366000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.366000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.366000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.366000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.366000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.366000 audit: BPF prog-id=104 op=LOAD Jul 15 11:33:39.366000 audit[2535]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002cbba8 items=0 ppid=2449 pid=2535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:39.366000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934386162366532303231623863393666633465366138353930356639 Jul 15 11:33:39.366000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.366000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.366000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.366000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.366000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.366000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.366000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.366000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.366000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.366000 audit: BPF prog-id=105 op=LOAD Jul 15 11:33:39.366000 audit[2535]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002cbbf8 items=0 ppid=2449 pid=2535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:39.366000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934386162366532303231623863393666633465366138353930356639 Jul 15 11:33:39.366000 audit: BPF prog-id=105 op=UNLOAD Jul 15 11:33:39.366000 audit: BPF prog-id=104 op=UNLOAD Jul 15 11:33:39.366000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.366000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.366000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.366000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.366000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.366000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.366000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.366000 audit[2535]: AVC avc: denied { perfmon } for pid=2535 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.366000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.366000 audit[2535]: AVC avc: denied { bpf } for pid=2535 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.366000 audit: BPF prog-id=106 op=LOAD Jul 15 11:33:39.366000 audit[2535]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002cbc88 items=0 ppid=2449 pid=2535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:39.366000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934386162366532303231623863393666633465366138353930356639 Jul 15 11:33:39.438888 env[1204]: time="2025-07-15T11:33:39.438809281Z" level=info msg="StopPodSandbox for \"fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e\"" Jul 15 11:33:39.443021 kubelet[1447]: I0715 11:33:39.442986 1447 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Jul 15 11:33:39.443201 kubelet[1447]: I0715 11:33:39.443034 1447 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Jul 15 11:33:39.583341 env[1204]: time="2025-07-15T11:33:39.583166517Z" level=info msg="StartContainer for \"948ab6e2021b8c96fc4e6a85905f91232a16a024987fa7d180b1db05ad88ba83\" returns successfully" Jul 15 11:33:39.614309 env[1204]: 2025-07-15 11:33:39.585 [INFO][2578] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e" Jul 15 11:33:39.614309 env[1204]: 2025-07-15 11:33:39.585 [INFO][2578] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e" iface="eth0" netns="/var/run/netns/cni-18d46e0c-13b3-0e61-9746-725b8bf51ab9" Jul 15 11:33:39.614309 env[1204]: 2025-07-15 11:33:39.585 [INFO][2578] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e" iface="eth0" netns="/var/run/netns/cni-18d46e0c-13b3-0e61-9746-725b8bf51ab9" Jul 15 11:33:39.614309 env[1204]: 2025-07-15 11:33:39.586 [INFO][2578] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e" iface="eth0" netns="/var/run/netns/cni-18d46e0c-13b3-0e61-9746-725b8bf51ab9" Jul 15 11:33:39.614309 env[1204]: 2025-07-15 11:33:39.586 [INFO][2578] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e" Jul 15 11:33:39.614309 env[1204]: 2025-07-15 11:33:39.586 [INFO][2578] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e" Jul 15 11:33:39.614309 env[1204]: 2025-07-15 11:33:39.604 [INFO][2587] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e" HandleID="k8s-pod-network.fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e" Workload="10.0.0.93-k8s-nginx--deployment--8587fbcb89--hrpzx-eth0" Jul 15 11:33:39.614309 env[1204]: 2025-07-15 11:33:39.604 [INFO][2587] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 15 11:33:39.614309 env[1204]: 2025-07-15 11:33:39.605 [INFO][2587] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 15 11:33:39.614309 env[1204]: 2025-07-15 11:33:39.610 [WARNING][2587] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e" HandleID="k8s-pod-network.fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e" Workload="10.0.0.93-k8s-nginx--deployment--8587fbcb89--hrpzx-eth0" Jul 15 11:33:39.614309 env[1204]: 2025-07-15 11:33:39.610 [INFO][2587] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e" HandleID="k8s-pod-network.fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e" Workload="10.0.0.93-k8s-nginx--deployment--8587fbcb89--hrpzx-eth0" Jul 15 11:33:39.614309 env[1204]: 2025-07-15 11:33:39.611 [INFO][2587] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 15 11:33:39.614309 env[1204]: 2025-07-15 11:33:39.613 [INFO][2578] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e" Jul 15 11:33:39.614883 env[1204]: time="2025-07-15T11:33:39.614480152Z" level=info msg="TearDown network for sandbox \"fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e\" successfully" Jul 15 11:33:39.614883 env[1204]: time="2025-07-15T11:33:39.614517577Z" level=info msg="StopPodSandbox for \"fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e\" returns successfully" Jul 15 11:33:39.615210 env[1204]: time="2025-07-15T11:33:39.615178613Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-hrpzx,Uid:80fa4cc0-c178-4747-9505-57a0c7197bf4,Namespace:default,Attempt:1,}" Jul 15 11:33:39.617479 systemd[1]: run-netns-cni\x2d18d46e0c\x2d13b3\x2d0e61\x2d9746\x2d725b8bf51ab9.mount: Deactivated successfully. Jul 15 11:33:39.716912 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 15 11:33:39.717833 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali30c459366f0: link becomes ready Jul 15 11:33:39.716278 systemd-networkd[1024]: cali30c459366f0: Link UP Jul 15 11:33:39.717204 systemd-networkd[1024]: cali30c459366f0: Gained carrier Jul 15 11:33:39.726879 env[1204]: 2025-07-15 11:33:39.656 [INFO][2595] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.93-k8s-nginx--deployment--8587fbcb89--hrpzx-eth0 nginx-deployment-8587fbcb89- default 80fa4cc0-c178-4747-9505-57a0c7197bf4 1272 0 2025-07-15 11:33:23 +0000 UTC map[app:nginx pod-template-hash:8587fbcb89 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.93 nginx-deployment-8587fbcb89-hrpzx eth0 default [] [] [kns.default ksa.default.default] cali30c459366f0 [] [] }} ContainerID="865f12b6a7191aa9a46cbe1345b44004e860e6e388f7e34a163181449595274e" Namespace="default" Pod="nginx-deployment-8587fbcb89-hrpzx" WorkloadEndpoint="10.0.0.93-k8s-nginx--deployment--8587fbcb89--hrpzx-" Jul 15 11:33:39.726879 env[1204]: 2025-07-15 11:33:39.656 [INFO][2595] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="865f12b6a7191aa9a46cbe1345b44004e860e6e388f7e34a163181449595274e" Namespace="default" Pod="nginx-deployment-8587fbcb89-hrpzx" WorkloadEndpoint="10.0.0.93-k8s-nginx--deployment--8587fbcb89--hrpzx-eth0" Jul 15 11:33:39.726879 env[1204]: 2025-07-15 11:33:39.677 [INFO][2609] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="865f12b6a7191aa9a46cbe1345b44004e860e6e388f7e34a163181449595274e" HandleID="k8s-pod-network.865f12b6a7191aa9a46cbe1345b44004e860e6e388f7e34a163181449595274e" Workload="10.0.0.93-k8s-nginx--deployment--8587fbcb89--hrpzx-eth0" Jul 15 11:33:39.726879 env[1204]: 2025-07-15 11:33:39.677 [INFO][2609] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="865f12b6a7191aa9a46cbe1345b44004e860e6e388f7e34a163181449595274e" HandleID="k8s-pod-network.865f12b6a7191aa9a46cbe1345b44004e860e6e388f7e34a163181449595274e" Workload="10.0.0.93-k8s-nginx--deployment--8587fbcb89--hrpzx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004f3f0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.93", "pod":"nginx-deployment-8587fbcb89-hrpzx", "timestamp":"2025-07-15 11:33:39.677315515 +0000 UTC"}, Hostname:"10.0.0.93", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 15 11:33:39.726879 env[1204]: 2025-07-15 11:33:39.677 [INFO][2609] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 15 11:33:39.726879 env[1204]: 2025-07-15 11:33:39.677 [INFO][2609] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 15 11:33:39.726879 env[1204]: 2025-07-15 11:33:39.677 [INFO][2609] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.93' Jul 15 11:33:39.726879 env[1204]: 2025-07-15 11:33:39.686 [INFO][2609] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.865f12b6a7191aa9a46cbe1345b44004e860e6e388f7e34a163181449595274e" host="10.0.0.93" Jul 15 11:33:39.726879 env[1204]: 2025-07-15 11:33:39.691 [INFO][2609] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.93" Jul 15 11:33:39.726879 env[1204]: 2025-07-15 11:33:39.695 [INFO][2609] ipam/ipam.go 511: Trying affinity for 192.168.75.192/26 host="10.0.0.93" Jul 15 11:33:39.726879 env[1204]: 2025-07-15 11:33:39.696 [INFO][2609] ipam/ipam.go 158: Attempting to load block cidr=192.168.75.192/26 host="10.0.0.93" Jul 15 11:33:39.726879 env[1204]: 2025-07-15 11:33:39.698 [INFO][2609] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.75.192/26 host="10.0.0.93" Jul 15 11:33:39.726879 env[1204]: 2025-07-15 11:33:39.698 [INFO][2609] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.75.192/26 handle="k8s-pod-network.865f12b6a7191aa9a46cbe1345b44004e860e6e388f7e34a163181449595274e" host="10.0.0.93" Jul 15 11:33:39.726879 env[1204]: 2025-07-15 11:33:39.700 [INFO][2609] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.865f12b6a7191aa9a46cbe1345b44004e860e6e388f7e34a163181449595274e Jul 15 11:33:39.726879 env[1204]: 2025-07-15 11:33:39.703 [INFO][2609] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.75.192/26 handle="k8s-pod-network.865f12b6a7191aa9a46cbe1345b44004e860e6e388f7e34a163181449595274e" host="10.0.0.93" Jul 15 11:33:39.726879 env[1204]: 2025-07-15 11:33:39.709 [INFO][2609] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.75.194/26] block=192.168.75.192/26 handle="k8s-pod-network.865f12b6a7191aa9a46cbe1345b44004e860e6e388f7e34a163181449595274e" host="10.0.0.93" Jul 15 11:33:39.726879 env[1204]: 2025-07-15 11:33:39.709 [INFO][2609] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.75.194/26] handle="k8s-pod-network.865f12b6a7191aa9a46cbe1345b44004e860e6e388f7e34a163181449595274e" host="10.0.0.93" Jul 15 11:33:39.726879 env[1204]: 2025-07-15 11:33:39.709 [INFO][2609] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 15 11:33:39.726879 env[1204]: 2025-07-15 11:33:39.709 [INFO][2609] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.75.194/26] IPv6=[] ContainerID="865f12b6a7191aa9a46cbe1345b44004e860e6e388f7e34a163181449595274e" HandleID="k8s-pod-network.865f12b6a7191aa9a46cbe1345b44004e860e6e388f7e34a163181449595274e" Workload="10.0.0.93-k8s-nginx--deployment--8587fbcb89--hrpzx-eth0" Jul 15 11:33:39.727787 env[1204]: 2025-07-15 11:33:39.711 [INFO][2595] cni-plugin/k8s.go 418: Populated endpoint ContainerID="865f12b6a7191aa9a46cbe1345b44004e860e6e388f7e34a163181449595274e" Namespace="default" Pod="nginx-deployment-8587fbcb89-hrpzx" WorkloadEndpoint="10.0.0.93-k8s-nginx--deployment--8587fbcb89--hrpzx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.93-k8s-nginx--deployment--8587fbcb89--hrpzx-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"80fa4cc0-c178-4747-9505-57a0c7197bf4", ResourceVersion:"1272", Generation:0, CreationTimestamp:time.Date(2025, time.July, 15, 11, 33, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.93", ContainerID:"", Pod:"nginx-deployment-8587fbcb89-hrpzx", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.75.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali30c459366f0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 15 11:33:39.727787 env[1204]: 2025-07-15 11:33:39.711 [INFO][2595] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.75.194/32] ContainerID="865f12b6a7191aa9a46cbe1345b44004e860e6e388f7e34a163181449595274e" Namespace="default" Pod="nginx-deployment-8587fbcb89-hrpzx" WorkloadEndpoint="10.0.0.93-k8s-nginx--deployment--8587fbcb89--hrpzx-eth0" Jul 15 11:33:39.727787 env[1204]: 2025-07-15 11:33:39.711 [INFO][2595] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali30c459366f0 ContainerID="865f12b6a7191aa9a46cbe1345b44004e860e6e388f7e34a163181449595274e" Namespace="default" Pod="nginx-deployment-8587fbcb89-hrpzx" WorkloadEndpoint="10.0.0.93-k8s-nginx--deployment--8587fbcb89--hrpzx-eth0" Jul 15 11:33:39.727787 env[1204]: 2025-07-15 11:33:39.717 [INFO][2595] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="865f12b6a7191aa9a46cbe1345b44004e860e6e388f7e34a163181449595274e" Namespace="default" Pod="nginx-deployment-8587fbcb89-hrpzx" WorkloadEndpoint="10.0.0.93-k8s-nginx--deployment--8587fbcb89--hrpzx-eth0" Jul 15 11:33:39.727787 env[1204]: 2025-07-15 11:33:39.717 [INFO][2595] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="865f12b6a7191aa9a46cbe1345b44004e860e6e388f7e34a163181449595274e" Namespace="default" Pod="nginx-deployment-8587fbcb89-hrpzx" WorkloadEndpoint="10.0.0.93-k8s-nginx--deployment--8587fbcb89--hrpzx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.93-k8s-nginx--deployment--8587fbcb89--hrpzx-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"80fa4cc0-c178-4747-9505-57a0c7197bf4", ResourceVersion:"1272", Generation:0, CreationTimestamp:time.Date(2025, time.July, 15, 11, 33, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.93", ContainerID:"865f12b6a7191aa9a46cbe1345b44004e860e6e388f7e34a163181449595274e", Pod:"nginx-deployment-8587fbcb89-hrpzx", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.75.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali30c459366f0", MAC:"6e:f7:a4:5c:e2:43", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 15 11:33:39.727787 env[1204]: 2025-07-15 11:33:39.725 [INFO][2595] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="865f12b6a7191aa9a46cbe1345b44004e860e6e388f7e34a163181449595274e" Namespace="default" Pod="nginx-deployment-8587fbcb89-hrpzx" WorkloadEndpoint="10.0.0.93-k8s-nginx--deployment--8587fbcb89--hrpzx-eth0" Jul 15 11:33:39.736091 env[1204]: time="2025-07-15T11:33:39.736015472Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 15 11:33:39.736091 env[1204]: time="2025-07-15T11:33:39.736063731Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 15 11:33:39.736369 env[1204]: time="2025-07-15T11:33:39.736292529Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 15 11:33:39.736578 env[1204]: time="2025-07-15T11:33:39.736527480Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/865f12b6a7191aa9a46cbe1345b44004e860e6e388f7e34a163181449595274e pid=2637 runtime=io.containerd.runc.v2 Jul 15 11:33:39.735000 audit[2638]: NETFILTER_CFG table=filter:82 family=2 entries=42 op=nft_register_chain pid=2638 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 15 11:33:39.737811 kernel: kauditd_printk_skb: 136 callbacks suppressed Jul 15 11:33:39.737877 kernel: audit: type=1325 audit(1752579219.735:684): table=filter:82 family=2 entries=42 op=nft_register_chain pid=2638 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 15 11:33:39.735000 audit[2638]: SYSCALL arch=c000003e syscall=46 success=yes exit=22512 a0=3 a1=7ffd55c2cab0 a2=0 a3=7ffd55c2ca9c items=0 ppid=2167 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:39.745653 kernel: audit: type=1300 audit(1752579219.735:684): arch=c000003e syscall=46 success=yes exit=22512 a0=3 a1=7ffd55c2cab0 a2=0 a3=7ffd55c2ca9c items=0 ppid=2167 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:39.745714 kernel: audit: type=1327 audit(1752579219.735:684): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 15 11:33:39.735000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 15 11:33:39.748104 systemd[1]: Started cri-containerd-865f12b6a7191aa9a46cbe1345b44004e860e6e388f7e34a163181449595274e.scope. Jul 15 11:33:39.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.769065 kernel: audit: type=1400 audit(1752579219.762:685): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.769143 kernel: audit: type=1400 audit(1752579219.762:686): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.769184 kernel: audit: type=1400 audit(1752579219.762:687): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.774791 kernel: audit: type=1400 audit(1752579219.762:688): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.777713 kernel: audit: type=1400 audit(1752579219.762:689): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.778073 kernel: audit: type=1400 audit(1752579219.762:690): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.777922 systemd-resolved[1143]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 15 11:33:39.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.783596 kernel: audit: type=1400 audit(1752579219.762:691): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.765000 audit: BPF prog-id=107 op=LOAD Jul 15 11:33:39.765000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.765000 audit[2646]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2637 pid=2646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:39.765000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836356631326236613731393161613961343663626531333435623434 Jul 15 11:33:39.765000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.765000 audit[2646]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2637 pid=2646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:39.765000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836356631326236613731393161613961343663626531333435623434 Jul 15 11:33:39.765000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.765000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.765000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.765000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.765000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.765000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.765000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.765000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.765000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.765000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.765000 audit: BPF prog-id=108 op=LOAD Jul 15 11:33:39.765000 audit[2646]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000279d90 items=0 ppid=2637 pid=2646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:39.765000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836356631326236613731393161613961343663626531333435623434 Jul 15 11:33:39.768000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.768000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.768000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.768000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.768000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.768000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.768000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.768000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.768000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.768000 audit: BPF prog-id=109 op=LOAD Jul 15 11:33:39.768000 audit[2646]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000279dd8 items=0 ppid=2637 pid=2646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:39.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836356631326236613731393161613961343663626531333435623434 Jul 15 11:33:39.770000 audit: BPF prog-id=109 op=UNLOAD Jul 15 11:33:39.770000 audit: BPF prog-id=108 op=UNLOAD Jul 15 11:33:39.770000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.770000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.770000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.770000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.770000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.770000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.770000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.770000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.770000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.770000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:39.770000 audit: BPF prog-id=110 op=LOAD Jul 15 11:33:39.770000 audit[2646]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003ee1e8 items=0 ppid=2637 pid=2646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:39.770000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836356631326236613731393161613961343663626531333435623434 Jul 15 11:33:39.798663 kubelet[1447]: E0715 11:33:39.798616 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:39.807364 env[1204]: time="2025-07-15T11:33:39.807306784Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-hrpzx,Uid:80fa4cc0-c178-4747-9505-57a0c7197bf4,Namespace:default,Attempt:1,} returns sandbox id \"865f12b6a7191aa9a46cbe1345b44004e860e6e388f7e34a163181449595274e\"" Jul 15 11:33:39.808921 env[1204]: time="2025-07-15T11:33:39.808871573Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Jul 15 11:33:40.799095 kubelet[1447]: E0715 11:33:40.799012 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:40.810579 kubelet[1447]: I0715 11:33:40.810454 1447 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-hr46c" podStartSLOduration=32.190635111 podStartE2EDuration="36.810424968s" podCreationTimestamp="2025-07-15 11:33:04 +0000 UTC" firstStartedPulling="2025-07-15 11:33:34.691913783 +0000 UTC m=+31.418131460" lastFinishedPulling="2025-07-15 11:33:39.31170365 +0000 UTC m=+36.037921317" observedRunningTime="2025-07-15 11:33:40.810423605 +0000 UTC m=+37.536641302" watchObservedRunningTime="2025-07-15 11:33:40.810424968 +0000 UTC m=+37.536642645" Jul 15 11:33:41.466401 systemd-networkd[1024]: cali30c459366f0: Gained IPv6LL Jul 15 11:33:41.799414 kubelet[1447]: E0715 11:33:41.799363 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:42.729596 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3678683066.mount: Deactivated successfully. Jul 15 11:33:42.800448 kubelet[1447]: E0715 11:33:42.800371 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:43.777211 kubelet[1447]: E0715 11:33:43.777137 1447 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:43.800602 kubelet[1447]: E0715 11:33:43.800550 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:43.990948 update_engine[1193]: I0715 11:33:43.990859 1193 update_attempter.cc:509] Updating boot flags... Jul 15 11:33:44.362121 systemd[1]: run-containerd-runc-k8s.io-dc5c2aab3b7ba4b75b0ad05d87df20085b8c7297255d25517bd579de1b013912-runc.Yegxkk.mount: Deactivated successfully. Jul 15 11:33:44.491490 env[1204]: time="2025-07-15T11:33:44.491187318Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:44.495734 env[1204]: time="2025-07-15T11:33:44.494355365Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f6422896ca84c9af48d5417d6b7a573bf6b38f81edc15538907d987fc658d909,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:44.498043 env[1204]: time="2025-07-15T11:33:44.496758769Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:44.500101 env[1204]: time="2025-07-15T11:33:44.499286204Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:30bb68e656e0665bce700e67d2756f68bdca3345fa1099a32bfdb8febcf621cd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:44.504541 env[1204]: time="2025-07-15T11:33:44.504500579Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:f6422896ca84c9af48d5417d6b7a573bf6b38f81edc15538907d987fc658d909\"" Jul 15 11:33:44.506775 env[1204]: time="2025-07-15T11:33:44.506742643Z" level=info msg="CreateContainer within sandbox \"865f12b6a7191aa9a46cbe1345b44004e860e6e388f7e34a163181449595274e\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Jul 15 11:33:44.521204 env[1204]: time="2025-07-15T11:33:44.521164252Z" level=info msg="CreateContainer within sandbox \"865f12b6a7191aa9a46cbe1345b44004e860e6e388f7e34a163181449595274e\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"80a7fa898fae1e809c33426a2a5cad4ae0c744471ba9dd543e149e07809101dc\"" Jul 15 11:33:44.521786 env[1204]: time="2025-07-15T11:33:44.521748763Z" level=info msg="StartContainer for \"80a7fa898fae1e809c33426a2a5cad4ae0c744471ba9dd543e149e07809101dc\"" Jul 15 11:33:44.534954 systemd[1]: Started cri-containerd-80a7fa898fae1e809c33426a2a5cad4ae0c744471ba9dd543e149e07809101dc.scope. Jul 15 11:33:44.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:44.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:44.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:44.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:44.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:44.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:44.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:44.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:44.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:44.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:44.545000 audit: BPF prog-id=111 op=LOAD Jul 15 11:33:44.545000 audit[2719]: AVC avc: denied { bpf } for pid=2719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:44.545000 audit[2719]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2637 pid=2719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:44.545000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830613766613839386661653165383039633333343236613261356361 Jul 15 11:33:44.545000 audit[2719]: AVC avc: denied { perfmon } for pid=2719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:44.545000 audit[2719]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2637 pid=2719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:44.545000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830613766613839386661653165383039633333343236613261356361 Jul 15 11:33:44.545000 audit[2719]: AVC avc: denied { bpf } for pid=2719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:44.545000 audit[2719]: AVC avc: denied { bpf } for pid=2719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:44.545000 audit[2719]: AVC avc: denied { bpf } for pid=2719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:44.545000 audit[2719]: AVC avc: denied { perfmon } for pid=2719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:44.545000 audit[2719]: AVC avc: denied { perfmon } for pid=2719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:44.545000 audit[2719]: AVC avc: denied { perfmon } for pid=2719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:44.545000 audit[2719]: AVC avc: denied { perfmon } for pid=2719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:44.545000 audit[2719]: AVC avc: denied { perfmon } for pid=2719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:44.545000 audit[2719]: AVC avc: denied { bpf } for pid=2719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:44.545000 audit[2719]: AVC avc: denied { bpf } for pid=2719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:44.545000 audit: BPF prog-id=112 op=LOAD Jul 15 11:33:44.545000 audit[2719]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000281d40 items=0 ppid=2637 pid=2719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:44.545000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830613766613839386661653165383039633333343236613261356361 Jul 15 11:33:44.546000 audit[2719]: AVC avc: denied { bpf } for pid=2719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:44.546000 audit[2719]: AVC avc: denied { bpf } for pid=2719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:44.546000 audit[2719]: AVC avc: denied { perfmon } for pid=2719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:44.546000 audit[2719]: AVC avc: denied { perfmon } for pid=2719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:44.546000 audit[2719]: AVC avc: denied { perfmon } for pid=2719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:44.546000 audit[2719]: AVC avc: denied { perfmon } for pid=2719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:44.546000 audit[2719]: AVC avc: denied { perfmon } for pid=2719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:44.546000 audit[2719]: AVC avc: denied { bpf } for pid=2719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:44.546000 audit[2719]: AVC avc: denied { bpf } for pid=2719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:44.546000 audit: BPF prog-id=113 op=LOAD Jul 15 11:33:44.546000 audit[2719]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000281d88 items=0 ppid=2637 pid=2719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:44.546000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830613766613839386661653165383039633333343236613261356361 Jul 15 11:33:44.546000 audit: BPF prog-id=113 op=UNLOAD Jul 15 11:33:44.546000 audit: BPF prog-id=112 op=UNLOAD Jul 15 11:33:44.546000 audit[2719]: AVC avc: denied { bpf } for pid=2719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:44.546000 audit[2719]: AVC avc: denied { bpf } for pid=2719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:44.546000 audit[2719]: AVC avc: denied { bpf } for pid=2719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:44.546000 audit[2719]: AVC avc: denied { perfmon } for pid=2719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:44.546000 audit[2719]: AVC avc: denied { perfmon } for pid=2719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:44.546000 audit[2719]: AVC avc: denied { perfmon } for pid=2719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:44.546000 audit[2719]: AVC avc: denied { perfmon } for pid=2719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:44.546000 audit[2719]: AVC avc: denied { perfmon } for pid=2719 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:44.546000 audit[2719]: AVC avc: denied { bpf } for pid=2719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:44.546000 audit[2719]: AVC avc: denied { bpf } for pid=2719 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:44.546000 audit: BPF prog-id=114 op=LOAD Jul 15 11:33:44.546000 audit[2719]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000320198 items=0 ppid=2637 pid=2719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:44.546000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830613766613839386661653165383039633333343236613261356361 Jul 15 11:33:44.561085 env[1204]: time="2025-07-15T11:33:44.561031876Z" level=info msg="StartContainer for \"80a7fa898fae1e809c33426a2a5cad4ae0c744471ba9dd543e149e07809101dc\" returns successfully" Jul 15 11:33:44.607376 kubelet[1447]: I0715 11:33:44.607302 1447 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-8587fbcb89-hrpzx" podStartSLOduration=16.91029338 podStartE2EDuration="21.607285102s" podCreationTimestamp="2025-07-15 11:33:23 +0000 UTC" firstStartedPulling="2025-07-15 11:33:39.808604849 +0000 UTC m=+36.534822526" lastFinishedPulling="2025-07-15 11:33:44.505596571 +0000 UTC m=+41.231814248" observedRunningTime="2025-07-15 11:33:44.607173459 +0000 UTC m=+41.333391136" watchObservedRunningTime="2025-07-15 11:33:44.607285102 +0000 UTC m=+41.333502779" Jul 15 11:33:44.801694 kubelet[1447]: E0715 11:33:44.801635 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:45.662000 audit[2771]: NETFILTER_CFG table=filter:83 family=2 entries=11 op=nft_register_rule pid=2771 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:33:45.664808 kernel: kauditd_printk_skb: 107 callbacks suppressed Jul 15 11:33:45.664859 kernel: audit: type=1325 audit(1752579225.662:721): table=filter:83 family=2 entries=11 op=nft_register_rule pid=2771 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:33:45.662000 audit[2771]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffe4ba18c70 a2=0 a3=7ffe4ba18c5c items=0 ppid=1599 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:45.671345 kernel: audit: type=1300 audit(1752579225.662:721): arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffe4ba18c70 a2=0 a3=7ffe4ba18c5c items=0 ppid=1599 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:45.671402 kernel: audit: type=1327 audit(1752579225.662:721): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:33:45.662000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:33:45.675000 audit[2771]: NETFILTER_CFG table=nat:84 family=2 entries=29 op=nft_register_chain pid=2771 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:33:45.675000 audit[2771]: SYSCALL arch=c000003e syscall=46 success=yes exit=10116 a0=3 a1=7ffe4ba18c70 a2=0 a3=7ffe4ba18c5c items=0 ppid=1599 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:45.684353 kernel: audit: type=1325 audit(1752579225.675:722): table=nat:84 family=2 entries=29 op=nft_register_chain pid=2771 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:33:45.684427 kernel: audit: type=1300 audit(1752579225.675:722): arch=c000003e syscall=46 success=yes exit=10116 a0=3 a1=7ffe4ba18c70 a2=0 a3=7ffe4ba18c5c items=0 ppid=1599 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:45.684460 kernel: audit: type=1327 audit(1752579225.675:722): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:33:45.675000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:33:45.802742 kubelet[1447]: E0715 11:33:45.802672 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:46.803734 kubelet[1447]: E0715 11:33:46.803666 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:47.804783 kubelet[1447]: E0715 11:33:47.804721 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:48.805856 kubelet[1447]: E0715 11:33:48.805807 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:49.550000 audit[2779]: NETFILTER_CFG table=filter:85 family=2 entries=10 op=nft_register_rule pid=2779 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:33:49.550000 audit[2779]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fff61e340f0 a2=0 a3=7fff61e340dc items=0 ppid=1599 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:49.559375 kernel: audit: type=1325 audit(1752579229.550:723): table=filter:85 family=2 entries=10 op=nft_register_rule pid=2779 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:33:49.559434 kernel: audit: type=1300 audit(1752579229.550:723): arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fff61e340f0 a2=0 a3=7fff61e340dc items=0 ppid=1599 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:49.559461 kernel: audit: type=1327 audit(1752579229.550:723): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:33:49.550000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:33:49.568000 audit[2779]: NETFILTER_CFG table=nat:86 family=2 entries=36 op=nft_register_chain pid=2779 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:33:49.568000 audit[2779]: SYSCALL arch=c000003e syscall=46 success=yes exit=12004 a0=3 a1=7fff61e340f0 a2=0 a3=7fff61e340dc items=0 ppid=1599 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:49.568000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:33:49.573148 kernel: audit: type=1325 audit(1752579229.568:724): table=nat:86 family=2 entries=36 op=nft_register_chain pid=2779 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:33:49.806399 kubelet[1447]: E0715 11:33:49.806234 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:50.806652 kubelet[1447]: E0715 11:33:50.806593 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:51.806891 kubelet[1447]: E0715 11:33:51.806838 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:51.950000 audit[2783]: NETFILTER_CFG table=filter:87 family=2 entries=22 op=nft_register_rule pid=2783 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:33:51.952745 kernel: kauditd_printk_skb: 2 callbacks suppressed Jul 15 11:33:51.952797 kernel: audit: type=1325 audit(1752579231.950:725): table=filter:87 family=2 entries=22 op=nft_register_rule pid=2783 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:33:51.950000 audit[2783]: SYSCALL arch=c000003e syscall=46 success=yes exit=12688 a0=3 a1=7ffdeb5493f0 a2=0 a3=7ffdeb5493dc items=0 ppid=1599 pid=2783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.960005 kernel: audit: type=1300 audit(1752579231.950:725): arch=c000003e syscall=46 success=yes exit=12688 a0=3 a1=7ffdeb5493f0 a2=0 a3=7ffdeb5493dc items=0 ppid=1599 pid=2783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.960047 kernel: audit: type=1327 audit(1752579231.950:725): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:33:51.950000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:33:51.963000 audit[2783]: NETFILTER_CFG table=nat:88 family=2 entries=24 op=nft_register_rule pid=2783 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:33:51.963000 audit[2783]: SYSCALL arch=c000003e syscall=46 success=yes exit=7308 a0=3 a1=7ffdeb5493f0 a2=0 a3=0 items=0 ppid=1599 pid=2783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.971891 kernel: audit: type=1325 audit(1752579231.963:726): table=nat:88 family=2 entries=24 op=nft_register_rule pid=2783 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:33:51.971949 kernel: audit: type=1300 audit(1752579231.963:726): arch=c000003e syscall=46 success=yes exit=7308 a0=3 a1=7ffdeb5493f0 a2=0 a3=0 items=0 ppid=1599 pid=2783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.971981 kernel: audit: type=1327 audit(1752579231.963:726): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:33:51.963000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:33:51.980000 audit[2785]: NETFILTER_CFG table=filter:89 family=2 entries=34 op=nft_register_rule pid=2785 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:33:51.980000 audit[2785]: SYSCALL arch=c000003e syscall=46 success=yes exit=12688 a0=3 a1=7ffffe3a0650 a2=0 a3=7ffffe3a063c items=0 ppid=1599 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.989296 kernel: audit: type=1325 audit(1752579231.980:727): table=filter:89 family=2 entries=34 op=nft_register_rule pid=2785 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:33:51.989352 kernel: audit: type=1300 audit(1752579231.980:727): arch=c000003e syscall=46 success=yes exit=12688 a0=3 a1=7ffffe3a0650 a2=0 a3=7ffffe3a063c items=0 ppid=1599 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.989391 kernel: audit: type=1327 audit(1752579231.980:727): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:33:51.980000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:33:51.992000 audit[2785]: NETFILTER_CFG table=nat:90 family=2 entries=24 op=nft_register_rule pid=2785 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:33:51.992000 audit[2785]: SYSCALL arch=c000003e syscall=46 success=yes exit=7308 a0=3 a1=7ffffe3a0650 a2=0 a3=0 items=0 ppid=1599 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.992000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:33:51.997150 kernel: audit: type=1325 audit(1752579231.992:728): table=nat:90 family=2 entries=24 op=nft_register_rule pid=2785 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:33:52.013257 systemd[1]: Created slice kubepods-besteffort-pod4ce4341c_c3fc_4a34_b833_17219ae36206.slice. Jul 15 11:33:52.179447 kubelet[1447]: I0715 11:33:52.179276 1447 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-l8gt6\" (UniqueName: \"kubernetes.io/projected/4ce4341c-c3fc-4a34-b833-17219ae36206-kube-api-access-l8gt6\") pod \"nfs-server-provisioner-0\" (UID: \"4ce4341c-c3fc-4a34-b833-17219ae36206\") " pod="default/nfs-server-provisioner-0" Jul 15 11:33:52.179447 kubelet[1447]: I0715 11:33:52.179348 1447 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/4ce4341c-c3fc-4a34-b833-17219ae36206-data\") pod \"nfs-server-provisioner-0\" (UID: \"4ce4341c-c3fc-4a34-b833-17219ae36206\") " pod="default/nfs-server-provisioner-0" Jul 15 11:33:52.316867 env[1204]: time="2025-07-15T11:33:52.316800330Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:4ce4341c-c3fc-4a34-b833-17219ae36206,Namespace:default,Attempt:0,}" Jul 15 11:33:52.417590 systemd-networkd[1024]: cali60e51b789ff: Link UP Jul 15 11:33:52.420124 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 15 11:33:52.420165 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Jul 15 11:33:52.420738 systemd-networkd[1024]: cali60e51b789ff: Gained carrier Jul 15 11:33:52.435123 env[1204]: 2025-07-15 11:33:52.359 [INFO][2787] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.93-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 4ce4341c-c3fc-4a34-b833-17219ae36206 1357 0 2025-07-15 11:33:51 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.0.0.93 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="4452a599511fbdea96cc1396ec9b696670dd53f170881147445fcbf3694718ba" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.93-k8s-nfs--server--provisioner--0-" Jul 15 11:33:52.435123 env[1204]: 2025-07-15 11:33:52.359 [INFO][2787] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="4452a599511fbdea96cc1396ec9b696670dd53f170881147445fcbf3694718ba" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.93-k8s-nfs--server--provisioner--0-eth0" Jul 15 11:33:52.435123 env[1204]: 2025-07-15 11:33:52.381 [INFO][2802] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4452a599511fbdea96cc1396ec9b696670dd53f170881147445fcbf3694718ba" HandleID="k8s-pod-network.4452a599511fbdea96cc1396ec9b696670dd53f170881147445fcbf3694718ba" Workload="10.0.0.93-k8s-nfs--server--provisioner--0-eth0" Jul 15 11:33:52.435123 env[1204]: 2025-07-15 11:33:52.382 [INFO][2802] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="4452a599511fbdea96cc1396ec9b696670dd53f170881147445fcbf3694718ba" HandleID="k8s-pod-network.4452a599511fbdea96cc1396ec9b696670dd53f170881147445fcbf3694718ba" Workload="10.0.0.93-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0005024e0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.93", "pod":"nfs-server-provisioner-0", "timestamp":"2025-07-15 11:33:52.381966682 +0000 UTC"}, Hostname:"10.0.0.93", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 15 11:33:52.435123 env[1204]: 2025-07-15 11:33:52.382 [INFO][2802] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 15 11:33:52.435123 env[1204]: 2025-07-15 11:33:52.382 [INFO][2802] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 15 11:33:52.435123 env[1204]: 2025-07-15 11:33:52.382 [INFO][2802] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.93' Jul 15 11:33:52.435123 env[1204]: 2025-07-15 11:33:52.389 [INFO][2802] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.4452a599511fbdea96cc1396ec9b696670dd53f170881147445fcbf3694718ba" host="10.0.0.93" Jul 15 11:33:52.435123 env[1204]: 2025-07-15 11:33:52.393 [INFO][2802] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.93" Jul 15 11:33:52.435123 env[1204]: 2025-07-15 11:33:52.398 [INFO][2802] ipam/ipam.go 511: Trying affinity for 192.168.75.192/26 host="10.0.0.93" Jul 15 11:33:52.435123 env[1204]: 2025-07-15 11:33:52.400 [INFO][2802] ipam/ipam.go 158: Attempting to load block cidr=192.168.75.192/26 host="10.0.0.93" Jul 15 11:33:52.435123 env[1204]: 2025-07-15 11:33:52.402 [INFO][2802] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.75.192/26 host="10.0.0.93" Jul 15 11:33:52.435123 env[1204]: 2025-07-15 11:33:52.402 [INFO][2802] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.75.192/26 handle="k8s-pod-network.4452a599511fbdea96cc1396ec9b696670dd53f170881147445fcbf3694718ba" host="10.0.0.93" Jul 15 11:33:52.435123 env[1204]: 2025-07-15 11:33:52.403 [INFO][2802] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.4452a599511fbdea96cc1396ec9b696670dd53f170881147445fcbf3694718ba Jul 15 11:33:52.435123 env[1204]: 2025-07-15 11:33:52.407 [INFO][2802] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.75.192/26 handle="k8s-pod-network.4452a599511fbdea96cc1396ec9b696670dd53f170881147445fcbf3694718ba" host="10.0.0.93" Jul 15 11:33:52.435123 env[1204]: 2025-07-15 11:33:52.413 [INFO][2802] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.75.195/26] block=192.168.75.192/26 handle="k8s-pod-network.4452a599511fbdea96cc1396ec9b696670dd53f170881147445fcbf3694718ba" host="10.0.0.93" Jul 15 11:33:52.435123 env[1204]: 2025-07-15 11:33:52.413 [INFO][2802] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.75.195/26] handle="k8s-pod-network.4452a599511fbdea96cc1396ec9b696670dd53f170881147445fcbf3694718ba" host="10.0.0.93" Jul 15 11:33:52.435123 env[1204]: 2025-07-15 11:33:52.413 [INFO][2802] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 15 11:33:52.435123 env[1204]: 2025-07-15 11:33:52.413 [INFO][2802] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.75.195/26] IPv6=[] ContainerID="4452a599511fbdea96cc1396ec9b696670dd53f170881147445fcbf3694718ba" HandleID="k8s-pod-network.4452a599511fbdea96cc1396ec9b696670dd53f170881147445fcbf3694718ba" Workload="10.0.0.93-k8s-nfs--server--provisioner--0-eth0" Jul 15 11:33:52.435822 env[1204]: 2025-07-15 11:33:52.415 [INFO][2787] cni-plugin/k8s.go 418: Populated endpoint ContainerID="4452a599511fbdea96cc1396ec9b696670dd53f170881147445fcbf3694718ba" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.93-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.93-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"4ce4341c-c3fc-4a34-b833-17219ae36206", ResourceVersion:"1357", Generation:0, CreationTimestamp:time.Date(2025, time.July, 15, 11, 33, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.93", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.75.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 15 11:33:52.435822 env[1204]: 2025-07-15 11:33:52.415 [INFO][2787] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.75.195/32] ContainerID="4452a599511fbdea96cc1396ec9b696670dd53f170881147445fcbf3694718ba" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.93-k8s-nfs--server--provisioner--0-eth0" Jul 15 11:33:52.435822 env[1204]: 2025-07-15 11:33:52.415 [INFO][2787] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="4452a599511fbdea96cc1396ec9b696670dd53f170881147445fcbf3694718ba" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.93-k8s-nfs--server--provisioner--0-eth0" Jul 15 11:33:52.435822 env[1204]: 2025-07-15 11:33:52.420 [INFO][2787] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="4452a599511fbdea96cc1396ec9b696670dd53f170881147445fcbf3694718ba" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.93-k8s-nfs--server--provisioner--0-eth0" Jul 15 11:33:52.436031 env[1204]: 2025-07-15 11:33:52.421 [INFO][2787] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="4452a599511fbdea96cc1396ec9b696670dd53f170881147445fcbf3694718ba" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.93-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.93-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"4ce4341c-c3fc-4a34-b833-17219ae36206", ResourceVersion:"1357", Generation:0, CreationTimestamp:time.Date(2025, time.July, 15, 11, 33, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.93", ContainerID:"4452a599511fbdea96cc1396ec9b696670dd53f170881147445fcbf3694718ba", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.75.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"f6:0d:bc:71:70:52", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 15 11:33:52.436031 env[1204]: 2025-07-15 11:33:52.432 [INFO][2787] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="4452a599511fbdea96cc1396ec9b696670dd53f170881147445fcbf3694718ba" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.93-k8s-nfs--server--provisioner--0-eth0" Jul 15 11:33:52.445884 env[1204]: time="2025-07-15T11:33:52.445794400Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 15 11:33:52.445884 env[1204]: time="2025-07-15T11:33:52.445851649Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 15 11:33:52.445884 env[1204]: time="2025-07-15T11:33:52.445868153Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 15 11:33:52.444000 audit[2829]: NETFILTER_CFG table=filter:91 family=2 entries=40 op=nft_register_chain pid=2829 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 15 11:33:52.444000 audit[2829]: SYSCALL arch=c000003e syscall=46 success=yes exit=20756 a0=3 a1=7ffe6a70c220 a2=0 a3=7ffe6a70c20c items=0 ppid=2167 pid=2829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:52.444000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 15 11:33:52.446902 env[1204]: time="2025-07-15T11:33:52.446522214Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4452a599511fbdea96cc1396ec9b696670dd53f170881147445fcbf3694718ba pid=2828 runtime=io.containerd.runc.v2 Jul 15 11:33:52.461884 systemd[1]: Started cri-containerd-4452a599511fbdea96cc1396ec9b696670dd53f170881147445fcbf3694718ba.scope. Jul 15 11:33:52.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:52.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:52.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:52.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:52.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:52.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:52.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:52.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:52.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:52.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:52.470000 audit: BPF prog-id=115 op=LOAD Jul 15 11:33:52.471000 audit[2839]: AVC avc: denied { bpf } for pid=2839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:52.471000 audit[2839]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2828 pid=2839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:52.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434353261353939353131666264656139366363313339366563396236 Jul 15 11:33:52.471000 audit[2839]: AVC avc: denied { perfmon } for pid=2839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:52.471000 audit[2839]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2828 pid=2839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:52.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434353261353939353131666264656139366363313339366563396236 Jul 15 11:33:52.471000 audit[2839]: AVC avc: denied { bpf } for pid=2839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:52.471000 audit[2839]: AVC avc: denied { bpf } for pid=2839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:52.471000 audit[2839]: AVC avc: denied { bpf } for pid=2839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:52.471000 audit[2839]: AVC avc: denied { perfmon } for pid=2839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:52.471000 audit[2839]: AVC avc: denied { perfmon } for pid=2839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:52.471000 audit[2839]: AVC avc: denied { perfmon } for pid=2839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:52.471000 audit[2839]: AVC avc: denied { perfmon } for pid=2839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:52.471000 audit[2839]: AVC avc: denied { perfmon } for pid=2839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:52.471000 audit[2839]: AVC avc: denied { bpf } for pid=2839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:52.471000 audit[2839]: AVC avc: denied { bpf } for pid=2839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:52.471000 audit: BPF prog-id=116 op=LOAD Jul 15 11:33:52.471000 audit[2839]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0001b7fd0 items=0 ppid=2828 pid=2839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:52.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434353261353939353131666264656139366363313339366563396236 Jul 15 11:33:52.471000 audit[2839]: AVC avc: denied { bpf } for pid=2839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:52.471000 audit[2839]: AVC avc: denied { bpf } for pid=2839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:52.471000 audit[2839]: AVC avc: denied { perfmon } for pid=2839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:52.471000 audit[2839]: AVC avc: denied { perfmon } for pid=2839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:52.471000 audit[2839]: AVC avc: denied { perfmon } for pid=2839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:52.471000 audit[2839]: AVC avc: denied { perfmon } for pid=2839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:52.471000 audit[2839]: AVC avc: denied { perfmon } for pid=2839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:52.471000 audit[2839]: AVC avc: denied { bpf } for pid=2839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:52.471000 audit[2839]: AVC avc: denied { bpf } for pid=2839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:52.471000 audit: BPF prog-id=117 op=LOAD Jul 15 11:33:52.471000 audit[2839]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0003a2018 items=0 ppid=2828 pid=2839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:52.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434353261353939353131666264656139366363313339366563396236 Jul 15 11:33:52.471000 audit: BPF prog-id=117 op=UNLOAD Jul 15 11:33:52.471000 audit: BPF prog-id=116 op=UNLOAD Jul 15 11:33:52.471000 audit[2839]: AVC avc: denied { bpf } for pid=2839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:52.471000 audit[2839]: AVC avc: denied { bpf } for pid=2839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:52.471000 audit[2839]: AVC avc: denied { bpf } for pid=2839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:52.471000 audit[2839]: AVC avc: denied { perfmon } for pid=2839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:52.471000 audit[2839]: AVC avc: denied { perfmon } for pid=2839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:52.471000 audit[2839]: AVC avc: denied { perfmon } for pid=2839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:52.471000 audit[2839]: AVC avc: denied { perfmon } for pid=2839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:52.471000 audit[2839]: AVC avc: denied { perfmon } for pid=2839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:52.471000 audit[2839]: AVC avc: denied { bpf } for pid=2839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:52.471000 audit[2839]: AVC avc: denied { bpf } for pid=2839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:52.471000 audit: BPF prog-id=118 op=LOAD Jul 15 11:33:52.471000 audit[2839]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0003a2428 items=0 ppid=2828 pid=2839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:52.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434353261353939353131666264656139366363313339366563396236 Jul 15 11:33:52.473488 systemd-resolved[1143]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 15 11:33:52.494801 env[1204]: time="2025-07-15T11:33:52.494749899Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:4ce4341c-c3fc-4a34-b833-17219ae36206,Namespace:default,Attempt:0,} returns sandbox id \"4452a599511fbdea96cc1396ec9b696670dd53f170881147445fcbf3694718ba\"" Jul 15 11:33:52.496551 env[1204]: time="2025-07-15T11:33:52.496506613Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Jul 15 11:33:52.807694 kubelet[1447]: E0715 11:33:52.807628 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:53.808287 kubelet[1447]: E0715 11:33:53.808222 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:53.818387 systemd-networkd[1024]: cali60e51b789ff: Gained IPv6LL Jul 15 11:33:54.808462 kubelet[1447]: E0715 11:33:54.808389 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:55.809377 kubelet[1447]: E0715 11:33:55.809306 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:56.147636 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1698230837.mount: Deactivated successfully. Jul 15 11:33:56.809975 kubelet[1447]: E0715 11:33:56.809900 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:57.811172 kubelet[1447]: E0715 11:33:57.811073 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:58.811808 kubelet[1447]: E0715 11:33:58.811745 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:59.260703 env[1204]: time="2025-07-15T11:33:59.260629500Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:59.262647 env[1204]: time="2025-07-15T11:33:59.262595671Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:59.264564 env[1204]: time="2025-07-15T11:33:59.264523695Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:59.266364 env[1204]: time="2025-07-15T11:33:59.266330282Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:59.267097 env[1204]: time="2025-07-15T11:33:59.267064121Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Jul 15 11:33:59.269388 env[1204]: time="2025-07-15T11:33:59.269353759Z" level=info msg="CreateContainer within sandbox \"4452a599511fbdea96cc1396ec9b696670dd53f170881147445fcbf3694718ba\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Jul 15 11:33:59.281809 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4133073393.mount: Deactivated successfully. Jul 15 11:33:59.288231 env[1204]: time="2025-07-15T11:33:59.288180696Z" level=info msg="CreateContainer within sandbox \"4452a599511fbdea96cc1396ec9b696670dd53f170881147445fcbf3694718ba\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"385b224431b62e85ef013ddb14dbe777d8375f4d690a0180aa024d103fbd41fd\"" Jul 15 11:33:59.288832 env[1204]: time="2025-07-15T11:33:59.288789402Z" level=info msg="StartContainer for \"385b224431b62e85ef013ddb14dbe777d8375f4d690a0180aa024d103fbd41fd\"" Jul 15 11:33:59.306168 systemd[1]: Started cri-containerd-385b224431b62e85ef013ddb14dbe777d8375f4d690a0180aa024d103fbd41fd.scope. Jul 15 11:33:59.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:59.317373 kernel: kauditd_printk_skb: 62 callbacks suppressed Jul 15 11:33:59.317435 kernel: audit: type=1400 audit(1752579239.315:748): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:59.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:59.323361 kernel: audit: type=1400 audit(1752579239.315:749): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:59.323414 kernel: audit: type=1400 audit(1752579239.315:750): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:59.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:59.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:59.329459 kernel: audit: type=1400 audit(1752579239.315:751): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:59.329552 kernel: audit: type=1400 audit(1752579239.315:752): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:59.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:59.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:59.335379 kernel: audit: type=1400 audit(1752579239.315:753): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:59.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:59.338514 kernel: audit: type=1400 audit(1752579239.315:754): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:59.338572 kernel: audit: type=1400 audit(1752579239.315:755): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:59.315000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:59.315000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:59.344634 kernel: audit: type=1400 audit(1752579239.315:756): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:59.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:59.347946 kernel: audit: type=1400 audit(1752579239.320:757): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:59.320000 audit: BPF prog-id=119 op=LOAD Jul 15 11:33:59.320000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:59.320000 audit[2872]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2828 pid=2872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:59.320000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338356232323434333162363265383565663031336464623134646265 Jul 15 11:33:59.320000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:59.320000 audit[2872]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2828 pid=2872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:59.320000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338356232323434333162363265383565663031336464623134646265 Jul 15 11:33:59.320000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:59.320000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:59.320000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:59.320000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:59.320000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:59.320000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:59.320000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:59.320000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:59.320000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:59.320000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:59.320000 audit: BPF prog-id=120 op=LOAD Jul 15 11:33:59.320000 audit[2872]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000308540 items=0 ppid=2828 pid=2872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:59.320000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338356232323434333162363265383565663031336464623134646265 Jul 15 11:33:59.323000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:59.323000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:59.323000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:59.323000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:59.323000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:59.323000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:59.323000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:59.323000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:59.323000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:59.323000 audit: BPF prog-id=121 op=LOAD Jul 15 11:33:59.323000 audit[2872]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000308588 items=0 ppid=2828 pid=2872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:59.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338356232323434333162363265383565663031336464623134646265 Jul 15 11:33:59.326000 audit: BPF prog-id=121 op=UNLOAD Jul 15 11:33:59.326000 audit: BPF prog-id=120 op=UNLOAD Jul 15 11:33:59.326000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:59.326000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:59.326000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:59.326000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:59.326000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:59.326000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:59.326000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:59.326000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:59.326000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:59.326000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:59.326000 audit: BPF prog-id=122 op=LOAD Jul 15 11:33:59.326000 audit[2872]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000308998 items=0 ppid=2828 pid=2872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:59.326000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338356232323434333162363265383565663031336464623134646265 Jul 15 11:33:59.360619 env[1204]: time="2025-07-15T11:33:59.360528817Z" level=info msg="StartContainer for \"385b224431b62e85ef013ddb14dbe777d8375f4d690a0180aa024d103fbd41fd\" returns successfully" Jul 15 11:33:59.397000 audit[2900]: AVC avc: denied { search } for pid=2900 comm="rpcbind" name="crypto" dev="proc" ino=22844 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c632 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 15 11:33:59.397000 audit[2900]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f3b8c4520c0 a2=0 a3=0 items=0 ppid=2882 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c632 key=(null) Jul 15 11:33:59.397000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Jul 15 11:33:59.576000 audit[2905]: AVC avc: denied { search } for pid=2905 comm="dbus-daemon" name="crypto" dev="proc" ino=22844 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c632 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 15 11:33:59.576000 audit[2905]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f59134cb0c0 a2=0 a3=0 items=0 ppid=2882 pid=2905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c632 key=(null) Jul 15 11:33:59.576000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Jul 15 11:33:59.579000 audit[2906]: AVC avc: denied { watch } for pid=2906 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537658 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c632 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c55,c632 tclass=dir permissive=0 Jul 15 11:33:59.579000 audit[2906]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=562f94d55480 a2=2c8 a3=7fffa55d380c items=0 ppid=2882 pid=2906 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c632 key=(null) Jul 15 11:33:59.579000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Jul 15 11:33:59.582000 audit[2907]: AVC avc: denied { read } for pid=2907 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=22468 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c632 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Jul 15 11:33:59.582000 audit[2907]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f29e6131320 a1=80000 a2=d a3=7ffd62b86d90 items=0 ppid=2882 pid=2907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c632 key=(null) Jul 15 11:33:59.582000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Jul 15 11:33:59.583000 audit[2907]: AVC avc: denied { search } for pid=2907 comm="ganesha.nfsd" name="crypto" dev="proc" ino=22844 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c632 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 15 11:33:59.583000 audit[2907]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f29e56850c0 a2=0 a3=0 items=0 ppid=2882 pid=2907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c632 key=(null) Jul 15 11:33:59.583000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Jul 15 11:33:59.638020 kubelet[1447]: I0715 11:33:59.637922 1447 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.8661488830000001 podStartE2EDuration="8.637901972s" podCreationTimestamp="2025-07-15 11:33:51 +0000 UTC" firstStartedPulling="2025-07-15 11:33:52.496222853 +0000 UTC m=+49.222440530" lastFinishedPulling="2025-07-15 11:33:59.267975952 +0000 UTC m=+55.994193619" observedRunningTime="2025-07-15 11:33:59.637747658 +0000 UTC m=+56.363965335" watchObservedRunningTime="2025-07-15 11:33:59.637901972 +0000 UTC m=+56.364119639" Jul 15 11:33:59.647000 audit[2924]: NETFILTER_CFG table=filter:92 family=2 entries=22 op=nft_register_rule pid=2924 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:33:59.647000 audit[2924]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffd14a2e2b0 a2=0 a3=7ffd14a2e29c items=0 ppid=1599 pid=2924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:59.647000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:33:59.658000 audit[2924]: NETFILTER_CFG table=nat:93 family=2 entries=108 op=nft_register_chain pid=2924 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:33:59.658000 audit[2924]: SYSCALL arch=c000003e syscall=46 success=yes exit=50220 a0=3 a1=7ffd14a2e2b0 a2=0 a3=7ffd14a2e29c items=0 ppid=1599 pid=2924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:59.658000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:33:59.812885 kubelet[1447]: E0715 11:33:59.812831 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:00.119000 audit[2927]: NETFILTER_CFG table=filter:94 family=2 entries=9 op=nft_register_rule pid=2927 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:34:00.119000 audit[2927]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffeac9b3350 a2=0 a3=7ffeac9b333c items=0 ppid=1599 pid=2927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:00.119000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:34:00.128000 audit[2927]: NETFILTER_CFG table=nat:95 family=2 entries=55 op=nft_register_chain pid=2927 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:34:00.128000 audit[2927]: SYSCALL arch=c000003e syscall=46 success=yes exit=20100 a0=3 a1=7ffeac9b3350 a2=0 a3=7ffeac9b333c items=0 ppid=1599 pid=2927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:00.128000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:34:00.813027 kubelet[1447]: E0715 11:34:00.812946 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:01.813600 kubelet[1447]: E0715 11:34:01.813522 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:02.814499 kubelet[1447]: E0715 11:34:02.814422 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:03.777156 kubelet[1447]: E0715 11:34:03.777074 1447 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:03.801893 env[1204]: time="2025-07-15T11:34:03.801846533Z" level=info msg="StopPodSandbox for \"2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98\"" Jul 15 11:34:03.815351 kubelet[1447]: E0715 11:34:03.815285 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:03.866384 env[1204]: 2025-07-15 11:34:03.833 [WARNING][2940] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.93-k8s-csi--node--driver--hr46c-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"9b48e368-c013-407a-bd57-d9a453d3ba47", ResourceVersion:"1280", Generation:0, CreationTimestamp:time.Date(2025, time.July, 15, 11, 33, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"57bd658777", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.93", ContainerID:"342260c893099b68018f0ae58d8cc4fcd768fd094ffcc4ab20ca9e58d86baa4b", Pod:"csi-node-driver-hr46c", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.75.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calie87f9cc6e72", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 15 11:34:03.866384 env[1204]: 2025-07-15 11:34:03.833 [INFO][2940] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98" Jul 15 11:34:03.866384 env[1204]: 2025-07-15 11:34:03.833 [INFO][2940] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98" iface="eth0" netns="" Jul 15 11:34:03.866384 env[1204]: 2025-07-15 11:34:03.833 [INFO][2940] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98" Jul 15 11:34:03.866384 env[1204]: 2025-07-15 11:34:03.833 [INFO][2940] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98" Jul 15 11:34:03.866384 env[1204]: 2025-07-15 11:34:03.853 [INFO][2948] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98" HandleID="k8s-pod-network.2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98" Workload="10.0.0.93-k8s-csi--node--driver--hr46c-eth0" Jul 15 11:34:03.866384 env[1204]: 2025-07-15 11:34:03.853 [INFO][2948] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 15 11:34:03.866384 env[1204]: 2025-07-15 11:34:03.853 [INFO][2948] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 15 11:34:03.866384 env[1204]: 2025-07-15 11:34:03.860 [WARNING][2948] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98" HandleID="k8s-pod-network.2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98" Workload="10.0.0.93-k8s-csi--node--driver--hr46c-eth0" Jul 15 11:34:03.866384 env[1204]: 2025-07-15 11:34:03.860 [INFO][2948] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98" HandleID="k8s-pod-network.2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98" Workload="10.0.0.93-k8s-csi--node--driver--hr46c-eth0" Jul 15 11:34:03.866384 env[1204]: 2025-07-15 11:34:03.862 [INFO][2948] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 15 11:34:03.866384 env[1204]: 2025-07-15 11:34:03.864 [INFO][2940] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98" Jul 15 11:34:03.866925 env[1204]: time="2025-07-15T11:34:03.866412682Z" level=info msg="TearDown network for sandbox \"2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98\" successfully" Jul 15 11:34:03.866925 env[1204]: time="2025-07-15T11:34:03.866457021Z" level=info msg="StopPodSandbox for \"2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98\" returns successfully" Jul 15 11:34:03.867152 env[1204]: time="2025-07-15T11:34:03.867087909Z" level=info msg="RemovePodSandbox for \"2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98\"" Jul 15 11:34:03.867395 env[1204]: time="2025-07-15T11:34:03.867151597Z" level=info msg="Forcibly stopping sandbox \"2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98\"" Jul 15 11:34:03.931900 env[1204]: 2025-07-15 11:34:03.898 [WARNING][2967] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.93-k8s-csi--node--driver--hr46c-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"9b48e368-c013-407a-bd57-d9a453d3ba47", ResourceVersion:"1280", Generation:0, CreationTimestamp:time.Date(2025, time.July, 15, 11, 33, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"57bd658777", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.93", ContainerID:"342260c893099b68018f0ae58d8cc4fcd768fd094ffcc4ab20ca9e58d86baa4b", Pod:"csi-node-driver-hr46c", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.75.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calie87f9cc6e72", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 15 11:34:03.931900 env[1204]: 2025-07-15 11:34:03.899 [INFO][2967] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98" Jul 15 11:34:03.931900 env[1204]: 2025-07-15 11:34:03.899 [INFO][2967] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98" iface="eth0" netns="" Jul 15 11:34:03.931900 env[1204]: 2025-07-15 11:34:03.899 [INFO][2967] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98" Jul 15 11:34:03.931900 env[1204]: 2025-07-15 11:34:03.899 [INFO][2967] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98" Jul 15 11:34:03.931900 env[1204]: 2025-07-15 11:34:03.920 [INFO][2976] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98" HandleID="k8s-pod-network.2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98" Workload="10.0.0.93-k8s-csi--node--driver--hr46c-eth0" Jul 15 11:34:03.931900 env[1204]: 2025-07-15 11:34:03.920 [INFO][2976] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 15 11:34:03.931900 env[1204]: 2025-07-15 11:34:03.920 [INFO][2976] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 15 11:34:03.931900 env[1204]: 2025-07-15 11:34:03.926 [WARNING][2976] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98" HandleID="k8s-pod-network.2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98" Workload="10.0.0.93-k8s-csi--node--driver--hr46c-eth0" Jul 15 11:34:03.931900 env[1204]: 2025-07-15 11:34:03.926 [INFO][2976] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98" HandleID="k8s-pod-network.2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98" Workload="10.0.0.93-k8s-csi--node--driver--hr46c-eth0" Jul 15 11:34:03.931900 env[1204]: 2025-07-15 11:34:03.928 [INFO][2976] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 15 11:34:03.931900 env[1204]: 2025-07-15 11:34:03.930 [INFO][2967] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98" Jul 15 11:34:03.932457 env[1204]: time="2025-07-15T11:34:03.931943109Z" level=info msg="TearDown network for sandbox \"2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98\" successfully" Jul 15 11:34:03.992999 env[1204]: time="2025-07-15T11:34:03.992932419Z" level=info msg="RemovePodSandbox \"2575076acb23ecb513715ed4cb865ee1660c772125aaba3c68f81542aa8c3b98\" returns successfully" Jul 15 11:34:03.993675 env[1204]: time="2025-07-15T11:34:03.993637557Z" level=info msg="StopPodSandbox for \"fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e\"" Jul 15 11:34:04.054307 env[1204]: 2025-07-15 11:34:04.025 [WARNING][2993] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.93-k8s-nginx--deployment--8587fbcb89--hrpzx-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"80fa4cc0-c178-4747-9505-57a0c7197bf4", ResourceVersion:"1296", Generation:0, CreationTimestamp:time.Date(2025, time.July, 15, 11, 33, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.93", ContainerID:"865f12b6a7191aa9a46cbe1345b44004e860e6e388f7e34a163181449595274e", Pod:"nginx-deployment-8587fbcb89-hrpzx", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.75.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali30c459366f0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 15 11:34:04.054307 env[1204]: 2025-07-15 11:34:04.026 [INFO][2993] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e" Jul 15 11:34:04.054307 env[1204]: 2025-07-15 11:34:04.026 [INFO][2993] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e" iface="eth0" netns="" Jul 15 11:34:04.054307 env[1204]: 2025-07-15 11:34:04.026 [INFO][2993] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e" Jul 15 11:34:04.054307 env[1204]: 2025-07-15 11:34:04.026 [INFO][2993] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e" Jul 15 11:34:04.054307 env[1204]: 2025-07-15 11:34:04.042 [INFO][3002] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e" HandleID="k8s-pod-network.fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e" Workload="10.0.0.93-k8s-nginx--deployment--8587fbcb89--hrpzx-eth0" Jul 15 11:34:04.054307 env[1204]: 2025-07-15 11:34:04.042 [INFO][3002] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 15 11:34:04.054307 env[1204]: 2025-07-15 11:34:04.042 [INFO][3002] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 15 11:34:04.054307 env[1204]: 2025-07-15 11:34:04.049 [WARNING][3002] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e" HandleID="k8s-pod-network.fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e" Workload="10.0.0.93-k8s-nginx--deployment--8587fbcb89--hrpzx-eth0" Jul 15 11:34:04.054307 env[1204]: 2025-07-15 11:34:04.049 [INFO][3002] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e" HandleID="k8s-pod-network.fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e" Workload="10.0.0.93-k8s-nginx--deployment--8587fbcb89--hrpzx-eth0" Jul 15 11:34:04.054307 env[1204]: 2025-07-15 11:34:04.051 [INFO][3002] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 15 11:34:04.054307 env[1204]: 2025-07-15 11:34:04.052 [INFO][2993] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e" Jul 15 11:34:04.054307 env[1204]: time="2025-07-15T11:34:04.054243611Z" level=info msg="TearDown network for sandbox \"fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e\" successfully" Jul 15 11:34:04.054307 env[1204]: time="2025-07-15T11:34:04.054287549Z" level=info msg="StopPodSandbox for \"fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e\" returns successfully" Jul 15 11:34:04.054951 env[1204]: time="2025-07-15T11:34:04.054913144Z" level=info msg="RemovePodSandbox for \"fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e\"" Jul 15 11:34:04.054995 env[1204]: time="2025-07-15T11:34:04.054958485Z" level=info msg="Forcibly stopping sandbox \"fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e\"" Jul 15 11:34:04.111868 env[1204]: 2025-07-15 11:34:04.082 [WARNING][3020] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.93-k8s-nginx--deployment--8587fbcb89--hrpzx-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"80fa4cc0-c178-4747-9505-57a0c7197bf4", ResourceVersion:"1296", Generation:0, CreationTimestamp:time.Date(2025, time.July, 15, 11, 33, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.93", ContainerID:"865f12b6a7191aa9a46cbe1345b44004e860e6e388f7e34a163181449595274e", Pod:"nginx-deployment-8587fbcb89-hrpzx", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.75.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali30c459366f0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 15 11:34:04.111868 env[1204]: 2025-07-15 11:34:04.082 [INFO][3020] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e" Jul 15 11:34:04.111868 env[1204]: 2025-07-15 11:34:04.082 [INFO][3020] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e" iface="eth0" netns="" Jul 15 11:34:04.111868 env[1204]: 2025-07-15 11:34:04.082 [INFO][3020] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e" Jul 15 11:34:04.111868 env[1204]: 2025-07-15 11:34:04.082 [INFO][3020] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e" Jul 15 11:34:04.111868 env[1204]: 2025-07-15 11:34:04.100 [INFO][3029] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e" HandleID="k8s-pod-network.fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e" Workload="10.0.0.93-k8s-nginx--deployment--8587fbcb89--hrpzx-eth0" Jul 15 11:34:04.111868 env[1204]: 2025-07-15 11:34:04.100 [INFO][3029] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 15 11:34:04.111868 env[1204]: 2025-07-15 11:34:04.100 [INFO][3029] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 15 11:34:04.111868 env[1204]: 2025-07-15 11:34:04.107 [WARNING][3029] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e" HandleID="k8s-pod-network.fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e" Workload="10.0.0.93-k8s-nginx--deployment--8587fbcb89--hrpzx-eth0" Jul 15 11:34:04.111868 env[1204]: 2025-07-15 11:34:04.107 [INFO][3029] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e" HandleID="k8s-pod-network.fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e" Workload="10.0.0.93-k8s-nginx--deployment--8587fbcb89--hrpzx-eth0" Jul 15 11:34:04.111868 env[1204]: 2025-07-15 11:34:04.108 [INFO][3029] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 15 11:34:04.111868 env[1204]: 2025-07-15 11:34:04.110 [INFO][3020] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e" Jul 15 11:34:04.112427 env[1204]: time="2025-07-15T11:34:04.111885357Z" level=info msg="TearDown network for sandbox \"fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e\" successfully" Jul 15 11:34:04.115224 env[1204]: time="2025-07-15T11:34:04.115192179Z" level=info msg="RemovePodSandbox \"fd7a8f1460fa235057b74e2ba49a15fd7a919c39d8e4c5e3932e295856793d0e\" returns successfully" Jul 15 11:34:04.815523 kubelet[1447]: E0715 11:34:04.815452 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:05.816310 kubelet[1447]: E0715 11:34:05.816259 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:06.817443 kubelet[1447]: E0715 11:34:06.817361 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:07.818146 kubelet[1447]: E0715 11:34:07.818075 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:08.818989 kubelet[1447]: E0715 11:34:08.818907 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:09.620592 systemd[1]: Created slice kubepods-besteffort-podb489bf5b_a1ce_491f_baa0_cfefa6bdadbf.slice. Jul 15 11:34:09.786439 kubelet[1447]: I0715 11:34:09.786373 1447 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-89596539-4d4d-451c-9d7f-5cff14176b05\" (UniqueName: \"kubernetes.io/nfs/b489bf5b-a1ce-491f-baa0-cfefa6bdadbf-pvc-89596539-4d4d-451c-9d7f-5cff14176b05\") pod \"test-pod-1\" (UID: \"b489bf5b-a1ce-491f-baa0-cfefa6bdadbf\") " pod="default/test-pod-1" Jul 15 11:34:09.786439 kubelet[1447]: I0715 11:34:09.786431 1447 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-x67jx\" (UniqueName: \"kubernetes.io/projected/b489bf5b-a1ce-491f-baa0-cfefa6bdadbf-kube-api-access-x67jx\") pod \"test-pod-1\" (UID: \"b489bf5b-a1ce-491f-baa0-cfefa6bdadbf\") " pod="default/test-pod-1" Jul 15 11:34:09.819913 kubelet[1447]: E0715 11:34:09.819823 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:09.898000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:09.901457 kernel: Failed to create system directory netfs Jul 15 11:34:09.901619 kernel: kauditd_printk_skb: 74 callbacks suppressed Jul 15 11:34:09.901645 kernel: audit: type=1400 audit(1752579249.898:775): avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:09.901666 kernel: Failed to create system directory netfs Jul 15 11:34:09.902231 kernel: audit: type=1400 audit(1752579249.898:775): avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:09.898000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:09.898000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:09.934003 kernel: Failed to create system directory netfs Jul 15 11:34:09.934036 kernel: audit: type=1400 audit(1752579249.898:775): avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:09.934056 kernel: Failed to create system directory netfs Jul 15 11:34:09.934071 kernel: audit: type=1400 audit(1752579249.898:775): avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:09.898000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:09.898000 audit[3051]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=555e1d6d05e0 a1=153bc a2=555deb4e32b0 a3=5 items=0 ppid=61 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:09.943144 kernel: audit: type=1300 audit(1752579249.898:775): arch=c000003e syscall=175 success=yes exit=0 a0=555e1d6d05e0 a1=153bc a2=555deb4e32b0 a3=5 items=0 ppid=61 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:09.943193 kernel: audit: type=1327 audit(1752579249.898:775): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 15 11:34:09.898000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 15 11:34:09.941000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:09.987126 kernel: Failed to create system directory fscache Jul 15 11:34:09.987190 kernel: audit: type=1400 audit(1752579249.941:776): avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:09.987209 kernel: Failed to create system directory fscache Jul 15 11:34:09.987229 kernel: audit: type=1400 audit(1752579249.941:776): avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:09.941000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:09.941000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:09.992875 kernel: Failed to create system directory fscache Jul 15 11:34:09.993057 kernel: audit: type=1400 audit(1752579249.941:776): avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:09.993081 kernel: Failed to create system directory fscache Jul 15 11:34:09.995942 kernel: audit: type=1400 audit(1752579249.941:776): avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:09.941000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:09.941000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.001251 kernel: Failed to create system directory fscache Jul 15 11:34:10.001292 kernel: Failed to create system directory fscache Jul 15 11:34:09.941000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:09.941000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.002976 kernel: Failed to create system directory fscache Jul 15 11:34:10.003004 kernel: Failed to create system directory fscache Jul 15 11:34:09.941000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:09.941000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.004684 kernel: Failed to create system directory fscache Jul 15 11:34:10.004728 kernel: Failed to create system directory fscache Jul 15 11:34:09.941000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:09.941000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.006455 kernel: Failed to create system directory fscache Jul 15 11:34:10.006487 kernel: Failed to create system directory fscache Jul 15 11:34:09.941000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:09.941000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.008172 kernel: Failed to create system directory fscache Jul 15 11:34:10.008211 kernel: Failed to create system directory fscache Jul 15 11:34:09.941000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:09.941000 audit[3051]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=555e1d8e59c0 a1=4c0fc a2=555deb4e32b0 a3=5 items=0 ppid=61 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:09.941000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 15 11:34:10.012152 kernel: FS-Cache: Loaded Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.046296 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.046387 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.046420 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.048855 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.048900 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.048927 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.050606 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.050651 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.052331 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.052391 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.054637 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.054679 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.054699 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.056250 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.056288 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.057872 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.057902 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.059517 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.059550 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.061142 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.061194 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.062809 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.062851 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.064395 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.064437 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.065181 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.066862 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.066892 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.068531 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.068575 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.070881 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.070944 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.070968 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.072684 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.072724 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.074285 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.074324 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.076827 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.076868 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.076900 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.078504 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.078539 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.080230 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.080273 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.081878 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.081920 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.083552 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.083583 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.085289 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.085319 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.087900 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.087970 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.087998 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.089635 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.089675 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.091390 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.091452 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.093829 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.093871 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.093895 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.095538 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.095573 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.097209 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.097247 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.098819 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.098869 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.100579 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.100633 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.102339 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.102397 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.104873 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.104926 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.104953 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.106633 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.106683 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.108326 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.108375 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.110868 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.110928 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.110953 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.112636 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.112680 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.114356 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.114396 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.116941 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.116978 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.116998 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.118698 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.118718 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.120445 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.120488 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.122137 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.122186 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.123682 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.123719 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.125292 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.125330 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.126948 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.126991 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.128586 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.128628 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.130797 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.130819 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.130832 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.132183 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.132216 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.133646 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.133713 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.134336 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.135721 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.135748 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.136409 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.137775 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.137804 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.138473 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.140536 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.140560 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.140581 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.141221 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.142708 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.142757 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.144753 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.144774 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.144790 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.145435 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.033000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.146792 kernel: Failed to create system directory sunrpc Jul 15 11:34:10.156217 kernel: RPC: Registered named UNIX socket transport module. Jul 15 11:34:10.156265 kernel: RPC: Registered udp transport module. Jul 15 11:34:10.156284 kernel: RPC: Registered tcp transport module. Jul 15 11:34:10.158133 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Jul 15 11:34:10.033000 audit[3051]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=555e1d931ad0 a1=1a81bc a2=555deb4e32b0 a3=5 items=6 ppid=61 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:10.033000 audit: CWD cwd="/" Jul 15 11:34:10.033000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:34:10.033000 audit: PATH item=1 name=(null) inode=25740 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:34:10.033000 audit: PATH item=2 name=(null) inode=25740 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:34:10.033000 audit: PATH item=3 name=(null) inode=25741 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:34:10.033000 audit: PATH item=4 name=(null) inode=25740 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:34:10.033000 audit: PATH item=5 name=(null) inode=25742 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:34:10.033000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.193426 kernel: Failed to create system directory nfs Jul 15 11:34:10.193511 kernel: Failed to create system directory nfs Jul 15 11:34:10.193535 kernel: Failed to create system directory nfs Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.194782 kernel: Failed to create system directory nfs Jul 15 11:34:10.194829 kernel: Failed to create system directory nfs Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.195456 kernel: Failed to create system directory nfs Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.196160 kernel: Failed to create system directory nfs Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.197543 kernel: Failed to create system directory nfs Jul 15 11:34:10.197583 kernel: Failed to create system directory nfs Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.199561 kernel: Failed to create system directory nfs Jul 15 11:34:10.199585 kernel: Failed to create system directory nfs Jul 15 11:34:10.199600 kernel: Failed to create system directory nfs Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.201581 kernel: Failed to create system directory nfs Jul 15 11:34:10.201639 kernel: Failed to create system directory nfs Jul 15 11:34:10.201670 kernel: Failed to create system directory nfs Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.202280 kernel: Failed to create system directory nfs Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.203650 kernel: Failed to create system directory nfs Jul 15 11:34:10.203692 kernel: Failed to create system directory nfs Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.204309 kernel: Failed to create system directory nfs Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.205648 kernel: Failed to create system directory nfs Jul 15 11:34:10.205686 kernel: Failed to create system directory nfs Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.206291 kernel: Failed to create system directory nfs Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.207631 kernel: Failed to create system directory nfs Jul 15 11:34:10.207683 kernel: Failed to create system directory nfs Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.208286 kernel: Failed to create system directory nfs Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.209622 kernel: Failed to create system directory nfs Jul 15 11:34:10.209665 kernel: Failed to create system directory nfs Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.210310 kernel: Failed to create system directory nfs Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.211651 kernel: Failed to create system directory nfs Jul 15 11:34:10.211693 kernel: Failed to create system directory nfs Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.212316 kernel: Failed to create system directory nfs Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.213642 kernel: Failed to create system directory nfs Jul 15 11:34:10.213687 kernel: Failed to create system directory nfs Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.214305 kernel: Failed to create system directory nfs Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.215632 kernel: Failed to create system directory nfs Jul 15 11:34:10.215675 kernel: Failed to create system directory nfs Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.217634 kernel: Failed to create system directory nfs Jul 15 11:34:10.217685 kernel: Failed to create system directory nfs Jul 15 11:34:10.217708 kernel: Failed to create system directory nfs Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.218294 kernel: Failed to create system directory nfs Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.219636 kernel: Failed to create system directory nfs Jul 15 11:34:10.219679 kernel: Failed to create system directory nfs Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.220300 kernel: Failed to create system directory nfs Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.221675 kernel: Failed to create system directory nfs Jul 15 11:34:10.221716 kernel: Failed to create system directory nfs Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.223652 kernel: Failed to create system directory nfs Jul 15 11:34:10.223690 kernel: Failed to create system directory nfs Jul 15 11:34:10.223705 kernel: Failed to create system directory nfs Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.225669 kernel: Failed to create system directory nfs Jul 15 11:34:10.225695 kernel: Failed to create system directory nfs Jul 15 11:34:10.225709 kernel: Failed to create system directory nfs Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.227654 kernel: Failed to create system directory nfs Jul 15 11:34:10.227679 kernel: Failed to create system directory nfs Jul 15 11:34:10.227693 kernel: Failed to create system directory nfs Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.229645 kernel: Failed to create system directory nfs Jul 15 11:34:10.229668 kernel: Failed to create system directory nfs Jul 15 11:34:10.229682 kernel: Failed to create system directory nfs Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.231642 kernel: Failed to create system directory nfs Jul 15 11:34:10.231676 kernel: Failed to create system directory nfs Jul 15 11:34:10.231694 kernel: Failed to create system directory nfs Jul 15 11:34:10.184000 audit[3051]: AVC avc: denied { confidentiality } for pid=3051 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.184000 audit[3051]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=555e1db52af0 a1=16ed54 a2=555deb4e32b0 a3=5 items=0 ppid=61 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:10.184000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 15 11:34:10.253146 kernel: FS-Cache: Netfs 'nfs' registered for caching Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.289571 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.289635 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.289652 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.291567 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.291601 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.291616 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.293580 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.293600 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.293614 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.295583 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.295610 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.295624 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.297577 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.297598 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.297614 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.299667 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.299710 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.299725 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.301656 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.301680 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.301693 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.303182 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.303326 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.304554 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.304594 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.306589 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.306615 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.306632 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.308615 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.308647 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.308666 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.310651 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.310693 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.310708 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.312754 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.312784 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.312798 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.314158 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.314182 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.315571 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.315609 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.317643 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.317668 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.317682 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.319775 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.319802 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.319817 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.321253 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.321293 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.322684 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.322716 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.324136 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.324158 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.325521 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.325558 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.327619 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.327639 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.327653 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.329717 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.329753 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.329771 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.331164 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.331314 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.332532 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.332579 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.334642 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.334690 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.334722 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.336138 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.336230 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.337637 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.337691 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.339729 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.339764 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.339779 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.341139 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.341172 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.342536 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.342568 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.344594 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.344624 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.344640 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.346733 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.346809 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.346833 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.348162 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.348201 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.349587 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.349634 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.351750 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.351792 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.351815 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.353248 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.353307 kernel: Failed to create system directory nfs4 Jul 15 11:34:10.277000 audit[3056]: AVC avc: denied { confidentiality } for pid=3056 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.493797 kernel: NFS: Registering the id_resolver key type Jul 15 11:34:10.493934 kernel: Key type id_resolver registered Jul 15 11:34:10.494782 kernel: Key type id_legacy registered Jul 15 11:34:10.277000 audit[3056]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7faad83f2010 a1=2095ac a2=55e9e7d082b0 a3=5 items=0 ppid=61 pid=3056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:10.277000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Jul 15 11:34:10.502000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.502000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.507669 kernel: Failed to create system directory rpcgss Jul 15 11:34:10.507695 kernel: Failed to create system directory rpcgss Jul 15 11:34:10.507710 kernel: Failed to create system directory rpcgss Jul 15 11:34:10.502000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.502000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.502000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.509812 kernel: Failed to create system directory rpcgss Jul 15 11:34:10.509848 kernel: Failed to create system directory rpcgss Jul 15 11:34:10.509874 kernel: Failed to create system directory rpcgss Jul 15 11:34:10.502000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.502000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.511253 kernel: Failed to create system directory rpcgss Jul 15 11:34:10.511288 kernel: Failed to create system directory rpcgss Jul 15 11:34:10.502000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.502000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.512693 kernel: Failed to create system directory rpcgss Jul 15 11:34:10.512717 kernel: Failed to create system directory rpcgss Jul 15 11:34:10.502000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.502000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.514150 kernel: Failed to create system directory rpcgss Jul 15 11:34:10.514197 kernel: Failed to create system directory rpcgss Jul 15 11:34:10.502000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.502000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.515613 kernel: Failed to create system directory rpcgss Jul 15 11:34:10.515645 kernel: Failed to create system directory rpcgss Jul 15 11:34:10.502000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.502000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.502000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.517801 kernel: Failed to create system directory rpcgss Jul 15 11:34:10.517843 kernel: Failed to create system directory rpcgss Jul 15 11:34:10.517867 kernel: Failed to create system directory rpcgss Jul 15 11:34:10.502000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.502000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.519272 kernel: Failed to create system directory rpcgss Jul 15 11:34:10.519306 kernel: Failed to create system directory rpcgss Jul 15 11:34:10.502000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.502000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.520741 kernel: Failed to create system directory rpcgss Jul 15 11:34:10.520784 kernel: Failed to create system directory rpcgss Jul 15 11:34:10.502000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.502000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.522251 kernel: Failed to create system directory rpcgss Jul 15 11:34:10.522293 kernel: Failed to create system directory rpcgss Jul 15 11:34:10.502000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.502000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.523723 kernel: Failed to create system directory rpcgss Jul 15 11:34:10.523768 kernel: Failed to create system directory rpcgss Jul 15 11:34:10.502000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.502000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:10.525185 kernel: Failed to create system directory rpcgss Jul 15 11:34:10.502000 audit[3059]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fbeec177010 a1=70bac a2=5588fef332b0 a3=5 items=0 ppid=61 pid=3059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:10.502000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Jul 15 11:34:10.541036 nfsidmap[3068]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Jul 15 11:34:10.544230 nfsidmap[3071]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Jul 15 11:34:10.552000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2676 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 15 11:34:10.552000 audit[1272]: AVC avc: denied { watch_reads } for pid=1272 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2676 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 15 11:34:10.552000 audit[1272]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5578864d8dc0 a2=10 a3=d4d94c2bd5f30242 items=0 ppid=1 pid=1272 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:10.552000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 15 11:34:10.552000 audit[1272]: AVC avc: denied { watch_reads } for pid=1272 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2676 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 15 11:34:10.552000 audit[1272]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5578864d8dc0 a2=10 a3=d4d94c2bd5f30242 items=0 ppid=1 pid=1272 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:10.552000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 15 11:34:10.552000 audit[1272]: AVC avc: denied { watch_reads } for pid=1272 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2676 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 15 11:34:10.552000 audit[1272]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5578864d8dc0 a2=10 a3=d4d94c2bd5f30242 items=0 ppid=1 pid=1272 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:10.552000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 15 11:34:10.552000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2676 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 15 11:34:10.552000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2676 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 15 11:34:10.821168 kubelet[1447]: E0715 11:34:10.820945 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:10.823798 env[1204]: time="2025-07-15T11:34:10.823755259Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:b489bf5b-a1ce-491f-baa0-cfefa6bdadbf,Namespace:default,Attempt:0,}" Jul 15 11:34:10.915096 systemd-networkd[1024]: cali5ec59c6bf6e: Link UP Jul 15 11:34:10.917674 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 15 11:34:10.917704 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Jul 15 11:34:10.917624 systemd-networkd[1024]: cali5ec59c6bf6e: Gained carrier Jul 15 11:34:10.928141 env[1204]: 2025-07-15 11:34:10.861 [INFO][3076] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.93-k8s-test--pod--1-eth0 default b489bf5b-a1ce-491f-baa0-cfefa6bdadbf 1439 0 2025-07-15 11:33:52 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.93 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="e370ea9eb2a645e081cf288bc0686f78e354e538496c762c0435a58ad1f5ee1c" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.93-k8s-test--pod--1-" Jul 15 11:34:10.928141 env[1204]: 2025-07-15 11:34:10.862 [INFO][3076] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="e370ea9eb2a645e081cf288bc0686f78e354e538496c762c0435a58ad1f5ee1c" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.93-k8s-test--pod--1-eth0" Jul 15 11:34:10.928141 env[1204]: 2025-07-15 11:34:10.883 [INFO][3090] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e370ea9eb2a645e081cf288bc0686f78e354e538496c762c0435a58ad1f5ee1c" HandleID="k8s-pod-network.e370ea9eb2a645e081cf288bc0686f78e354e538496c762c0435a58ad1f5ee1c" Workload="10.0.0.93-k8s-test--pod--1-eth0" Jul 15 11:34:10.928141 env[1204]: 2025-07-15 11:34:10.883 [INFO][3090] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="e370ea9eb2a645e081cf288bc0686f78e354e538496c762c0435a58ad1f5ee1c" HandleID="k8s-pod-network.e370ea9eb2a645e081cf288bc0686f78e354e538496c762c0435a58ad1f5ee1c" Workload="10.0.0.93-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004e1f0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.93", "pod":"test-pod-1", "timestamp":"2025-07-15 11:34:10.883514369 +0000 UTC"}, Hostname:"10.0.0.93", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 15 11:34:10.928141 env[1204]: 2025-07-15 11:34:10.883 [INFO][3090] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 15 11:34:10.928141 env[1204]: 2025-07-15 11:34:10.883 [INFO][3090] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 15 11:34:10.928141 env[1204]: 2025-07-15 11:34:10.883 [INFO][3090] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.93' Jul 15 11:34:10.928141 env[1204]: 2025-07-15 11:34:10.890 [INFO][3090] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.e370ea9eb2a645e081cf288bc0686f78e354e538496c762c0435a58ad1f5ee1c" host="10.0.0.93" Jul 15 11:34:10.928141 env[1204]: 2025-07-15 11:34:10.894 [INFO][3090] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.93" Jul 15 11:34:10.928141 env[1204]: 2025-07-15 11:34:10.897 [INFO][3090] ipam/ipam.go 511: Trying affinity for 192.168.75.192/26 host="10.0.0.93" Jul 15 11:34:10.928141 env[1204]: 2025-07-15 11:34:10.899 [INFO][3090] ipam/ipam.go 158: Attempting to load block cidr=192.168.75.192/26 host="10.0.0.93" Jul 15 11:34:10.928141 env[1204]: 2025-07-15 11:34:10.901 [INFO][3090] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.75.192/26 host="10.0.0.93" Jul 15 11:34:10.928141 env[1204]: 2025-07-15 11:34:10.901 [INFO][3090] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.75.192/26 handle="k8s-pod-network.e370ea9eb2a645e081cf288bc0686f78e354e538496c762c0435a58ad1f5ee1c" host="10.0.0.93" Jul 15 11:34:10.928141 env[1204]: 2025-07-15 11:34:10.903 [INFO][3090] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.e370ea9eb2a645e081cf288bc0686f78e354e538496c762c0435a58ad1f5ee1c Jul 15 11:34:10.928141 env[1204]: 2025-07-15 11:34:10.907 [INFO][3090] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.75.192/26 handle="k8s-pod-network.e370ea9eb2a645e081cf288bc0686f78e354e538496c762c0435a58ad1f5ee1c" host="10.0.0.93" Jul 15 11:34:10.928141 env[1204]: 2025-07-15 11:34:10.911 [INFO][3090] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.75.196/26] block=192.168.75.192/26 handle="k8s-pod-network.e370ea9eb2a645e081cf288bc0686f78e354e538496c762c0435a58ad1f5ee1c" host="10.0.0.93" Jul 15 11:34:10.928141 env[1204]: 2025-07-15 11:34:10.911 [INFO][3090] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.75.196/26] handle="k8s-pod-network.e370ea9eb2a645e081cf288bc0686f78e354e538496c762c0435a58ad1f5ee1c" host="10.0.0.93" Jul 15 11:34:10.928141 env[1204]: 2025-07-15 11:34:10.911 [INFO][3090] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 15 11:34:10.928141 env[1204]: 2025-07-15 11:34:10.911 [INFO][3090] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.75.196/26] IPv6=[] ContainerID="e370ea9eb2a645e081cf288bc0686f78e354e538496c762c0435a58ad1f5ee1c" HandleID="k8s-pod-network.e370ea9eb2a645e081cf288bc0686f78e354e538496c762c0435a58ad1f5ee1c" Workload="10.0.0.93-k8s-test--pod--1-eth0" Jul 15 11:34:10.928141 env[1204]: 2025-07-15 11:34:10.913 [INFO][3076] cni-plugin/k8s.go 418: Populated endpoint ContainerID="e370ea9eb2a645e081cf288bc0686f78e354e538496c762c0435a58ad1f5ee1c" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.93-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.93-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"b489bf5b-a1ce-491f-baa0-cfefa6bdadbf", ResourceVersion:"1439", Generation:0, CreationTimestamp:time.Date(2025, time.July, 15, 11, 33, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.93", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.75.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 15 11:34:10.928822 env[1204]: 2025-07-15 11:34:10.913 [INFO][3076] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.75.196/32] ContainerID="e370ea9eb2a645e081cf288bc0686f78e354e538496c762c0435a58ad1f5ee1c" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.93-k8s-test--pod--1-eth0" Jul 15 11:34:10.928822 env[1204]: 2025-07-15 11:34:10.913 [INFO][3076] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="e370ea9eb2a645e081cf288bc0686f78e354e538496c762c0435a58ad1f5ee1c" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.93-k8s-test--pod--1-eth0" Jul 15 11:34:10.928822 env[1204]: 2025-07-15 11:34:10.919 [INFO][3076] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="e370ea9eb2a645e081cf288bc0686f78e354e538496c762c0435a58ad1f5ee1c" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.93-k8s-test--pod--1-eth0" Jul 15 11:34:10.928822 env[1204]: 2025-07-15 11:34:10.919 [INFO][3076] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="e370ea9eb2a645e081cf288bc0686f78e354e538496c762c0435a58ad1f5ee1c" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.93-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.93-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"b489bf5b-a1ce-491f-baa0-cfefa6bdadbf", ResourceVersion:"1439", Generation:0, CreationTimestamp:time.Date(2025, time.July, 15, 11, 33, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.93", ContainerID:"e370ea9eb2a645e081cf288bc0686f78e354e538496c762c0435a58ad1f5ee1c", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.75.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"52:29:3b:74:5b:a6", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 15 11:34:10.928822 env[1204]: 2025-07-15 11:34:10.926 [INFO][3076] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="e370ea9eb2a645e081cf288bc0686f78e354e538496c762c0435a58ad1f5ee1c" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.93-k8s-test--pod--1-eth0" Jul 15 11:34:10.941045 env[1204]: time="2025-07-15T11:34:10.940934344Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 15 11:34:10.941045 env[1204]: time="2025-07-15T11:34:10.940977319Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 15 11:34:10.941045 env[1204]: time="2025-07-15T11:34:10.940988301Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 15 11:34:10.941225 env[1204]: time="2025-07-15T11:34:10.941141836Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e370ea9eb2a645e081cf288bc0686f78e354e538496c762c0435a58ad1f5ee1c pid=3112 runtime=io.containerd.runc.v2 Jul 15 11:34:10.943000 audit[3121]: NETFILTER_CFG table=filter:96 family=2 entries=40 op=nft_register_chain pid=3121 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 15 11:34:10.943000 audit[3121]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffe11e0b4f0 a2=0 a3=7ffe11e0b4dc items=0 ppid=2167 pid=3121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:10.943000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 15 11:34:10.957349 systemd[1]: Started cri-containerd-e370ea9eb2a645e081cf288bc0686f78e354e538496c762c0435a58ad1f5ee1c.scope. Jul 15 11:34:10.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:10.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:10.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:10.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:10.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:10.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:10.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:10.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:10.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:10.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:10.966000 audit: BPF prog-id=123 op=LOAD Jul 15 11:34:10.967000 audit[3122]: AVC avc: denied { bpf } for pid=3122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:10.967000 audit[3122]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3112 pid=3122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:10.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533373065613965623261363435653038316366323838626330363836 Jul 15 11:34:10.967000 audit[3122]: AVC avc: denied { perfmon } for pid=3122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:10.967000 audit[3122]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3112 pid=3122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:10.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533373065613965623261363435653038316366323838626330363836 Jul 15 11:34:10.967000 audit[3122]: AVC avc: denied { bpf } for pid=3122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:10.967000 audit[3122]: AVC avc: denied { bpf } for pid=3122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:10.967000 audit[3122]: AVC avc: denied { bpf } for pid=3122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:10.967000 audit[3122]: AVC avc: denied { perfmon } for pid=3122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:10.967000 audit[3122]: AVC avc: denied { perfmon } for pid=3122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:10.967000 audit[3122]: AVC avc: denied { perfmon } for pid=3122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:10.967000 audit[3122]: AVC avc: denied { perfmon } for pid=3122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:10.967000 audit[3122]: AVC avc: denied { perfmon } for pid=3122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:10.967000 audit[3122]: AVC avc: denied { bpf } for pid=3122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:10.967000 audit[3122]: AVC avc: denied { bpf } for pid=3122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:10.967000 audit: BPF prog-id=124 op=LOAD Jul 15 11:34:10.967000 audit[3122]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000f1d90 items=0 ppid=3112 pid=3122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:10.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533373065613965623261363435653038316366323838626330363836 Jul 15 11:34:10.967000 audit[3122]: AVC avc: denied { bpf } for pid=3122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:10.967000 audit[3122]: AVC avc: denied { bpf } for pid=3122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:10.967000 audit[3122]: AVC avc: denied { perfmon } for pid=3122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:10.967000 audit[3122]: AVC avc: denied { perfmon } for pid=3122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:10.967000 audit[3122]: AVC avc: denied { perfmon } for pid=3122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:10.967000 audit[3122]: AVC avc: denied { perfmon } for pid=3122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:10.967000 audit[3122]: AVC avc: denied { perfmon } for pid=3122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:10.967000 audit[3122]: AVC avc: denied { bpf } for pid=3122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:10.967000 audit[3122]: AVC avc: denied { bpf } for pid=3122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:10.967000 audit: BPF prog-id=125 op=LOAD Jul 15 11:34:10.967000 audit[3122]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000f1dd8 items=0 ppid=3112 pid=3122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:10.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533373065613965623261363435653038316366323838626330363836 Jul 15 11:34:10.967000 audit: BPF prog-id=125 op=UNLOAD Jul 15 11:34:10.967000 audit: BPF prog-id=124 op=UNLOAD Jul 15 11:34:10.967000 audit[3122]: AVC avc: denied { bpf } for pid=3122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:10.967000 audit[3122]: AVC avc: denied { bpf } for pid=3122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:10.967000 audit[3122]: AVC avc: denied { bpf } for pid=3122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:10.967000 audit[3122]: AVC avc: denied { perfmon } for pid=3122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:10.967000 audit[3122]: AVC avc: denied { perfmon } for pid=3122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:10.967000 audit[3122]: AVC avc: denied { perfmon } for pid=3122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:10.967000 audit[3122]: AVC avc: denied { perfmon } for pid=3122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:10.967000 audit[3122]: AVC avc: denied { perfmon } for pid=3122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:10.967000 audit[3122]: AVC avc: denied { bpf } for pid=3122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:10.967000 audit[3122]: AVC avc: denied { bpf } for pid=3122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:10.967000 audit: BPF prog-id=126 op=LOAD Jul 15 11:34:10.967000 audit[3122]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003e81e8 items=0 ppid=3112 pid=3122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:10.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533373065613965623261363435653038316366323838626330363836 Jul 15 11:34:10.969362 systemd-resolved[1143]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 15 11:34:10.992465 env[1204]: time="2025-07-15T11:34:10.992375069Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:b489bf5b-a1ce-491f-baa0-cfefa6bdadbf,Namespace:default,Attempt:0,} returns sandbox id \"e370ea9eb2a645e081cf288bc0686f78e354e538496c762c0435a58ad1f5ee1c\"" Jul 15 11:34:10.994379 env[1204]: time="2025-07-15T11:34:10.994334699Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Jul 15 11:34:11.388252 env[1204]: time="2025-07-15T11:34:11.388162555Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:34:11.390320 env[1204]: time="2025-07-15T11:34:11.390254582Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:f6422896ca84c9af48d5417d6b7a573bf6b38f81edc15538907d987fc658d909,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:34:11.392128 env[1204]: time="2025-07-15T11:34:11.392076615Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:34:11.394402 env[1204]: time="2025-07-15T11:34:11.394342716Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:30bb68e656e0665bce700e67d2756f68bdca3345fa1099a32bfdb8febcf621cd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:34:11.395141 env[1204]: time="2025-07-15T11:34:11.395082754Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:f6422896ca84c9af48d5417d6b7a573bf6b38f81edc15538907d987fc658d909\"" Jul 15 11:34:11.397686 env[1204]: time="2025-07-15T11:34:11.397644793Z" level=info msg="CreateContainer within sandbox \"e370ea9eb2a645e081cf288bc0686f78e354e538496c762c0435a58ad1f5ee1c\" for container &ContainerMetadata{Name:test,Attempt:0,}" Jul 15 11:34:11.410374 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3999679673.mount: Deactivated successfully. Jul 15 11:34:11.410685 env[1204]: time="2025-07-15T11:34:11.410638642Z" level=info msg="CreateContainer within sandbox \"e370ea9eb2a645e081cf288bc0686f78e354e538496c762c0435a58ad1f5ee1c\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"8801655adb2f0bf985177bb9f87b05bb9d4b3280939a7f92391986f9f29434f1\"" Jul 15 11:34:11.411479 env[1204]: time="2025-07-15T11:34:11.411440491Z" level=info msg="StartContainer for \"8801655adb2f0bf985177bb9f87b05bb9d4b3280939a7f92391986f9f29434f1\"" Jul 15 11:34:11.426397 systemd[1]: Started cri-containerd-8801655adb2f0bf985177bb9f87b05bb9d4b3280939a7f92391986f9f29434f1.scope. Jul 15 11:34:11.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.439000 audit: BPF prog-id=127 op=LOAD Jul 15 11:34:11.439000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.439000 audit[3153]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3112 pid=3153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.439000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838303136353561646232663062663938353137376262396638376230 Jul 15 11:34:11.439000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.439000 audit[3153]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3112 pid=3153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.439000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838303136353561646232663062663938353137376262396638376230 Jul 15 11:34:11.439000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.439000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.439000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.439000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.439000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.439000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.439000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.439000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.439000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.439000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.439000 audit: BPF prog-id=128 op=LOAD Jul 15 11:34:11.439000 audit[3153]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000097e80 items=0 ppid=3112 pid=3153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.439000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838303136353561646232663062663938353137376262396638376230 Jul 15 11:34:11.439000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.439000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.439000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.439000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.439000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.439000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.439000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.439000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.439000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.439000 audit: BPF prog-id=129 op=LOAD Jul 15 11:34:11.439000 audit[3153]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000097ec8 items=0 ppid=3112 pid=3153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.439000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838303136353561646232663062663938353137376262396638376230 Jul 15 11:34:11.439000 audit: BPF prog-id=129 op=UNLOAD Jul 15 11:34:11.439000 audit: BPF prog-id=128 op=UNLOAD Jul 15 11:34:11.439000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.439000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.439000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.439000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.439000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.439000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.439000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.439000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.439000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.439000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.439000 audit: BPF prog-id=130 op=LOAD Jul 15 11:34:11.439000 audit[3153]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003982d8 items=0 ppid=3112 pid=3153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.439000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838303136353561646232663062663938353137376262396638376230 Jul 15 11:34:11.453789 env[1204]: time="2025-07-15T11:34:11.453726179Z" level=info msg="StartContainer for \"8801655adb2f0bf985177bb9f87b05bb9d4b3280939a7f92391986f9f29434f1\" returns successfully" Jul 15 11:34:11.657900 kubelet[1447]: I0715 11:34:11.657747 1447 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=19.255380527 podStartE2EDuration="19.657727362s" podCreationTimestamp="2025-07-15 11:33:52 +0000 UTC" firstStartedPulling="2025-07-15 11:34:10.993934786 +0000 UTC m=+67.720152453" lastFinishedPulling="2025-07-15 11:34:11.396281611 +0000 UTC m=+68.122499288" observedRunningTime="2025-07-15 11:34:11.657513238 +0000 UTC m=+68.383730915" watchObservedRunningTime="2025-07-15 11:34:11.657727362 +0000 UTC m=+68.383945049" Jul 15 11:34:11.821795 kubelet[1447]: E0715 11:34:11.821740 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:12.824855 kubelet[1447]: E0715 11:34:12.824780 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:12.890448 systemd-networkd[1024]: cali5ec59c6bf6e: Gained IPv6LL Jul 15 11:34:13.825279 kubelet[1447]: E0715 11:34:13.825223 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:14.825416 kubelet[1447]: E0715 11:34:14.825353 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:15.826419 kubelet[1447]: E0715 11:34:15.826343 1447 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"