Jul 15 11:33:28.838922 kernel: Linux version 5.15.188-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Tue Jul 15 10:04:37 -00 2025 Jul 15 11:33:28.838940 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=3fdbb2e3469f90ee764ea38c6fc4332d45967696e3c4fd4a8c65f8d0125b235b Jul 15 11:33:28.838950 kernel: BIOS-provided physical RAM map: Jul 15 11:33:28.838956 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Jul 15 11:33:28.838961 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000007fffff] usable Jul 15 11:33:28.838966 kernel: BIOS-e820: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS Jul 15 11:33:28.838973 kernel: BIOS-e820: [mem 0x0000000000808000-0x000000000080afff] usable Jul 15 11:33:28.838979 kernel: BIOS-e820: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS Jul 15 11:33:28.838985 kernel: BIOS-e820: [mem 0x000000000080c000-0x000000000080ffff] usable Jul 15 11:33:28.838991 kernel: BIOS-e820: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS Jul 15 11:33:28.838997 kernel: BIOS-e820: [mem 0x0000000000900000-0x000000009c8eefff] usable Jul 15 11:33:28.839002 kernel: BIOS-e820: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved Jul 15 11:33:28.839007 kernel: BIOS-e820: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data Jul 15 11:33:28.839013 kernel: BIOS-e820: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS Jul 15 11:33:28.839020 kernel: BIOS-e820: [mem 0x000000009cbff000-0x000000009cf3ffff] usable Jul 15 11:33:28.839027 kernel: BIOS-e820: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved Jul 15 11:33:28.839033 kernel: BIOS-e820: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS Jul 15 11:33:28.839039 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Jul 15 11:33:28.839044 kernel: NX (Execute Disable) protection: active Jul 15 11:33:28.839050 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable Jul 15 11:33:28.839056 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable Jul 15 11:33:28.839062 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable Jul 15 11:33:28.839068 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable Jul 15 11:33:28.839073 kernel: extended physical RAM map: Jul 15 11:33:28.839079 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable Jul 15 11:33:28.839086 kernel: reserve setup_data: [mem 0x0000000000100000-0x00000000007fffff] usable Jul 15 11:33:28.839092 kernel: reserve setup_data: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS Jul 15 11:33:28.839098 kernel: reserve setup_data: [mem 0x0000000000808000-0x000000000080afff] usable Jul 15 11:33:28.839104 kernel: reserve setup_data: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS Jul 15 11:33:28.839110 kernel: reserve setup_data: [mem 0x000000000080c000-0x000000000080ffff] usable Jul 15 11:33:28.839116 kernel: reserve setup_data: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS Jul 15 11:33:28.839123 kernel: reserve setup_data: [mem 0x0000000000900000-0x000000009b438017] usable Jul 15 11:33:28.839130 kernel: reserve setup_data: [mem 0x000000009b438018-0x000000009b474e57] usable Jul 15 11:33:28.839136 kernel: reserve setup_data: [mem 0x000000009b474e58-0x000000009b475017] usable Jul 15 11:33:28.839143 kernel: reserve setup_data: [mem 0x000000009b475018-0x000000009b47ec57] usable Jul 15 11:33:28.839149 kernel: reserve setup_data: [mem 0x000000009b47ec58-0x000000009c8eefff] usable Jul 15 11:33:28.839156 kernel: reserve setup_data: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved Jul 15 11:33:28.839162 kernel: reserve setup_data: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data Jul 15 11:33:28.839168 kernel: reserve setup_data: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS Jul 15 11:33:28.839174 kernel: reserve setup_data: [mem 0x000000009cbff000-0x000000009cf3ffff] usable Jul 15 11:33:28.839182 kernel: reserve setup_data: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved Jul 15 11:33:28.839189 kernel: reserve setup_data: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS Jul 15 11:33:28.839195 kernel: reserve setup_data: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Jul 15 11:33:28.839202 kernel: efi: EFI v2.70 by EDK II Jul 15 11:33:28.839209 kernel: efi: SMBIOS=0x9c9ab000 ACPI=0x9cb7e000 ACPI 2.0=0x9cb7e014 MEMATTR=0x9b673018 RNG=0x9cb73018 Jul 15 11:33:28.839215 kernel: random: crng init done Jul 15 11:33:28.839221 kernel: SMBIOS 2.8 present. Jul 15 11:33:28.839228 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 Jul 15 11:33:28.839234 kernel: Hypervisor detected: KVM Jul 15 11:33:28.839240 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Jul 15 11:33:28.839247 kernel: kvm-clock: cpu 0, msr 4719b001, primary cpu clock Jul 15 11:33:28.839253 kernel: kvm-clock: using sched offset of 4460011516 cycles Jul 15 11:33:28.839261 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Jul 15 11:33:28.839268 kernel: tsc: Detected 2794.750 MHz processor Jul 15 11:33:28.839274 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Jul 15 11:33:28.839281 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Jul 15 11:33:28.839287 kernel: last_pfn = 0x9cf40 max_arch_pfn = 0x400000000 Jul 15 11:33:28.839294 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Jul 15 11:33:28.839301 kernel: Using GB pages for direct mapping Jul 15 11:33:28.839307 kernel: Secure boot disabled Jul 15 11:33:28.839314 kernel: ACPI: Early table checksum verification disabled Jul 15 11:33:28.839321 kernel: ACPI: RSDP 0x000000009CB7E014 000024 (v02 BOCHS ) Jul 15 11:33:28.839328 kernel: ACPI: XSDT 0x000000009CB7D0E8 000054 (v01 BOCHS BXPC 00000001 01000013) Jul 15 11:33:28.839334 kernel: ACPI: FACP 0x000000009CB79000 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Jul 15 11:33:28.839341 kernel: ACPI: DSDT 0x000000009CB7A000 0021BA (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 15 11:33:28.839347 kernel: ACPI: FACS 0x000000009CBDD000 000040 Jul 15 11:33:28.839363 kernel: ACPI: APIC 0x000000009CB78000 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 15 11:33:28.839370 kernel: ACPI: HPET 0x000000009CB77000 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 15 11:33:28.839376 kernel: ACPI: MCFG 0x000000009CB76000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 15 11:33:28.839384 kernel: ACPI: WAET 0x000000009CB75000 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 15 11:33:28.839391 kernel: ACPI: BGRT 0x000000009CB74000 000038 (v01 INTEL EDK2 00000002 01000013) Jul 15 11:33:28.839398 kernel: ACPI: Reserving FACP table memory at [mem 0x9cb79000-0x9cb790f3] Jul 15 11:33:28.839404 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cb7a000-0x9cb7c1b9] Jul 15 11:33:28.839411 kernel: ACPI: Reserving FACS table memory at [mem 0x9cbdd000-0x9cbdd03f] Jul 15 11:33:28.839417 kernel: ACPI: Reserving APIC table memory at [mem 0x9cb78000-0x9cb7808f] Jul 15 11:33:28.839423 kernel: ACPI: Reserving HPET table memory at [mem 0x9cb77000-0x9cb77037] Jul 15 11:33:28.839430 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cb76000-0x9cb7603b] Jul 15 11:33:28.839436 kernel: ACPI: Reserving WAET table memory at [mem 0x9cb75000-0x9cb75027] Jul 15 11:33:28.839442 kernel: ACPI: Reserving BGRT table memory at [mem 0x9cb74000-0x9cb74037] Jul 15 11:33:28.839450 kernel: No NUMA configuration found Jul 15 11:33:28.839456 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cf3ffff] Jul 15 11:33:28.839463 kernel: NODE_DATA(0) allocated [mem 0x9cea6000-0x9ceabfff] Jul 15 11:33:28.839469 kernel: Zone ranges: Jul 15 11:33:28.839476 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Jul 15 11:33:28.839482 kernel: DMA32 [mem 0x0000000001000000-0x000000009cf3ffff] Jul 15 11:33:28.839488 kernel: Normal empty Jul 15 11:33:28.839495 kernel: Movable zone start for each node Jul 15 11:33:28.839501 kernel: Early memory node ranges Jul 15 11:33:28.839509 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Jul 15 11:33:28.839515 kernel: node 0: [mem 0x0000000000100000-0x00000000007fffff] Jul 15 11:33:28.839522 kernel: node 0: [mem 0x0000000000808000-0x000000000080afff] Jul 15 11:33:28.839528 kernel: node 0: [mem 0x000000000080c000-0x000000000080ffff] Jul 15 11:33:28.839535 kernel: node 0: [mem 0x0000000000900000-0x000000009c8eefff] Jul 15 11:33:28.839541 kernel: node 0: [mem 0x000000009cbff000-0x000000009cf3ffff] Jul 15 11:33:28.839547 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cf3ffff] Jul 15 11:33:28.839554 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Jul 15 11:33:28.839560 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Jul 15 11:33:28.839567 kernel: On node 0, zone DMA: 8 pages in unavailable ranges Jul 15 11:33:28.839574 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Jul 15 11:33:28.839580 kernel: On node 0, zone DMA: 240 pages in unavailable ranges Jul 15 11:33:28.839587 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges Jul 15 11:33:28.839593 kernel: On node 0, zone DMA32: 12480 pages in unavailable ranges Jul 15 11:33:28.839600 kernel: ACPI: PM-Timer IO Port: 0x608 Jul 15 11:33:28.839606 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Jul 15 11:33:28.839613 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Jul 15 11:33:28.839619 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Jul 15 11:33:28.839626 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Jul 15 11:33:28.839634 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Jul 15 11:33:28.839640 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Jul 15 11:33:28.839647 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Jul 15 11:33:28.839654 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Jul 15 11:33:28.839660 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Jul 15 11:33:28.839666 kernel: TSC deadline timer available Jul 15 11:33:28.839673 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Jul 15 11:33:28.839679 kernel: kvm-guest: KVM setup pv remote TLB flush Jul 15 11:33:28.839686 kernel: kvm-guest: setup PV sched yield Jul 15 11:33:28.839693 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices Jul 15 11:33:28.839700 kernel: Booting paravirtualized kernel on KVM Jul 15 11:33:28.839711 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Jul 15 11:33:28.839719 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Jul 15 11:33:28.842545 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 Jul 15 11:33:28.842554 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 Jul 15 11:33:28.842561 kernel: pcpu-alloc: [0] 0 1 2 3 Jul 15 11:33:28.842568 kernel: kvm-guest: setup async PF for cpu 0 Jul 15 11:33:28.842574 kernel: kvm-guest: stealtime: cpu 0, msr 9b21c0c0 Jul 15 11:33:28.842581 kernel: kvm-guest: PV spinlocks enabled Jul 15 11:33:28.842588 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Jul 15 11:33:28.842595 kernel: Built 1 zonelists, mobility grouping on. Total pages: 629759 Jul 15 11:33:28.842604 kernel: Policy zone: DMA32 Jul 15 11:33:28.842612 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=3fdbb2e3469f90ee764ea38c6fc4332d45967696e3c4fd4a8c65f8d0125b235b Jul 15 11:33:28.842620 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Jul 15 11:33:28.842627 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Jul 15 11:33:28.842635 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jul 15 11:33:28.842641 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jul 15 11:33:28.842649 kernel: Memory: 2397432K/2567000K available (12295K kernel code, 2276K rwdata, 13732K rodata, 47476K init, 4104K bss, 169308K reserved, 0K cma-reserved) Jul 15 11:33:28.842656 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Jul 15 11:33:28.842662 kernel: ftrace: allocating 34607 entries in 136 pages Jul 15 11:33:28.842669 kernel: ftrace: allocated 136 pages with 2 groups Jul 15 11:33:28.842676 kernel: rcu: Hierarchical RCU implementation. Jul 15 11:33:28.842683 kernel: rcu: RCU event tracing is enabled. Jul 15 11:33:28.842690 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Jul 15 11:33:28.842698 kernel: Rude variant of Tasks RCU enabled. Jul 15 11:33:28.842705 kernel: Tracing variant of Tasks RCU enabled. Jul 15 11:33:28.842712 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jul 15 11:33:28.842719 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Jul 15 11:33:28.842736 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Jul 15 11:33:28.842743 kernel: Console: colour dummy device 80x25 Jul 15 11:33:28.842750 kernel: printk: console [ttyS0] enabled Jul 15 11:33:28.842757 kernel: ACPI: Core revision 20210730 Jul 15 11:33:28.842764 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Jul 15 11:33:28.842772 kernel: APIC: Switch to symmetric I/O mode setup Jul 15 11:33:28.842779 kernel: x2apic enabled Jul 15 11:33:28.842786 kernel: Switched APIC routing to physical x2apic. Jul 15 11:33:28.842792 kernel: kvm-guest: setup PV IPIs Jul 15 11:33:28.842799 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Jul 15 11:33:28.842806 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Jul 15 11:33:28.842813 kernel: Calibrating delay loop (skipped) preset value.. 5589.50 BogoMIPS (lpj=2794750) Jul 15 11:33:28.842820 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Jul 15 11:33:28.842826 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Jul 15 11:33:28.842835 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Jul 15 11:33:28.842841 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Jul 15 11:33:28.842848 kernel: Spectre V2 : Mitigation: Retpolines Jul 15 11:33:28.842855 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Jul 15 11:33:28.842862 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Jul 15 11:33:28.842868 kernel: RETBleed: Mitigation: untrained return thunk Jul 15 11:33:28.842875 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Jul 15 11:33:28.842882 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Jul 15 11:33:28.842889 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Jul 15 11:33:28.842897 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Jul 15 11:33:28.842904 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Jul 15 11:33:28.842910 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Jul 15 11:33:28.842917 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Jul 15 11:33:28.842924 kernel: Freeing SMP alternatives memory: 32K Jul 15 11:33:28.842931 kernel: pid_max: default: 32768 minimum: 301 Jul 15 11:33:28.842938 kernel: LSM: Security Framework initializing Jul 15 11:33:28.842944 kernel: SELinux: Initializing. Jul 15 11:33:28.842951 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jul 15 11:33:28.842959 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jul 15 11:33:28.842966 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) Jul 15 11:33:28.842973 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Jul 15 11:33:28.842980 kernel: ... version: 0 Jul 15 11:33:28.842986 kernel: ... bit width: 48 Jul 15 11:33:28.842993 kernel: ... generic registers: 6 Jul 15 11:33:28.843000 kernel: ... value mask: 0000ffffffffffff Jul 15 11:33:28.843007 kernel: ... max period: 00007fffffffffff Jul 15 11:33:28.843013 kernel: ... fixed-purpose events: 0 Jul 15 11:33:28.843022 kernel: ... event mask: 000000000000003f Jul 15 11:33:28.843029 kernel: signal: max sigframe size: 1776 Jul 15 11:33:28.843035 kernel: rcu: Hierarchical SRCU implementation. Jul 15 11:33:28.843042 kernel: smp: Bringing up secondary CPUs ... Jul 15 11:33:28.843049 kernel: x86: Booting SMP configuration: Jul 15 11:33:28.843056 kernel: .... node #0, CPUs: #1 Jul 15 11:33:28.843062 kernel: kvm-clock: cpu 1, msr 4719b041, secondary cpu clock Jul 15 11:33:28.843069 kernel: kvm-guest: setup async PF for cpu 1 Jul 15 11:33:28.843076 kernel: kvm-guest: stealtime: cpu 1, msr 9b29c0c0 Jul 15 11:33:28.843084 kernel: #2 Jul 15 11:33:28.843091 kernel: kvm-clock: cpu 2, msr 4719b081, secondary cpu clock Jul 15 11:33:28.843097 kernel: kvm-guest: setup async PF for cpu 2 Jul 15 11:33:28.843104 kernel: kvm-guest: stealtime: cpu 2, msr 9b31c0c0 Jul 15 11:33:28.843111 kernel: #3 Jul 15 11:33:28.843117 kernel: kvm-clock: cpu 3, msr 4719b0c1, secondary cpu clock Jul 15 11:33:28.843124 kernel: kvm-guest: setup async PF for cpu 3 Jul 15 11:33:28.843131 kernel: kvm-guest: stealtime: cpu 3, msr 9b39c0c0 Jul 15 11:33:28.843137 kernel: smp: Brought up 1 node, 4 CPUs Jul 15 11:33:28.843144 kernel: smpboot: Max logical packages: 1 Jul 15 11:33:28.843152 kernel: smpboot: Total of 4 processors activated (22358.00 BogoMIPS) Jul 15 11:33:28.843159 kernel: devtmpfs: initialized Jul 15 11:33:28.843166 kernel: x86/mm: Memory block size: 128MB Jul 15 11:33:28.843173 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00800000-0x00807fff] (32768 bytes) Jul 15 11:33:28.843179 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x0080b000-0x0080bfff] (4096 bytes) Jul 15 11:33:28.843186 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00810000-0x008fffff] (983040 bytes) Jul 15 11:33:28.843193 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cb7f000-0x9cbfefff] (524288 bytes) Jul 15 11:33:28.843200 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cf60000-0x9cffffff] (655360 bytes) Jul 15 11:33:28.843208 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jul 15 11:33:28.843215 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Jul 15 11:33:28.843222 kernel: pinctrl core: initialized pinctrl subsystem Jul 15 11:33:28.843228 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jul 15 11:33:28.843235 kernel: audit: initializing netlink subsys (disabled) Jul 15 11:33:28.843242 kernel: audit: type=2000 audit(1752579208.223:1): state=initialized audit_enabled=0 res=1 Jul 15 11:33:28.843249 kernel: thermal_sys: Registered thermal governor 'step_wise' Jul 15 11:33:28.843255 kernel: thermal_sys: Registered thermal governor 'user_space' Jul 15 11:33:28.843262 kernel: cpuidle: using governor menu Jul 15 11:33:28.843270 kernel: ACPI: bus type PCI registered Jul 15 11:33:28.843277 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jul 15 11:33:28.843284 kernel: dca service started, version 1.12.1 Jul 15 11:33:28.843295 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Jul 15 11:33:28.843302 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Jul 15 11:33:28.843309 kernel: PCI: Using configuration type 1 for base access Jul 15 11:33:28.843315 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Jul 15 11:33:28.843322 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Jul 15 11:33:28.843329 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Jul 15 11:33:28.843337 kernel: ACPI: Added _OSI(Module Device) Jul 15 11:33:28.843344 kernel: ACPI: Added _OSI(Processor Device) Jul 15 11:33:28.843358 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jul 15 11:33:28.844133 kernel: ACPI: Added _OSI(Linux-Dell-Video) Jul 15 11:33:28.844141 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Jul 15 11:33:28.844148 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Jul 15 11:33:28.844155 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Jul 15 11:33:28.844162 kernel: ACPI: Interpreter enabled Jul 15 11:33:28.844169 kernel: ACPI: PM: (supports S0 S3 S5) Jul 15 11:33:28.844175 kernel: ACPI: Using IOAPIC for interrupt routing Jul 15 11:33:28.844184 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Jul 15 11:33:28.844191 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Jul 15 11:33:28.844198 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Jul 15 11:33:28.844344 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Jul 15 11:33:28.844453 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] Jul 15 11:33:28.844546 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] Jul 15 11:33:28.844560 kernel: PCI host bridge to bus 0000:00 Jul 15 11:33:28.844668 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Jul 15 11:33:28.844773 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Jul 15 11:33:28.844859 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Jul 15 11:33:28.844940 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] Jul 15 11:33:28.845003 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Jul 15 11:33:28.845064 kernel: pci_bus 0000:00: root bus resource [mem 0x800000000-0xfffffffff window] Jul 15 11:33:28.845126 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Jul 15 11:33:28.845212 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Jul 15 11:33:28.845287 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 Jul 15 11:33:28.845367 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xc0000000-0xc0ffffff pref] Jul 15 11:33:28.845452 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xc1044000-0xc1044fff] Jul 15 11:33:28.845546 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] Jul 15 11:33:28.845634 kernel: pci 0000:00:01.0: BAR 0: assigned to efifb Jul 15 11:33:28.845707 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Jul 15 11:33:28.845802 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 Jul 15 11:33:28.845874 kernel: pci 0000:00:02.0: reg 0x10: [io 0x6100-0x611f] Jul 15 11:33:28.845942 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xc1043000-0xc1043fff] Jul 15 11:33:28.846024 kernel: pci 0000:00:02.0: reg 0x20: [mem 0x800000000-0x800003fff 64bit pref] Jul 15 11:33:28.846100 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 Jul 15 11:33:28.846170 kernel: pci 0000:00:03.0: reg 0x10: [io 0x6000-0x607f] Jul 15 11:33:28.846242 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc1042000-0xc1042fff] Jul 15 11:33:28.846309 kernel: pci 0000:00:03.0: reg 0x20: [mem 0x800004000-0x800007fff 64bit pref] Jul 15 11:33:28.846398 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Jul 15 11:33:28.846467 kernel: pci 0000:00:04.0: reg 0x10: [io 0x60e0-0x60ff] Jul 15 11:33:28.846534 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc1041000-0xc1041fff] Jul 15 11:33:28.846602 kernel: pci 0000:00:04.0: reg 0x20: [mem 0x800008000-0x80000bfff 64bit pref] Jul 15 11:33:28.846669 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfffc0000-0xffffffff pref] Jul 15 11:33:28.846767 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Jul 15 11:33:28.846853 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Jul 15 11:33:28.846928 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Jul 15 11:33:28.847010 kernel: pci 0000:00:1f.2: reg 0x20: [io 0x60c0-0x60df] Jul 15 11:33:28.847079 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xc1040000-0xc1040fff] Jul 15 11:33:28.847153 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Jul 15 11:33:28.847226 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x6080-0x60bf] Jul 15 11:33:28.847236 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Jul 15 11:33:28.847243 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Jul 15 11:33:28.847250 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Jul 15 11:33:28.847257 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Jul 15 11:33:28.847264 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 Jul 15 11:33:28.847271 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 Jul 15 11:33:28.847277 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Jul 15 11:33:28.847284 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Jul 15 11:33:28.847293 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 Jul 15 11:33:28.847300 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 Jul 15 11:33:28.847307 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 Jul 15 11:33:28.847314 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 Jul 15 11:33:28.847321 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 Jul 15 11:33:28.847328 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 Jul 15 11:33:28.847334 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 Jul 15 11:33:28.847341 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 Jul 15 11:33:28.847348 kernel: iommu: Default domain type: Translated Jul 15 11:33:28.847369 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Jul 15 11:33:28.847440 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Jul 15 11:33:28.847508 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Jul 15 11:33:28.847576 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Jul 15 11:33:28.847585 kernel: vgaarb: loaded Jul 15 11:33:28.847592 kernel: pps_core: LinuxPPS API ver. 1 registered Jul 15 11:33:28.847599 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Jul 15 11:33:28.847606 kernel: PTP clock support registered Jul 15 11:33:28.847615 kernel: Registered efivars operations Jul 15 11:33:28.847621 kernel: PCI: Using ACPI for IRQ routing Jul 15 11:33:28.847628 kernel: PCI: pci_cache_line_size set to 64 bytes Jul 15 11:33:28.847635 kernel: e820: reserve RAM buffer [mem 0x0080b000-0x008fffff] Jul 15 11:33:28.847642 kernel: e820: reserve RAM buffer [mem 0x00810000-0x008fffff] Jul 15 11:33:28.847648 kernel: e820: reserve RAM buffer [mem 0x9b438018-0x9bffffff] Jul 15 11:33:28.847655 kernel: e820: reserve RAM buffer [mem 0x9b475018-0x9bffffff] Jul 15 11:33:28.847662 kernel: e820: reserve RAM buffer [mem 0x9c8ef000-0x9fffffff] Jul 15 11:33:28.847668 kernel: e820: reserve RAM buffer [mem 0x9cf40000-0x9fffffff] Jul 15 11:33:28.847676 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Jul 15 11:33:28.847683 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Jul 15 11:33:28.847690 kernel: clocksource: Switched to clocksource kvm-clock Jul 15 11:33:28.847697 kernel: VFS: Disk quotas dquot_6.6.0 Jul 15 11:33:28.847704 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jul 15 11:33:28.847711 kernel: pnp: PnP ACPI init Jul 15 11:33:28.847829 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved Jul 15 11:33:28.847841 kernel: pnp: PnP ACPI: found 6 devices Jul 15 11:33:28.847850 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Jul 15 11:33:28.847857 kernel: NET: Registered PF_INET protocol family Jul 15 11:33:28.847864 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Jul 15 11:33:28.847871 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Jul 15 11:33:28.847878 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jul 15 11:33:28.847885 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Jul 15 11:33:28.847892 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Jul 15 11:33:28.847899 kernel: TCP: Hash tables configured (established 32768 bind 32768) Jul 15 11:33:28.847906 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Jul 15 11:33:28.847914 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Jul 15 11:33:28.847921 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jul 15 11:33:28.847928 kernel: NET: Registered PF_XDP protocol family Jul 15 11:33:28.847997 kernel: pci 0000:00:04.0: can't claim BAR 6 [mem 0xfffc0000-0xffffffff pref]: no compatible bridge window Jul 15 11:33:28.848065 kernel: pci 0000:00:04.0: BAR 6: assigned [mem 0x9d000000-0x9d03ffff pref] Jul 15 11:33:28.848125 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Jul 15 11:33:28.848185 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Jul 15 11:33:28.848264 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Jul 15 11:33:28.848342 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] Jul 15 11:33:28.848418 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Jul 15 11:33:28.848479 kernel: pci_bus 0000:00: resource 9 [mem 0x800000000-0xfffffffff window] Jul 15 11:33:28.848488 kernel: PCI: CLS 0 bytes, default 64 Jul 15 11:33:28.848495 kernel: Initialise system trusted keyrings Jul 15 11:33:28.848502 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Jul 15 11:33:28.848509 kernel: Key type asymmetric registered Jul 15 11:33:28.848515 kernel: Asymmetric key parser 'x509' registered Jul 15 11:33:28.848522 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Jul 15 11:33:28.848532 kernel: io scheduler mq-deadline registered Jul 15 11:33:28.848539 kernel: io scheduler kyber registered Jul 15 11:33:28.848556 kernel: io scheduler bfq registered Jul 15 11:33:28.848564 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Jul 15 11:33:28.848572 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 Jul 15 11:33:28.848579 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 Jul 15 11:33:28.848586 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 Jul 15 11:33:28.848593 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jul 15 11:33:28.848600 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Jul 15 11:33:28.848609 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Jul 15 11:33:28.848616 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Jul 15 11:33:28.848623 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Jul 15 11:33:28.849590 kernel: rtc_cmos 00:04: RTC can wake from S4 Jul 15 11:33:28.849604 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Jul 15 11:33:28.849667 kernel: rtc_cmos 00:04: registered as rtc0 Jul 15 11:33:28.849740 kernel: rtc_cmos 00:04: setting system clock to 2025-07-15T11:33:28 UTC (1752579208) Jul 15 11:33:28.849841 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Jul 15 11:33:28.849856 kernel: efifb: probing for efifb Jul 15 11:33:28.849863 kernel: efifb: framebuffer at 0xc0000000, using 4000k, total 4000k Jul 15 11:33:28.849870 kernel: efifb: mode is 1280x800x32, linelength=5120, pages=1 Jul 15 11:33:28.849877 kernel: efifb: scrolling: redraw Jul 15 11:33:28.849885 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Jul 15 11:33:28.849892 kernel: Console: switching to colour frame buffer device 160x50 Jul 15 11:33:28.849899 kernel: fb0: EFI VGA frame buffer device Jul 15 11:33:28.849906 kernel: pstore: Registered efi as persistent store backend Jul 15 11:33:28.849913 kernel: NET: Registered PF_INET6 protocol family Jul 15 11:33:28.849922 kernel: Segment Routing with IPv6 Jul 15 11:33:28.849950 kernel: In-situ OAM (IOAM) with IPv6 Jul 15 11:33:28.849957 kernel: NET: Registered PF_PACKET protocol family Jul 15 11:33:28.849966 kernel: Key type dns_resolver registered Jul 15 11:33:28.849975 kernel: IPI shorthand broadcast: enabled Jul 15 11:33:28.849983 kernel: sched_clock: Marking stable (418004772, 124484001)->(629155151, -86666378) Jul 15 11:33:28.849991 kernel: registered taskstats version 1 Jul 15 11:33:28.849999 kernel: Loading compiled-in X.509 certificates Jul 15 11:33:28.850006 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.188-flatcar: c4b3a19d3bd6de5654dc12075428550cf6251289' Jul 15 11:33:28.850013 kernel: Key type .fscrypt registered Jul 15 11:33:28.850020 kernel: Key type fscrypt-provisioning registered Jul 15 11:33:28.850027 kernel: pstore: Using crash dump compression: deflate Jul 15 11:33:28.850034 kernel: ima: No TPM chip found, activating TPM-bypass! Jul 15 11:33:28.850042 kernel: ima: Allocated hash algorithm: sha1 Jul 15 11:33:28.850050 kernel: ima: No architecture policies found Jul 15 11:33:28.850057 kernel: clk: Disabling unused clocks Jul 15 11:33:28.850064 kernel: Freeing unused kernel image (initmem) memory: 47476K Jul 15 11:33:28.850071 kernel: Write protecting the kernel read-only data: 28672k Jul 15 11:33:28.850079 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Jul 15 11:33:28.850086 kernel: Freeing unused kernel image (rodata/data gap) memory: 604K Jul 15 11:33:28.850093 kernel: Run /init as init process Jul 15 11:33:28.850100 kernel: with arguments: Jul 15 11:33:28.850107 kernel: /init Jul 15 11:33:28.850116 kernel: with environment: Jul 15 11:33:28.850123 kernel: HOME=/ Jul 15 11:33:28.850130 kernel: TERM=linux Jul 15 11:33:28.850137 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Jul 15 11:33:28.850147 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 15 11:33:28.850156 systemd[1]: Detected virtualization kvm. Jul 15 11:33:28.850164 systemd[1]: Detected architecture x86-64. Jul 15 11:33:28.850172 systemd[1]: Running in initrd. Jul 15 11:33:28.850181 systemd[1]: No hostname configured, using default hostname. Jul 15 11:33:28.850188 systemd[1]: Hostname set to . Jul 15 11:33:28.850196 systemd[1]: Initializing machine ID from VM UUID. Jul 15 11:33:28.850204 systemd[1]: Queued start job for default target initrd.target. Jul 15 11:33:28.850211 systemd[1]: Started systemd-ask-password-console.path. Jul 15 11:33:28.850219 systemd[1]: Reached target cryptsetup.target. Jul 15 11:33:28.850226 systemd[1]: Reached target paths.target. Jul 15 11:33:28.850233 systemd[1]: Reached target slices.target. Jul 15 11:33:28.850242 systemd[1]: Reached target swap.target. Jul 15 11:33:28.850250 systemd[1]: Reached target timers.target. Jul 15 11:33:28.850258 systemd[1]: Listening on iscsid.socket. Jul 15 11:33:28.850265 systemd[1]: Listening on iscsiuio.socket. Jul 15 11:33:28.850273 systemd[1]: Listening on systemd-journald-audit.socket. Jul 15 11:33:28.850281 systemd[1]: Listening on systemd-journald-dev-log.socket. Jul 15 11:33:28.850289 systemd[1]: Listening on systemd-journald.socket. Jul 15 11:33:28.850296 systemd[1]: Listening on systemd-networkd.socket. Jul 15 11:33:28.850305 systemd[1]: Listening on systemd-udevd-control.socket. Jul 15 11:33:28.850313 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 15 11:33:28.850320 systemd[1]: Reached target sockets.target. Jul 15 11:33:28.850328 systemd[1]: Starting kmod-static-nodes.service... Jul 15 11:33:28.850335 systemd[1]: Finished network-cleanup.service. Jul 15 11:33:28.850343 systemd[1]: Starting systemd-fsck-usr.service... Jul 15 11:33:28.850361 systemd[1]: Starting systemd-journald.service... Jul 15 11:33:28.850370 systemd[1]: Starting systemd-modules-load.service... Jul 15 11:33:28.850380 systemd[1]: Starting systemd-resolved.service... Jul 15 11:33:28.850390 systemd[1]: Starting systemd-vconsole-setup.service... Jul 15 11:33:28.850397 systemd[1]: Finished kmod-static-nodes.service. Jul 15 11:33:28.850405 kernel: audit: type=1130 audit(1752579208.838:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:28.850413 systemd[1]: Finished systemd-fsck-usr.service. Jul 15 11:33:28.850421 kernel: audit: type=1130 audit(1752579208.843:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:28.850429 systemd[1]: Finished systemd-vconsole-setup.service. Jul 15 11:33:28.850437 systemd[1]: Starting dracut-cmdline-ask.service... Jul 15 11:33:28.850447 systemd-journald[197]: Journal started Jul 15 11:33:28.850488 systemd-journald[197]: Runtime Journal (/run/log/journal/a159d3b7ef3942bb92c393a94dd45152) is 6.0M, max 48.4M, 42.4M free. Jul 15 11:33:28.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:28.843000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:28.838276 systemd-modules-load[198]: Inserted module 'overlay' Jul 15 11:33:28.855409 kernel: audit: type=1130 audit(1752579208.848:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:28.855423 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 15 11:33:28.848000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:28.858331 systemd[1]: Started systemd-journald.service. Jul 15 11:33:28.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:28.863615 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 15 11:33:28.864000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:28.868746 kernel: audit: type=1130 audit(1752579208.857:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:28.868769 kernel: audit: type=1130 audit(1752579208.864:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:28.869153 systemd-resolved[199]: Positive Trust Anchors: Jul 15 11:33:28.869170 systemd-resolved[199]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 15 11:33:28.869201 systemd-resolved[199]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 15 11:33:28.871328 systemd-resolved[199]: Defaulting to hostname 'linux'. Jul 15 11:33:28.872029 systemd[1]: Started systemd-resolved.service. Jul 15 11:33:28.872125 systemd[1]: Reached target nss-lookup.target. Jul 15 11:33:28.871000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:28.875746 kernel: audit: type=1130 audit(1752579208.871:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:28.886777 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Jul 15 11:33:28.887647 systemd[1]: Finished dracut-cmdline-ask.service. Jul 15 11:33:28.892118 kernel: audit: type=1130 audit(1752579208.887:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:28.887000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:28.889258 systemd[1]: Starting dracut-cmdline.service... Jul 15 11:33:28.894165 kernel: Bridge firewalling registered Jul 15 11:33:28.893383 systemd-modules-load[198]: Inserted module 'br_netfilter' Jul 15 11:33:28.899951 dracut-cmdline[217]: dracut-dracut-053 Jul 15 11:33:28.902516 dracut-cmdline[217]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=3fdbb2e3469f90ee764ea38c6fc4332d45967696e3c4fd4a8c65f8d0125b235b Jul 15 11:33:28.911748 kernel: SCSI subsystem initialized Jul 15 11:33:28.922480 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jul 15 11:33:28.922518 kernel: device-mapper: uevent: version 1.0.3 Jul 15 11:33:28.922530 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Jul 15 11:33:28.926666 systemd-modules-load[198]: Inserted module 'dm_multipath' Jul 15 11:33:28.927366 systemd[1]: Finished systemd-modules-load.service. Jul 15 11:33:28.933677 kernel: audit: type=1130 audit(1752579208.928:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:28.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:28.929420 systemd[1]: Starting systemd-sysctl.service... Jul 15 11:33:28.937373 systemd[1]: Finished systemd-sysctl.service. Jul 15 11:33:28.941830 kernel: audit: type=1130 audit(1752579208.937:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:28.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:28.973773 kernel: Loading iSCSI transport class v2.0-870. Jul 15 11:33:28.989750 kernel: iscsi: registered transport (tcp) Jul 15 11:33:29.011745 kernel: iscsi: registered transport (qla4xxx) Jul 15 11:33:29.011765 kernel: QLogic iSCSI HBA Driver Jul 15 11:33:29.046865 systemd[1]: Finished dracut-cmdline.service. Jul 15 11:33:29.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:29.048135 systemd[1]: Starting dracut-pre-udev.service... Jul 15 11:33:29.098777 kernel: raid6: avx2x4 gen() 26460 MB/s Jul 15 11:33:29.115773 kernel: raid6: avx2x4 xor() 6567 MB/s Jul 15 11:33:29.132778 kernel: raid6: avx2x2 gen() 21355 MB/s Jul 15 11:33:29.149776 kernel: raid6: avx2x2 xor() 17467 MB/s Jul 15 11:33:29.166750 kernel: raid6: avx2x1 gen() 26422 MB/s Jul 15 11:33:29.183753 kernel: raid6: avx2x1 xor() 15079 MB/s Jul 15 11:33:29.200770 kernel: raid6: sse2x4 gen() 12527 MB/s Jul 15 11:33:29.217778 kernel: raid6: sse2x4 xor() 6565 MB/s Jul 15 11:33:29.234761 kernel: raid6: sse2x2 gen() 16274 MB/s Jul 15 11:33:29.251758 kernel: raid6: sse2x2 xor() 9476 MB/s Jul 15 11:33:29.268758 kernel: raid6: sse2x1 gen() 12313 MB/s Jul 15 11:33:29.286311 kernel: raid6: sse2x1 xor() 7562 MB/s Jul 15 11:33:29.286353 kernel: raid6: using algorithm avx2x4 gen() 26460 MB/s Jul 15 11:33:29.286363 kernel: raid6: .... xor() 6567 MB/s, rmw enabled Jul 15 11:33:29.287122 kernel: raid6: using avx2x2 recovery algorithm Jul 15 11:33:29.299754 kernel: xor: automatically using best checksumming function avx Jul 15 11:33:29.393768 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Jul 15 11:33:29.401852 systemd[1]: Finished dracut-pre-udev.service. Jul 15 11:33:29.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:29.402000 audit: BPF prog-id=7 op=LOAD Jul 15 11:33:29.402000 audit: BPF prog-id=8 op=LOAD Jul 15 11:33:29.403983 systemd[1]: Starting systemd-udevd.service... Jul 15 11:33:29.421901 systemd-udevd[401]: Using default interface naming scheme 'v252'. Jul 15 11:33:29.427302 systemd[1]: Started systemd-udevd.service. Jul 15 11:33:29.426000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:29.428058 systemd[1]: Starting dracut-pre-trigger.service... Jul 15 11:33:29.437716 dracut-pre-trigger[404]: rd.md=0: removing MD RAID activation Jul 15 11:33:29.464191 systemd[1]: Finished dracut-pre-trigger.service. Jul 15 11:33:29.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:29.466666 systemd[1]: Starting systemd-udev-trigger.service... Jul 15 11:33:29.498427 systemd[1]: Finished systemd-udev-trigger.service. Jul 15 11:33:29.499000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:29.522084 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Jul 15 11:33:29.545794 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Jul 15 11:33:29.545809 kernel: GPT:9289727 != 19775487 Jul 15 11:33:29.545818 kernel: GPT:Alternate GPT header not at the end of the disk. Jul 15 11:33:29.545826 kernel: GPT:9289727 != 19775487 Jul 15 11:33:29.545835 kernel: GPT: Use GNU Parted to correct GPT errors. Jul 15 11:33:29.545843 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 15 11:33:29.545857 kernel: cryptd: max_cpu_qlen set to 1000 Jul 15 11:33:29.545867 kernel: libata version 3.00 loaded. Jul 15 11:33:29.558341 kernel: AVX2 version of gcm_enc/dec engaged. Jul 15 11:33:29.558374 kernel: AES CTR mode by8 optimization enabled Jul 15 11:33:29.564861 kernel: ahci 0000:00:1f.2: version 3.0 Jul 15 11:33:29.598588 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 Jul 15 11:33:29.598606 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Jul 15 11:33:29.598697 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Jul 15 11:33:29.598792 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/vda6 scanned by (udev-worker) (456) Jul 15 11:33:29.598807 kernel: scsi host0: ahci Jul 15 11:33:29.598899 kernel: scsi host1: ahci Jul 15 11:33:29.598988 kernel: scsi host2: ahci Jul 15 11:33:29.599069 kernel: scsi host3: ahci Jul 15 11:33:29.599149 kernel: scsi host4: ahci Jul 15 11:33:29.599232 kernel: scsi host5: ahci Jul 15 11:33:29.599316 kernel: ata1: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040100 irq 34 Jul 15 11:33:29.599326 kernel: ata2: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040180 irq 34 Jul 15 11:33:29.599345 kernel: ata3: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040200 irq 34 Jul 15 11:33:29.599354 kernel: ata4: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040280 irq 34 Jul 15 11:33:29.599363 kernel: ata5: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040300 irq 34 Jul 15 11:33:29.599374 kernel: ata6: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040380 irq 34 Jul 15 11:33:29.576709 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Jul 15 11:33:29.591508 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Jul 15 11:33:29.597102 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Jul 15 11:33:29.610855 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Jul 15 11:33:29.616174 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 15 11:33:29.618601 systemd[1]: Starting disk-uuid.service... Jul 15 11:33:29.684552 disk-uuid[539]: Primary Header is updated. Jul 15 11:33:29.684552 disk-uuid[539]: Secondary Entries is updated. Jul 15 11:33:29.684552 disk-uuid[539]: Secondary Header is updated. Jul 15 11:33:29.688759 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 15 11:33:29.692763 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 15 11:33:29.903771 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) Jul 15 11:33:29.903840 kernel: ata2: SATA link down (SStatus 0 SControl 300) Jul 15 11:33:29.904754 kernel: ata1: SATA link down (SStatus 0 SControl 300) Jul 15 11:33:29.906642 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Jul 15 11:33:29.906715 kernel: ata3.00: applying bridge limits Jul 15 11:33:29.906740 kernel: ata3.00: configured for UDMA/100 Jul 15 11:33:29.907742 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Jul 15 11:33:29.912748 kernel: ata6: SATA link down (SStatus 0 SControl 300) Jul 15 11:33:29.912769 kernel: ata5: SATA link down (SStatus 0 SControl 300) Jul 15 11:33:29.913753 kernel: ata4: SATA link down (SStatus 0 SControl 300) Jul 15 11:33:29.943066 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Jul 15 11:33:29.960578 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Jul 15 11:33:29.960601 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Jul 15 11:33:30.729753 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 15 11:33:30.729908 disk-uuid[540]: The operation has completed successfully. Jul 15 11:33:30.751865 systemd[1]: disk-uuid.service: Deactivated successfully. Jul 15 11:33:30.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:30.751000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:30.751943 systemd[1]: Finished disk-uuid.service. Jul 15 11:33:30.758991 systemd[1]: Starting verity-setup.service... Jul 15 11:33:30.786780 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" Jul 15 11:33:30.804681 systemd[1]: Found device dev-mapper-usr.device. Jul 15 11:33:30.807060 systemd[1]: Mounting sysusr-usr.mount... Jul 15 11:33:30.809977 systemd[1]: Finished verity-setup.service. Jul 15 11:33:30.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:30.869820 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 15 11:33:30.870047 systemd[1]: Mounted sysusr-usr.mount. Jul 15 11:33:30.871147 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Jul 15 11:33:30.871869 systemd[1]: Starting ignition-setup.service... Jul 15 11:33:30.873379 systemd[1]: Starting parse-ip-for-networkd.service... Jul 15 11:33:30.881261 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Jul 15 11:33:30.881289 kernel: BTRFS info (device vda6): using free space tree Jul 15 11:33:30.881317 kernel: BTRFS info (device vda6): has skinny extents Jul 15 11:33:30.889422 systemd[1]: mnt-oem.mount: Deactivated successfully. Jul 15 11:33:30.909864 systemd[1]: Finished ignition-setup.service. Jul 15 11:33:30.909000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:30.910936 systemd[1]: Starting ignition-fetch-offline.service... Jul 15 11:33:30.947063 ignition[655]: Ignition 2.14.0 Jul 15 11:33:30.947956 ignition[655]: Stage: fetch-offline Jul 15 11:33:30.947998 ignition[655]: no configs at "/usr/lib/ignition/base.d" Jul 15 11:33:30.948005 ignition[655]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 15 11:33:30.948087 ignition[655]: parsed url from cmdline: "" Jul 15 11:33:30.950712 systemd[1]: Finished parse-ip-for-networkd.service. Jul 15 11:33:30.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:30.948091 ignition[655]: no config URL provided Jul 15 11:33:30.953000 audit: BPF prog-id=9 op=LOAD Jul 15 11:33:30.948095 ignition[655]: reading system config file "/usr/lib/ignition/user.ign" Jul 15 11:33:30.948101 ignition[655]: no config at "/usr/lib/ignition/user.ign" Jul 15 11:33:30.954386 systemd[1]: Starting systemd-networkd.service... Jul 15 11:33:30.948116 ignition[655]: op(1): [started] loading QEMU firmware config module Jul 15 11:33:30.957287 unknown[655]: fetched base config from "system" Jul 15 11:33:30.948123 ignition[655]: op(1): executing: "modprobe" "qemu_fw_cfg" Jul 15 11:33:30.957307 unknown[655]: fetched user config from "qemu" Jul 15 11:33:30.951812 ignition[655]: op(1): [finished] loading QEMU firmware config module Jul 15 11:33:30.953362 ignition[655]: parsing config with SHA512: a5c136efb20bf8d215a5d6f41d367dc3f2174ba73aa412728eaab32dcd8dfc4465b1d1a16a5f8c2373df7c2f9e205be6f98b7f9794a2c8f1fb52529271b230c7 Jul 15 11:33:30.961053 ignition[655]: fetch-offline: fetch-offline passed Jul 15 11:33:30.961128 ignition[655]: Ignition finished successfully Jul 15 11:33:30.962000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:30.962160 systemd[1]: Finished ignition-fetch-offline.service. Jul 15 11:33:30.977164 systemd-networkd[720]: lo: Link UP Jul 15 11:33:30.977174 systemd-networkd[720]: lo: Gained carrier Jul 15 11:33:30.978000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:30.977565 systemd-networkd[720]: Enumeration completed Jul 15 11:33:30.977640 systemd[1]: Started systemd-networkd.service. Jul 15 11:33:30.977839 systemd-networkd[720]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 15 11:33:30.979357 systemd[1]: Reached target network.target. Jul 15 11:33:30.979767 systemd-networkd[720]: eth0: Link UP Jul 15 11:33:30.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:30.979771 systemd-networkd[720]: eth0: Gained carrier Jul 15 11:33:30.980907 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Jul 15 11:33:30.993186 ignition[722]: Ignition 2.14.0 Jul 15 11:33:30.981658 systemd[1]: Starting ignition-kargs.service... Jul 15 11:33:30.998000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:30.999909 iscsid[732]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Jul 15 11:33:30.999909 iscsid[732]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Jul 15 11:33:30.999909 iscsid[732]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Jul 15 11:33:30.999909 iscsid[732]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Jul 15 11:33:30.999909 iscsid[732]: If using hardware iscsi like qla4xxx this message can be ignored. Jul 15 11:33:30.999909 iscsid[732]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Jul 15 11:33:30.999909 iscsid[732]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Jul 15 11:33:31.001000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:30.993194 ignition[722]: Stage: kargs Jul 15 11:33:30.983030 systemd[1]: Starting iscsiuio.service... Jul 15 11:33:30.993300 ignition[722]: no configs at "/usr/lib/ignition/base.d" Jul 15 11:33:30.987225 systemd[1]: Started iscsiuio.service. Jul 15 11:33:30.993311 ignition[722]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 15 11:33:30.989679 systemd[1]: Starting iscsid.service... Jul 15 11:33:30.994258 ignition[722]: kargs: kargs passed Jul 15 11:33:30.992798 systemd-networkd[720]: eth0: DHCPv4 address 10.0.0.97/16, gateway 10.0.0.1 acquired from 10.0.0.1 Jul 15 11:33:30.994307 ignition[722]: Ignition finished successfully Jul 15 11:33:30.997846 systemd[1]: Started iscsid.service. Jul 15 11:33:30.999948 systemd[1]: Finished ignition-kargs.service. Jul 15 11:33:31.019920 systemd[1]: Starting dracut-initqueue.service... Jul 15 11:33:31.022765 systemd[1]: Starting ignition-disks.service... Jul 15 11:33:31.028621 systemd[1]: Finished dracut-initqueue.service. Jul 15 11:33:31.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:31.030377 systemd[1]: Reached target remote-fs-pre.target. Jul 15 11:33:31.032269 systemd[1]: Reached target remote-cryptsetup.target. Jul 15 11:33:31.031573 ignition[735]: Ignition 2.14.0 Jul 15 11:33:31.034195 systemd[1]: Reached target remote-fs.target. Jul 15 11:33:31.031579 ignition[735]: Stage: disks Jul 15 11:33:31.031683 ignition[735]: no configs at "/usr/lib/ignition/base.d" Jul 15 11:33:31.031690 ignition[735]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 15 11:33:31.032434 ignition[735]: disks: disks passed Jul 15 11:33:31.032470 ignition[735]: Ignition finished successfully Jul 15 11:33:31.041373 systemd[1]: Starting dracut-pre-mount.service... Jul 15 11:33:31.043270 systemd[1]: Finished ignition-disks.service. Jul 15 11:33:31.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:31.045608 systemd[1]: Reached target initrd-root-device.target. Jul 15 11:33:31.047676 systemd[1]: Reached target local-fs-pre.target. Jul 15 11:33:31.049428 systemd[1]: Reached target local-fs.target. Jul 15 11:33:31.051110 systemd[1]: Reached target sysinit.target. Jul 15 11:33:31.052740 systemd[1]: Reached target basic.target. Jul 15 11:33:31.054554 systemd[1]: Finished dracut-pre-mount.service. Jul 15 11:33:31.056000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:31.056762 systemd[1]: Starting systemd-fsck-root.service... Jul 15 11:33:31.066176 systemd-fsck[754]: ROOT: clean, 619/553520 files, 56023/553472 blocks Jul 15 11:33:31.070948 systemd[1]: Finished systemd-fsck-root.service. Jul 15 11:33:31.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:31.074300 systemd[1]: Mounting sysroot.mount... Jul 15 11:33:31.080744 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Jul 15 11:33:31.080989 systemd[1]: Mounted sysroot.mount. Jul 15 11:33:31.081101 systemd[1]: Reached target initrd-root-fs.target. Jul 15 11:33:31.084014 systemd[1]: Mounting sysroot-usr.mount... Jul 15 11:33:31.085671 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Jul 15 11:33:31.085719 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Jul 15 11:33:31.085762 systemd[1]: Reached target ignition-diskful.target. Jul 15 11:33:31.092363 systemd[1]: Mounted sysroot-usr.mount. Jul 15 11:33:31.093044 systemd[1]: Starting initrd-setup-root.service... Jul 15 11:33:31.097756 initrd-setup-root[764]: cut: /sysroot/etc/passwd: No such file or directory Jul 15 11:33:31.101790 initrd-setup-root[772]: cut: /sysroot/etc/group: No such file or directory Jul 15 11:33:31.104995 initrd-setup-root[780]: cut: /sysroot/etc/shadow: No such file or directory Jul 15 11:33:31.107947 initrd-setup-root[788]: cut: /sysroot/etc/gshadow: No such file or directory Jul 15 11:33:31.130687 systemd[1]: Finished initrd-setup-root.service. Jul 15 11:33:31.131000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:31.132962 systemd[1]: Starting ignition-mount.service... Jul 15 11:33:31.135096 systemd[1]: Starting sysroot-boot.service... Jul 15 11:33:31.137788 bash[805]: umount: /sysroot/usr/share/oem: not mounted. Jul 15 11:33:31.144471 ignition[806]: INFO : Ignition 2.14.0 Jul 15 11:33:31.144471 ignition[806]: INFO : Stage: mount Jul 15 11:33:31.146118 ignition[806]: INFO : no configs at "/usr/lib/ignition/base.d" Jul 15 11:33:31.146118 ignition[806]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 15 11:33:31.146118 ignition[806]: INFO : mount: mount passed Jul 15 11:33:31.146118 ignition[806]: INFO : Ignition finished successfully Jul 15 11:33:31.149836 systemd[1]: Finished ignition-mount.service. Jul 15 11:33:31.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:31.153990 systemd[1]: Finished sysroot-boot.service. Jul 15 11:33:31.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:31.816235 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 15 11:33:31.822748 kernel: BTRFS: device label OEM devid 1 transid 10 /dev/vda6 scanned by mount (815) Jul 15 11:33:31.824951 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Jul 15 11:33:31.824972 kernel: BTRFS info (device vda6): using free space tree Jul 15 11:33:31.824981 kernel: BTRFS info (device vda6): has skinny extents Jul 15 11:33:31.828669 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 15 11:33:31.829405 systemd[1]: Starting ignition-files.service... Jul 15 11:33:31.841386 ignition[835]: INFO : Ignition 2.14.0 Jul 15 11:33:31.841386 ignition[835]: INFO : Stage: files Jul 15 11:33:31.843204 ignition[835]: INFO : no configs at "/usr/lib/ignition/base.d" Jul 15 11:33:31.843204 ignition[835]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 15 11:33:31.845317 ignition[835]: DEBUG : files: compiled without relabeling support, skipping Jul 15 11:33:31.846755 ignition[835]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Jul 15 11:33:31.848062 ignition[835]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Jul 15 11:33:31.850234 ignition[835]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Jul 15 11:33:31.851648 ignition[835]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Jul 15 11:33:31.851648 ignition[835]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Jul 15 11:33:31.851286 unknown[835]: wrote ssh authorized keys file for user: core Jul 15 11:33:31.855182 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Jul 15 11:33:31.855182 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Jul 15 11:33:31.855182 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Jul 15 11:33:31.855182 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Jul 15 11:33:31.855182 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Jul 15 11:33:31.855182 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Jul 15 11:33:31.855182 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Jul 15 11:33:31.855182 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://extensions.flatcar.org/extensions/kubernetes-v1.32.4-x86-64.raw: attempt #1 Jul 15 11:33:32.292941 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Jul 15 11:33:32.456883 systemd-networkd[720]: eth0: Gained IPv6LL Jul 15 11:33:32.675986 ignition[835]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Jul 15 11:33:32.675986 ignition[835]: INFO : files: op(7): [started] processing unit "coreos-metadata.service" Jul 15 11:33:32.680840 ignition[835]: INFO : files: op(7): op(8): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Jul 15 11:33:32.680840 ignition[835]: INFO : files: op(7): op(8): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Jul 15 11:33:32.680840 ignition[835]: INFO : files: op(7): [finished] processing unit "coreos-metadata.service" Jul 15 11:33:32.680840 ignition[835]: INFO : files: op(9): [started] setting preset to disabled for "coreos-metadata.service" Jul 15 11:33:32.680840 ignition[835]: INFO : files: op(9): op(a): [started] removing enablement symlink(s) for "coreos-metadata.service" Jul 15 11:33:32.696615 ignition[835]: INFO : files: op(9): op(a): [finished] removing enablement symlink(s) for "coreos-metadata.service" Jul 15 11:33:32.698249 ignition[835]: INFO : files: op(9): [finished] setting preset to disabled for "coreos-metadata.service" Jul 15 11:33:32.698249 ignition[835]: INFO : files: createResultFile: createFiles: op(b): [started] writing file "/sysroot/etc/.ignition-result.json" Jul 15 11:33:32.698249 ignition[835]: INFO : files: createResultFile: createFiles: op(b): [finished] writing file "/sysroot/etc/.ignition-result.json" Jul 15 11:33:32.698249 ignition[835]: INFO : files: files passed Jul 15 11:33:32.698249 ignition[835]: INFO : Ignition finished successfully Jul 15 11:33:32.698000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:32.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:32.706000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:32.708000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:32.698042 systemd[1]: Finished ignition-files.service. Jul 15 11:33:32.699886 systemd[1]: Starting initrd-setup-root-after-ignition.service... Jul 15 11:33:32.701435 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Jul 15 11:33:32.714371 initrd-setup-root-after-ignition[861]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Jul 15 11:33:32.702115 systemd[1]: Starting ignition-quench.service... Jul 15 11:33:32.716793 initrd-setup-root-after-ignition[863]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Jul 15 11:33:32.704288 systemd[1]: ignition-quench.service: Deactivated successfully. Jul 15 11:33:32.704363 systemd[1]: Finished ignition-quench.service. Jul 15 11:33:32.706549 systemd[1]: Finished initrd-setup-root-after-ignition.service. Jul 15 11:33:32.720000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:32.720000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:32.708176 systemd[1]: Reached target ignition-complete.target. Jul 15 11:33:32.710331 systemd[1]: Starting initrd-parse-etc.service... Jul 15 11:33:32.719909 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jul 15 11:33:32.719973 systemd[1]: Finished initrd-parse-etc.service. Jul 15 11:33:32.720977 systemd[1]: Reached target initrd-fs.target. Jul 15 11:33:32.722645 systemd[1]: Reached target initrd.target. Jul 15 11:33:32.723464 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Jul 15 11:33:32.723980 systemd[1]: Starting dracut-pre-pivot.service... Jul 15 11:33:32.732669 systemd[1]: Finished dracut-pre-pivot.service. Jul 15 11:33:32.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:32.735058 systemd[1]: Starting initrd-cleanup.service... Jul 15 11:33:32.743164 systemd[1]: Stopped target nss-lookup.target. Jul 15 11:33:32.744827 systemd[1]: Stopped target remote-cryptsetup.target. Jul 15 11:33:32.746582 systemd[1]: Stopped target timers.target. Jul 15 11:33:32.748077 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jul 15 11:33:32.749037 systemd[1]: Stopped dracut-pre-pivot.service. Jul 15 11:33:32.749000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:32.750698 systemd[1]: Stopped target initrd.target. Jul 15 11:33:32.752201 systemd[1]: Stopped target basic.target. Jul 15 11:33:32.753674 systemd[1]: Stopped target ignition-complete.target. Jul 15 11:33:32.755399 systemd[1]: Stopped target ignition-diskful.target. Jul 15 11:33:32.757103 systemd[1]: Stopped target initrd-root-device.target. Jul 15 11:33:32.758856 systemd[1]: Stopped target remote-fs.target. Jul 15 11:33:32.760406 systemd[1]: Stopped target remote-fs-pre.target. Jul 15 11:33:32.762059 systemd[1]: Stopped target sysinit.target. Jul 15 11:33:32.763565 systemd[1]: Stopped target local-fs.target. Jul 15 11:33:32.765099 systemd[1]: Stopped target local-fs-pre.target. Jul 15 11:33:32.766709 systemd[1]: Stopped target swap.target. Jul 15 11:33:32.768135 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jul 15 11:33:32.768821 systemd[1]: Stopped dracut-pre-mount.service. Jul 15 11:33:32.768000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:32.769372 systemd[1]: Stopped target cryptsetup.target. Jul 15 11:33:32.771340 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jul 15 11:33:32.772000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:32.771434 systemd[1]: Stopped dracut-initqueue.service. Jul 15 11:33:32.774000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:32.772863 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Jul 15 11:33:32.772982 systemd[1]: Stopped ignition-fetch-offline.service. Jul 15 11:33:32.774627 systemd[1]: Stopped target paths.target. Jul 15 11:33:32.775964 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jul 15 11:33:32.779776 systemd[1]: Stopped systemd-ask-password-console.path. Jul 15 11:33:32.781583 systemd[1]: Stopped target slices.target. Jul 15 11:33:32.783086 systemd[1]: Stopped target sockets.target. Jul 15 11:33:32.784601 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Jul 15 11:33:32.785736 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Jul 15 11:33:32.787000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:32.787700 systemd[1]: ignition-files.service: Deactivated successfully. Jul 15 11:33:32.788633 systemd[1]: Stopped ignition-files.service. Jul 15 11:33:32.790000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:32.790948 systemd[1]: Stopping ignition-mount.service... Jul 15 11:33:32.792510 systemd[1]: Stopping iscsid.service... Jul 15 11:33:32.793319 iscsid[732]: iscsid shutting down. Jul 15 11:33:32.796049 systemd[1]: Stopping sysroot-boot.service... Jul 15 11:33:32.796793 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jul 15 11:33:32.798000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:32.796986 systemd[1]: Stopped systemd-udev-trigger.service. Jul 15 11:33:32.800000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:32.800949 ignition[876]: INFO : Ignition 2.14.0 Jul 15 11:33:32.800949 ignition[876]: INFO : Stage: umount Jul 15 11:33:32.800949 ignition[876]: INFO : no configs at "/usr/lib/ignition/base.d" Jul 15 11:33:32.800949 ignition[876]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 15 11:33:32.800949 ignition[876]: INFO : umount: umount passed Jul 15 11:33:32.800949 ignition[876]: INFO : Ignition finished successfully Jul 15 11:33:32.801000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:32.802000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:32.798545 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jul 15 11:33:32.808000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:32.798654 systemd[1]: Stopped dracut-pre-trigger.service. Jul 15 11:33:32.810000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:32.801522 systemd[1]: iscsid.service: Deactivated successfully. Jul 15 11:33:32.811000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:32.801597 systemd[1]: Stopped iscsid.service. Jul 15 11:33:32.802132 systemd[1]: ignition-mount.service: Deactivated successfully. Jul 15 11:33:32.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:32.813000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:32.802198 systemd[1]: Stopped ignition-mount.service. Jul 15 11:33:32.816000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:32.803411 systemd[1]: iscsid.socket: Deactivated successfully. Jul 15 11:33:32.803473 systemd[1]: Closed iscsid.socket. Jul 15 11:33:32.806351 systemd[1]: ignition-disks.service: Deactivated successfully. Jul 15 11:33:32.806382 systemd[1]: Stopped ignition-disks.service. Jul 15 11:33:32.808607 systemd[1]: ignition-kargs.service: Deactivated successfully. Jul 15 11:33:32.808635 systemd[1]: Stopped ignition-kargs.service. Jul 15 11:33:32.810304 systemd[1]: ignition-setup.service: Deactivated successfully. Jul 15 11:33:32.810333 systemd[1]: Stopped ignition-setup.service. Jul 15 11:33:32.811845 systemd[1]: Stopping iscsiuio.service... Jul 15 11:33:32.813453 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jul 15 11:33:32.825000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:32.813534 systemd[1]: Finished initrd-cleanup.service. Jul 15 11:33:32.814781 systemd[1]: iscsiuio.service: Deactivated successfully. Jul 15 11:33:32.814847 systemd[1]: Stopped iscsiuio.service. Jul 15 11:33:32.817048 systemd[1]: Stopped target network.target. Jul 15 11:33:32.832000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:32.818515 systemd[1]: iscsiuio.socket: Deactivated successfully. Jul 15 11:33:32.834000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:32.818542 systemd[1]: Closed iscsiuio.socket. Jul 15 11:33:32.819218 systemd[1]: Stopping systemd-networkd.service... Jul 15 11:33:32.835000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:32.820865 systemd[1]: Stopping systemd-resolved.service... Jul 15 11:33:32.824767 systemd-networkd[720]: eth0: DHCPv6 lease lost Jul 15 11:33:32.838000 audit: BPF prog-id=9 op=UNLOAD Jul 15 11:33:32.826099 systemd[1]: systemd-networkd.service: Deactivated successfully. Jul 15 11:33:32.826174 systemd[1]: Stopped systemd-networkd.service. Jul 15 11:33:32.826904 systemd[1]: systemd-networkd.socket: Deactivated successfully. Jul 15 11:33:32.826931 systemd[1]: Closed systemd-networkd.socket. Jul 15 11:33:32.843000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:32.829665 systemd[1]: Stopping network-cleanup.service... Jul 15 11:33:32.830228 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Jul 15 11:33:32.830285 systemd[1]: Stopped parse-ip-for-networkd.service. Jul 15 11:33:32.832924 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jul 15 11:33:32.832958 systemd[1]: Stopped systemd-sysctl.service. Jul 15 11:33:32.835294 systemd[1]: systemd-modules-load.service: Deactivated successfully. Jul 15 11:33:32.835334 systemd[1]: Stopped systemd-modules-load.service. Jul 15 11:33:32.852000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:32.836019 systemd[1]: Stopping systemd-udevd.service... Jul 15 11:33:32.852000 audit: BPF prog-id=6 op=UNLOAD Jul 15 11:33:32.841109 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jul 15 11:33:32.855000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:32.841558 systemd[1]: systemd-resolved.service: Deactivated successfully. Jul 15 11:33:32.841653 systemd[1]: Stopped systemd-resolved.service. Jul 15 11:33:32.851177 systemd[1]: network-cleanup.service: Deactivated successfully. Jul 15 11:33:32.851265 systemd[1]: Stopped network-cleanup.service. Jul 15 11:33:32.852270 systemd[1]: systemd-udevd.service: Deactivated successfully. Jul 15 11:33:32.862000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:32.852374 systemd[1]: Stopped systemd-udevd.service. Jul 15 11:33:32.857309 systemd[1]: sysroot-boot.mount: Deactivated successfully. Jul 15 11:33:32.864000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:32.865000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:32.857564 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jul 15 11:33:32.857590 systemd[1]: Closed systemd-udevd-control.socket. Jul 15 11:33:32.869000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:32.859161 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jul 15 11:33:32.871000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:32.859183 systemd[1]: Closed systemd-udevd-kernel.socket. Jul 15 11:33:32.872000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:32.860664 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jul 15 11:33:32.875000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:32.875000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:32.860693 systemd[1]: Stopped dracut-pre-udev.service. Jul 15 11:33:32.862669 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jul 15 11:33:32.862699 systemd[1]: Stopped dracut-cmdline.service. Jul 15 11:33:32.864227 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jul 15 11:33:32.864267 systemd[1]: Stopped dracut-cmdline-ask.service. Jul 15 11:33:32.866517 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Jul 15 11:33:32.867742 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Jul 15 11:33:32.867780 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Jul 15 11:33:32.869509 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jul 15 11:33:32.869540 systemd[1]: Stopped kmod-static-nodes.service. Jul 15 11:33:32.871320 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jul 15 11:33:32.871351 systemd[1]: Stopped systemd-vconsole-setup.service. Jul 15 11:33:32.872853 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Jul 15 11:33:32.873169 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jul 15 11:33:32.873233 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Jul 15 11:33:32.902317 systemd[1]: sysroot-boot.service: Deactivated successfully. Jul 15 11:33:32.902396 systemd[1]: Stopped sysroot-boot.service. Jul 15 11:33:32.903000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:32.904115 systemd[1]: Reached target initrd-switch-root.target. Jul 15 11:33:32.905545 systemd[1]: initrd-setup-root.service: Deactivated successfully. Jul 15 11:33:32.907000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:32.905579 systemd[1]: Stopped initrd-setup-root.service. Jul 15 11:33:32.907860 systemd[1]: Starting initrd-switch-root.service... Jul 15 11:33:32.923669 systemd[1]: Switching root. Jul 15 11:33:32.941529 systemd-journald[197]: Journal stopped Jul 15 11:33:35.558651 systemd-journald[197]: Received SIGTERM from PID 1 (n/a). Jul 15 11:33:35.558719 kernel: SELinux: Class mctp_socket not defined in policy. Jul 15 11:33:35.558745 kernel: SELinux: Class anon_inode not defined in policy. Jul 15 11:33:35.558755 kernel: SELinux: the above unknown classes and permissions will be allowed Jul 15 11:33:35.558768 kernel: SELinux: policy capability network_peer_controls=1 Jul 15 11:33:35.558779 kernel: SELinux: policy capability open_perms=1 Jul 15 11:33:35.558789 kernel: SELinux: policy capability extended_socket_class=1 Jul 15 11:33:35.558798 kernel: SELinux: policy capability always_check_network=0 Jul 15 11:33:35.558807 kernel: SELinux: policy capability cgroup_seclabel=1 Jul 15 11:33:35.558816 kernel: SELinux: policy capability nnp_nosuid_transition=1 Jul 15 11:33:35.558825 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Jul 15 11:33:35.558835 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Jul 15 11:33:35.558845 systemd[1]: Successfully loaded SELinux policy in 37.068ms. Jul 15 11:33:35.558861 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 7.232ms. Jul 15 11:33:35.558874 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 15 11:33:35.558885 systemd[1]: Detected virtualization kvm. Jul 15 11:33:35.558894 systemd[1]: Detected architecture x86-64. Jul 15 11:33:35.558909 systemd[1]: Detected first boot. Jul 15 11:33:35.558920 systemd[1]: Initializing machine ID from VM UUID. Jul 15 11:33:35.558929 kernel: kauditd_printk_skb: 68 callbacks suppressed Jul 15 11:33:35.558939 kernel: audit: type=1400 audit(1752579213.303:79): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 15 11:33:35.558951 kernel: audit: type=1400 audit(1752579213.303:80): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 15 11:33:35.558961 kernel: audit: type=1334 audit(1752579213.304:81): prog-id=10 op=LOAD Jul 15 11:33:35.558970 kernel: audit: type=1334 audit(1752579213.304:82): prog-id=10 op=UNLOAD Jul 15 11:33:35.558980 kernel: audit: type=1334 audit(1752579213.306:83): prog-id=11 op=LOAD Jul 15 11:33:35.558989 kernel: audit: type=1334 audit(1752579213.306:84): prog-id=11 op=UNLOAD Jul 15 11:33:35.558999 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Jul 15 11:33:35.559009 kernel: audit: type=1400 audit(1752579213.336:85): avc: denied { associate } for pid=911 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Jul 15 11:33:35.559020 kernel: audit: type=1300 audit(1752579213.336:85): arch=c000003e syscall=188 success=yes exit=0 a0=c00018f8e4 a1=c00002ae40 a2=c000029080 a3=32 items=0 ppid=894 pid=911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:35.559032 kernel: audit: type=1327 audit(1752579213.336:85): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 15 11:33:35.559042 kernel: audit: type=1400 audit(1752579213.349:86): avc: denied { associate } for pid=911 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Jul 15 11:33:35.559052 systemd[1]: Populated /etc with preset unit settings. Jul 15 11:33:35.559063 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 15 11:33:35.559074 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 15 11:33:35.559087 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 15 11:33:35.559098 systemd[1]: initrd-switch-root.service: Deactivated successfully. Jul 15 11:33:35.559107 systemd[1]: Stopped initrd-switch-root.service. Jul 15 11:33:35.559118 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jul 15 11:33:35.559128 systemd[1]: Created slice system-addon\x2dconfig.slice. Jul 15 11:33:35.559138 systemd[1]: Created slice system-addon\x2drun.slice. Jul 15 11:33:35.559149 systemd[1]: Created slice system-getty.slice. Jul 15 11:33:35.559169 systemd[1]: Created slice system-modprobe.slice. Jul 15 11:33:35.559180 systemd[1]: Created slice system-serial\x2dgetty.slice. Jul 15 11:33:35.559190 systemd[1]: Created slice system-system\x2dcloudinit.slice. Jul 15 11:33:35.559200 systemd[1]: Created slice system-systemd\x2dfsck.slice. Jul 15 11:33:35.559211 systemd[1]: Created slice user.slice. Jul 15 11:33:35.559220 systemd[1]: Started systemd-ask-password-console.path. Jul 15 11:33:35.559232 systemd[1]: Started systemd-ask-password-wall.path. Jul 15 11:33:35.559242 systemd[1]: Set up automount boot.automount. Jul 15 11:33:35.559252 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Jul 15 11:33:35.559262 systemd[1]: Stopped target initrd-switch-root.target. Jul 15 11:33:35.559272 systemd[1]: Stopped target initrd-fs.target. Jul 15 11:33:35.559281 systemd[1]: Stopped target initrd-root-fs.target. Jul 15 11:33:35.559291 systemd[1]: Reached target integritysetup.target. Jul 15 11:33:35.559302 systemd[1]: Reached target remote-cryptsetup.target. Jul 15 11:33:35.559312 systemd[1]: Reached target remote-fs.target. Jul 15 11:33:35.559324 systemd[1]: Reached target slices.target. Jul 15 11:33:35.559333 systemd[1]: Reached target swap.target. Jul 15 11:33:35.559343 systemd[1]: Reached target torcx.target. Jul 15 11:33:35.559353 systemd[1]: Reached target veritysetup.target. Jul 15 11:33:35.559363 systemd[1]: Listening on systemd-coredump.socket. Jul 15 11:33:35.559372 systemd[1]: Listening on systemd-initctl.socket. Jul 15 11:33:35.559382 systemd[1]: Listening on systemd-networkd.socket. Jul 15 11:33:35.559392 systemd[1]: Listening on systemd-udevd-control.socket. Jul 15 11:33:35.559402 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 15 11:33:35.559413 systemd[1]: Listening on systemd-userdbd.socket. Jul 15 11:33:35.559424 systemd[1]: Mounting dev-hugepages.mount... Jul 15 11:33:35.559434 systemd[1]: Mounting dev-mqueue.mount... Jul 15 11:33:35.559444 systemd[1]: Mounting media.mount... Jul 15 11:33:35.559455 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 15 11:33:35.559465 systemd[1]: Mounting sys-kernel-debug.mount... Jul 15 11:33:35.559475 systemd[1]: Mounting sys-kernel-tracing.mount... Jul 15 11:33:35.559485 systemd[1]: Mounting tmp.mount... Jul 15 11:33:35.559495 systemd[1]: Starting flatcar-tmpfiles.service... Jul 15 11:33:35.559505 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 15 11:33:35.559517 systemd[1]: Starting kmod-static-nodes.service... Jul 15 11:33:35.559527 systemd[1]: Starting modprobe@configfs.service... Jul 15 11:33:35.559537 systemd[1]: Starting modprobe@dm_mod.service... Jul 15 11:33:35.559547 systemd[1]: Starting modprobe@drm.service... Jul 15 11:33:35.559557 systemd[1]: Starting modprobe@efi_pstore.service... Jul 15 11:33:35.559567 systemd[1]: Starting modprobe@fuse.service... Jul 15 11:33:35.559577 systemd[1]: Starting modprobe@loop.service... Jul 15 11:33:35.559587 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Jul 15 11:33:35.559598 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jul 15 11:33:35.559610 systemd[1]: Stopped systemd-fsck-root.service. Jul 15 11:33:35.559620 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Jul 15 11:33:35.559629 systemd[1]: Stopped systemd-fsck-usr.service. Jul 15 11:33:35.559639 systemd[1]: Stopped systemd-journald.service. Jul 15 11:33:35.559649 kernel: fuse: init (API version 7.34) Jul 15 11:33:35.559659 kernel: loop: module loaded Jul 15 11:33:35.559668 systemd[1]: Starting systemd-journald.service... Jul 15 11:33:35.559678 systemd[1]: Starting systemd-modules-load.service... Jul 15 11:33:35.559688 systemd[1]: Starting systemd-network-generator.service... Jul 15 11:33:35.559699 systemd[1]: Starting systemd-remount-fs.service... Jul 15 11:33:35.559710 systemd[1]: Starting systemd-udev-trigger.service... Jul 15 11:33:35.559720 systemd[1]: verity-setup.service: Deactivated successfully. Jul 15 11:33:35.559740 systemd[1]: Stopped verity-setup.service. Jul 15 11:33:35.559753 systemd-journald[996]: Journal started Jul 15 11:33:35.559790 systemd-journald[996]: Runtime Journal (/run/log/journal/a159d3b7ef3942bb92c393a94dd45152) is 6.0M, max 48.4M, 42.4M free. Jul 15 11:33:32.996000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Jul 15 11:33:33.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 15 11:33:33.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 15 11:33:33.304000 audit: BPF prog-id=10 op=LOAD Jul 15 11:33:33.304000 audit: BPF prog-id=10 op=UNLOAD Jul 15 11:33:33.306000 audit: BPF prog-id=11 op=LOAD Jul 15 11:33:33.306000 audit: BPF prog-id=11 op=UNLOAD Jul 15 11:33:33.336000 audit[911]: AVC avc: denied { associate } for pid=911 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Jul 15 11:33:33.336000 audit[911]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00018f8e4 a1=c00002ae40 a2=c000029080 a3=32 items=0 ppid=894 pid=911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:33.336000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 15 11:33:33.349000 audit[911]: AVC avc: denied { associate } for pid=911 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Jul 15 11:33:33.349000 audit[911]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00018f9b9 a2=1ed a3=0 items=2 ppid=894 pid=911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:33.349000 audit: CWD cwd="/" Jul 15 11:33:33.349000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:33.349000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:33.349000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 15 11:33:35.440000 audit: BPF prog-id=12 op=LOAD Jul 15 11:33:35.440000 audit: BPF prog-id=3 op=UNLOAD Jul 15 11:33:35.440000 audit: BPF prog-id=13 op=LOAD Jul 15 11:33:35.440000 audit: BPF prog-id=14 op=LOAD Jul 15 11:33:35.440000 audit: BPF prog-id=4 op=UNLOAD Jul 15 11:33:35.440000 audit: BPF prog-id=5 op=UNLOAD Jul 15 11:33:35.441000 audit: BPF prog-id=15 op=LOAD Jul 15 11:33:35.441000 audit: BPF prog-id=12 op=UNLOAD Jul 15 11:33:35.441000 audit: BPF prog-id=16 op=LOAD Jul 15 11:33:35.441000 audit: BPF prog-id=17 op=LOAD Jul 15 11:33:35.441000 audit: BPF prog-id=13 op=UNLOAD Jul 15 11:33:35.441000 audit: BPF prog-id=14 op=UNLOAD Jul 15 11:33:35.442000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:35.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:35.445000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:35.454000 audit: BPF prog-id=15 op=UNLOAD Jul 15 11:33:35.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:35.541000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:35.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:35.543000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:35.543000 audit: BPF prog-id=18 op=LOAD Jul 15 11:33:35.544000 audit: BPF prog-id=19 op=LOAD Jul 15 11:33:35.544000 audit: BPF prog-id=20 op=LOAD Jul 15 11:33:35.544000 audit: BPF prog-id=16 op=UNLOAD Jul 15 11:33:35.544000 audit: BPF prog-id=17 op=UNLOAD Jul 15 11:33:35.557000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jul 15 11:33:35.557000 audit[996]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffe81cf1ef0 a2=4000 a3=7ffe81cf1f8c items=0 ppid=1 pid=996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:35.557000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Jul 15 11:33:33.335561 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-07-15T11:33:33Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" Jul 15 11:33:35.439687 systemd[1]: Queued start job for default target multi-user.target. Jul 15 11:33:35.560000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:33.335771 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-07-15T11:33:33Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 15 11:33:35.439697 systemd[1]: Unnecessary job was removed for dev-vda6.device. Jul 15 11:33:33.335786 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-07-15T11:33:33Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 15 11:33:35.442610 systemd[1]: systemd-journald.service: Deactivated successfully. Jul 15 11:33:33.335812 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-07-15T11:33:33Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Jul 15 11:33:33.335821 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-07-15T11:33:33Z" level=debug msg="skipped missing lower profile" missing profile=oem Jul 15 11:33:33.335845 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-07-15T11:33:33Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Jul 15 11:33:33.335855 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-07-15T11:33:33Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Jul 15 11:33:33.336033 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-07-15T11:33:33Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Jul 15 11:33:33.336062 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-07-15T11:33:33Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 15 11:33:33.336073 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-07-15T11:33:33Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 15 11:33:33.336674 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-07-15T11:33:33Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Jul 15 11:33:33.336703 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-07-15T11:33:33Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Jul 15 11:33:33.336718 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-07-15T11:33:33Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.100: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.100 Jul 15 11:33:33.336744 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-07-15T11:33:33Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Jul 15 11:33:33.336757 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-07-15T11:33:33Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.100: no such file or directory" path=/var/lib/torcx/store/3510.3.100 Jul 15 11:33:33.336769 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-07-15T11:33:33Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Jul 15 11:33:35.175241 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-07-15T11:33:35Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 15 11:33:35.175481 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-07-15T11:33:35Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 15 11:33:35.175573 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-07-15T11:33:35Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 15 11:33:35.175715 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-07-15T11:33:35Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 15 11:33:35.175778 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-07-15T11:33:35Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Jul 15 11:33:35.175829 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2025-07-15T11:33:35Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Jul 15 11:33:35.562762 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 15 11:33:35.565428 systemd[1]: Started systemd-journald.service. Jul 15 11:33:35.565000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:35.566011 systemd[1]: Mounted dev-hugepages.mount. Jul 15 11:33:35.566878 systemd[1]: Mounted dev-mqueue.mount. Jul 15 11:33:35.567692 systemd[1]: Mounted media.mount. Jul 15 11:33:35.568474 systemd[1]: Mounted sys-kernel-debug.mount. Jul 15 11:33:35.569377 systemd[1]: Mounted sys-kernel-tracing.mount. Jul 15 11:33:35.570279 systemd[1]: Mounted tmp.mount. Jul 15 11:33:35.571251 systemd[1]: Finished flatcar-tmpfiles.service. Jul 15 11:33:35.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:35.572378 systemd[1]: Finished kmod-static-nodes.service. Jul 15 11:33:35.573000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:35.573449 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jul 15 11:33:35.573567 systemd[1]: Finished modprobe@configfs.service. Jul 15 11:33:35.574000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:35.574000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:35.574619 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 15 11:33:35.574761 systemd[1]: Finished modprobe@dm_mod.service. Jul 15 11:33:35.574000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:35.574000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:35.575883 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 15 11:33:35.576051 systemd[1]: Finished modprobe@drm.service. Jul 15 11:33:35.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:35.576000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:35.577096 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 15 11:33:35.577256 systemd[1]: Finished modprobe@efi_pstore.service. Jul 15 11:33:35.578000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:35.578000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:35.578378 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jul 15 11:33:35.578551 systemd[1]: Finished modprobe@fuse.service. Jul 15 11:33:35.579000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:35.579000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:35.579755 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 15 11:33:35.579910 systemd[1]: Finished modprobe@loop.service. Jul 15 11:33:35.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:35.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:35.581193 systemd[1]: Finished systemd-modules-load.service. Jul 15 11:33:35.581000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:35.582386 systemd[1]: Finished systemd-network-generator.service. Jul 15 11:33:35.583000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:35.583555 systemd[1]: Finished systemd-remount-fs.service. Jul 15 11:33:35.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:35.584862 systemd[1]: Reached target network-pre.target. Jul 15 11:33:35.586632 systemd[1]: Mounting sys-fs-fuse-connections.mount... Jul 15 11:33:35.588367 systemd[1]: Mounting sys-kernel-config.mount... Jul 15 11:33:35.589284 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Jul 15 11:33:35.590424 systemd[1]: Starting systemd-hwdb-update.service... Jul 15 11:33:35.592305 systemd[1]: Starting systemd-journal-flush.service... Jul 15 11:33:35.593549 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 15 11:33:35.594305 systemd[1]: Starting systemd-random-seed.service... Jul 15 11:33:35.595419 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 15 11:33:35.596791 systemd-journald[996]: Time spent on flushing to /var/log/journal/a159d3b7ef3942bb92c393a94dd45152 is 14.227ms for 1148 entries. Jul 15 11:33:35.596791 systemd-journald[996]: System Journal (/var/log/journal/a159d3b7ef3942bb92c393a94dd45152) is 8.0M, max 195.6M, 187.6M free. Jul 15 11:33:35.940813 systemd-journald[996]: Received client request to flush runtime journal. Jul 15 11:33:35.608000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:35.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:35.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:35.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:35.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:35.596279 systemd[1]: Starting systemd-sysctl.service... Jul 15 11:33:35.599222 systemd[1]: Starting systemd-sysusers.service... Jul 15 11:33:35.601619 systemd[1]: Mounted sys-fs-fuse-connections.mount. Jul 15 11:33:35.602703 systemd[1]: Mounted sys-kernel-config.mount. Jul 15 11:33:35.941758 udevadm[1015]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Jul 15 11:33:35.607216 systemd[1]: Finished systemd-udev-trigger.service. Jul 15 11:33:35.609382 systemd[1]: Starting systemd-udev-settle.service... Jul 15 11:33:35.610420 systemd[1]: Finished systemd-sysctl.service. Jul 15 11:33:35.611445 systemd[1]: Finished systemd-sysusers.service. Jul 15 11:33:35.613148 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 15 11:33:35.627224 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 15 11:33:35.872547 systemd[1]: Finished systemd-random-seed.service. Jul 15 11:33:35.873602 systemd[1]: Reached target first-boot-complete.target. Jul 15 11:33:35.941840 systemd[1]: Finished systemd-journal-flush.service. Jul 15 11:33:35.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:36.099132 systemd[1]: Finished systemd-hwdb-update.service. Jul 15 11:33:36.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:36.100000 audit: BPF prog-id=21 op=LOAD Jul 15 11:33:36.100000 audit: BPF prog-id=22 op=LOAD Jul 15 11:33:36.100000 audit: BPF prog-id=7 op=UNLOAD Jul 15 11:33:36.100000 audit: BPF prog-id=8 op=UNLOAD Jul 15 11:33:36.101890 systemd[1]: Starting systemd-udevd.service... Jul 15 11:33:36.116609 systemd-udevd[1019]: Using default interface naming scheme 'v252'. Jul 15 11:33:36.129273 systemd[1]: Started systemd-udevd.service. Jul 15 11:33:36.129000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:36.131000 audit: BPF prog-id=23 op=LOAD Jul 15 11:33:36.133487 systemd[1]: Starting systemd-networkd.service... Jul 15 11:33:36.137000 audit: BPF prog-id=24 op=LOAD Jul 15 11:33:36.137000 audit: BPF prog-id=25 op=LOAD Jul 15 11:33:36.137000 audit: BPF prog-id=26 op=LOAD Jul 15 11:33:36.139138 systemd[1]: Starting systemd-userdbd.service... Jul 15 11:33:36.161997 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Jul 15 11:33:36.168121 systemd[1]: Started systemd-userdbd.service. Jul 15 11:33:36.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:36.170411 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 15 11:33:36.194750 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Jul 15 11:33:36.211764 kernel: ACPI: button: Power Button [PWRF] Jul 15 11:33:36.215858 systemd-networkd[1029]: lo: Link UP Jul 15 11:33:36.216161 systemd-networkd[1029]: lo: Gained carrier Jul 15 11:33:36.216590 systemd-networkd[1029]: Enumeration completed Jul 15 11:33:36.216942 systemd[1]: Started systemd-networkd.service. Jul 15 11:33:36.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:36.218179 systemd-networkd[1029]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 15 11:33:36.219203 systemd-networkd[1029]: eth0: Link UP Jul 15 11:33:36.219339 systemd-networkd[1029]: eth0: Gained carrier Jul 15 11:33:36.223000 audit[1024]: AVC avc: denied { confidentiality } for pid=1024 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Jul 15 11:33:36.233859 systemd-networkd[1029]: eth0: DHCPv4 address 10.0.0.97/16, gateway 10.0.0.1 acquired from 10.0.0.1 Jul 15 11:33:36.243862 (udev-worker)[1023]: could not read from '/sys/module/pcc_cpufreq/initstate': No such device Jul 15 11:33:36.223000 audit[1024]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55cbac2baa20 a1=338ac a2=7f8d38879bc5 a3=5 items=110 ppid=1019 pid=1024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:36.223000 audit: CWD cwd="/" Jul 15 11:33:36.223000 audit: PATH item=0 name=(null) inode=50 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=1 name=(null) inode=15890 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=2 name=(null) inode=15890 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=3 name=(null) inode=15891 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=4 name=(null) inode=15890 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=5 name=(null) inode=15892 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=6 name=(null) inode=15890 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=7 name=(null) inode=15893 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=8 name=(null) inode=15893 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=9 name=(null) inode=15894 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=10 name=(null) inode=15893 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=11 name=(null) inode=15895 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=12 name=(null) inode=15893 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=13 name=(null) inode=15896 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=14 name=(null) inode=15893 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=15 name=(null) inode=15897 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=16 name=(null) inode=15893 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=17 name=(null) inode=15898 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=18 name=(null) inode=15890 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=19 name=(null) inode=15899 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=20 name=(null) inode=15899 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=21 name=(null) inode=15900 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=22 name=(null) inode=15899 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=23 name=(null) inode=15901 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=24 name=(null) inode=15899 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=25 name=(null) inode=15902 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=26 name=(null) inode=15899 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=27 name=(null) inode=15903 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=28 name=(null) inode=15899 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=29 name=(null) inode=15904 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=30 name=(null) inode=15890 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=31 name=(null) inode=15905 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=32 name=(null) inode=15905 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=33 name=(null) inode=15906 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=34 name=(null) inode=15905 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=35 name=(null) inode=15907 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=36 name=(null) inode=15905 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=37 name=(null) inode=15908 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=38 name=(null) inode=15905 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=39 name=(null) inode=15909 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=40 name=(null) inode=15905 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=41 name=(null) inode=15910 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=42 name=(null) inode=15890 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=43 name=(null) inode=15911 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=44 name=(null) inode=15911 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=45 name=(null) inode=15912 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=46 name=(null) inode=15911 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=47 name=(null) inode=15913 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=48 name=(null) inode=15911 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=49 name=(null) inode=15914 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=50 name=(null) inode=15911 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=51 name=(null) inode=15915 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=52 name=(null) inode=15911 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=53 name=(null) inode=15916 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=54 name=(null) inode=50 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=55 name=(null) inode=15917 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=56 name=(null) inode=15917 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=57 name=(null) inode=15918 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=58 name=(null) inode=15917 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=59 name=(null) inode=15919 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=60 name=(null) inode=15917 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=61 name=(null) inode=15920 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=62 name=(null) inode=15920 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=63 name=(null) inode=15921 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=64 name=(null) inode=15920 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=65 name=(null) inode=15922 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=66 name=(null) inode=15920 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=67 name=(null) inode=15923 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=68 name=(null) inode=15920 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=69 name=(null) inode=15924 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=70 name=(null) inode=15920 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=71 name=(null) inode=15925 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=72 name=(null) inode=15917 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=73 name=(null) inode=15926 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=74 name=(null) inode=15926 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=75 name=(null) inode=15927 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=76 name=(null) inode=15926 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=77 name=(null) inode=15928 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=78 name=(null) inode=15926 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=79 name=(null) inode=15929 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=80 name=(null) inode=15926 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=81 name=(null) inode=15930 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=82 name=(null) inode=15926 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=83 name=(null) inode=15931 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=84 name=(null) inode=15917 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=85 name=(null) inode=15932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=86 name=(null) inode=15932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=87 name=(null) inode=15933 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=88 name=(null) inode=15932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=89 name=(null) inode=15934 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=90 name=(null) inode=15932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=91 name=(null) inode=15935 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=92 name=(null) inode=15932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=93 name=(null) inode=15936 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=94 name=(null) inode=15932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=95 name=(null) inode=15937 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=96 name=(null) inode=15917 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=97 name=(null) inode=15938 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=98 name=(null) inode=15938 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=99 name=(null) inode=15939 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=100 name=(null) inode=15938 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=101 name=(null) inode=15940 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=102 name=(null) inode=15938 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=103 name=(null) inode=15941 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=104 name=(null) inode=15938 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=105 name=(null) inode=15942 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=106 name=(null) inode=15938 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=107 name=(null) inode=15943 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PATH item=109 name=(null) inode=15950 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:33:36.223000 audit: PROCTITLE proctitle="(udev-worker)" Jul 15 11:33:36.260748 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Jul 15 11:33:36.268772 kernel: mousedev: PS/2 mouse device common for all mice Jul 15 11:33:36.270742 kernel: i801_smbus 0000:00:1f.3: Enabling SMBus device Jul 15 11:33:36.272948 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Jul 15 11:33:36.273056 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Jul 15 11:33:36.273171 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Jul 15 11:33:36.308176 kernel: kvm: Nested Virtualization enabled Jul 15 11:33:36.308270 kernel: SVM: kvm: Nested Paging enabled Jul 15 11:33:36.308303 kernel: SVM: Virtual VMLOAD VMSAVE supported Jul 15 11:33:36.308316 kernel: SVM: Virtual GIF supported Jul 15 11:33:36.325742 kernel: EDAC MC: Ver: 3.0.0 Jul 15 11:33:36.348068 systemd[1]: Finished systemd-udev-settle.service. Jul 15 11:33:36.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:36.350280 systemd[1]: Starting lvm2-activation-early.service... Jul 15 11:33:36.357267 lvm[1055]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 15 11:33:36.380371 systemd[1]: Finished lvm2-activation-early.service. Jul 15 11:33:36.380000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:36.381365 systemd[1]: Reached target cryptsetup.target. Jul 15 11:33:36.383038 systemd[1]: Starting lvm2-activation.service... Jul 15 11:33:36.386146 lvm[1056]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 15 11:33:36.413440 systemd[1]: Finished lvm2-activation.service. Jul 15 11:33:36.413000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:36.414421 systemd[1]: Reached target local-fs-pre.target. Jul 15 11:33:36.415251 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Jul 15 11:33:36.415274 systemd[1]: Reached target local-fs.target. Jul 15 11:33:36.416040 systemd[1]: Reached target machines.target. Jul 15 11:33:36.417845 systemd[1]: Starting ldconfig.service... Jul 15 11:33:36.418779 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 15 11:33:36.418821 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 15 11:33:36.419614 systemd[1]: Starting systemd-boot-update.service... Jul 15 11:33:36.421655 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Jul 15 11:33:36.423591 systemd[1]: Starting systemd-machine-id-commit.service... Jul 15 11:33:36.425418 systemd[1]: Starting systemd-sysext.service... Jul 15 11:33:36.431032 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Jul 15 11:33:36.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:36.434926 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1058 (bootctl) Jul 15 11:33:36.436567 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Jul 15 11:33:36.441222 systemd[1]: Unmounting usr-share-oem.mount... Jul 15 11:33:36.445636 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 15 11:33:36.445826 systemd[1]: Unmounted usr-share-oem.mount. Jul 15 11:33:36.457781 kernel: loop0: detected capacity change from 0 to 224512 Jul 15 11:33:36.540630 systemd-fsck[1067]: fsck.fat 4.2 (2021-01-31) Jul 15 11:33:36.540630 systemd-fsck[1067]: /dev/vda1: 791 files, 120745/258078 clusters Jul 15 11:33:36.542166 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Jul 15 11:33:36.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:36.544667 systemd[1]: Mounting boot.mount... Jul 15 11:33:36.916747 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Jul 15 11:33:36.922583 systemd[1]: Mounted boot.mount. Jul 15 11:33:36.930906 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Jul 15 11:33:36.932639 systemd[1]: Finished systemd-machine-id-commit.service. Jul 15 11:33:36.931000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:36.936499 systemd[1]: Finished systemd-boot-update.service. Jul 15 11:33:36.936000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:36.939743 kernel: loop1: detected capacity change from 0 to 224512 Jul 15 11:33:36.943928 (sd-sysext)[1071]: Using extensions 'kubernetes'. Jul 15 11:33:36.944647 (sd-sysext)[1071]: Merged extensions into '/usr'. Jul 15 11:33:36.959864 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 15 11:33:36.961815 systemd[1]: Mounting usr-share-oem.mount... Jul 15 11:33:36.963222 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 15 11:33:36.964563 systemd[1]: Starting modprobe@dm_mod.service... Jul 15 11:33:36.966734 systemd[1]: Starting modprobe@efi_pstore.service... Jul 15 11:33:36.968438 systemd[1]: Starting modprobe@loop.service... Jul 15 11:33:36.969278 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 15 11:33:36.969387 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 15 11:33:36.969484 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 15 11:33:36.970320 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 15 11:33:36.970439 systemd[1]: Finished modprobe@dm_mod.service. Jul 15 11:33:36.970000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:36.970000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:36.971840 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 15 11:33:36.971986 systemd[1]: Finished modprobe@efi_pstore.service. Jul 15 11:33:36.972000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:36.972000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:36.973340 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 15 11:33:36.973446 systemd[1]: Finished modprobe@loop.service. Jul 15 11:33:36.973000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:36.973000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:36.974761 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 15 11:33:36.974853 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 15 11:33:36.976788 systemd[1]: Mounted usr-share-oem.mount. Jul 15 11:33:36.978591 systemd[1]: Finished systemd-sysext.service. Jul 15 11:33:36.978000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:36.981003 systemd[1]: Starting ensure-sysext.service... Jul 15 11:33:36.982791 systemd[1]: Starting systemd-tmpfiles-setup.service... Jul 15 11:33:36.987650 systemd[1]: Reloading. Jul 15 11:33:36.992446 systemd-tmpfiles[1078]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Jul 15 11:33:36.993546 systemd-tmpfiles[1078]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Jul 15 11:33:36.995040 systemd-tmpfiles[1078]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Jul 15 11:33:37.050429 ldconfig[1057]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Jul 15 11:33:37.068946 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2025-07-15T11:33:37Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" Jul 15 11:33:37.068973 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2025-07-15T11:33:37Z" level=info msg="torcx already run" Jul 15 11:33:37.125347 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 15 11:33:37.125362 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 15 11:33:37.142201 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 15 11:33:37.193000 audit: BPF prog-id=27 op=LOAD Jul 15 11:33:37.193000 audit: BPF prog-id=23 op=UNLOAD Jul 15 11:33:37.195000 audit: BPF prog-id=28 op=LOAD Jul 15 11:33:37.195000 audit: BPF prog-id=24 op=UNLOAD Jul 15 11:33:37.195000 audit: BPF prog-id=29 op=LOAD Jul 15 11:33:37.195000 audit: BPF prog-id=30 op=LOAD Jul 15 11:33:37.195000 audit: BPF prog-id=25 op=UNLOAD Jul 15 11:33:37.195000 audit: BPF prog-id=26 op=UNLOAD Jul 15 11:33:37.195000 audit: BPF prog-id=31 op=LOAD Jul 15 11:33:37.195000 audit: BPF prog-id=32 op=LOAD Jul 15 11:33:37.195000 audit: BPF prog-id=21 op=UNLOAD Jul 15 11:33:37.195000 audit: BPF prog-id=22 op=UNLOAD Jul 15 11:33:37.196000 audit: BPF prog-id=33 op=LOAD Jul 15 11:33:37.196000 audit: BPF prog-id=18 op=UNLOAD Jul 15 11:33:37.196000 audit: BPF prog-id=34 op=LOAD Jul 15 11:33:37.196000 audit: BPF prog-id=35 op=LOAD Jul 15 11:33:37.196000 audit: BPF prog-id=19 op=UNLOAD Jul 15 11:33:37.196000 audit: BPF prog-id=20 op=UNLOAD Jul 15 11:33:37.199899 systemd[1]: Finished ldconfig.service. Jul 15 11:33:37.200000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:37.201705 systemd[1]: Finished systemd-tmpfiles-setup.service. Jul 15 11:33:37.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:37.205635 systemd[1]: Starting audit-rules.service... Jul 15 11:33:37.207605 systemd[1]: Starting clean-ca-certificates.service... Jul 15 11:33:37.209826 systemd[1]: Starting systemd-journal-catalog-update.service... Jul 15 11:33:37.210000 audit: BPF prog-id=36 op=LOAD Jul 15 11:33:37.212416 systemd[1]: Starting systemd-resolved.service... Jul 15 11:33:37.213000 audit: BPF prog-id=37 op=LOAD Jul 15 11:33:37.215371 systemd[1]: Starting systemd-timesyncd.service... Jul 15 11:33:37.217285 systemd[1]: Starting systemd-update-utmp.service... Jul 15 11:33:37.219329 systemd[1]: Finished clean-ca-certificates.service. Jul 15 11:33:37.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:37.222000 audit[1152]: SYSTEM_BOOT pid=1152 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jul 15 11:33:37.222776 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 15 11:33:37.228986 systemd[1]: Finished systemd-journal-catalog-update.service. Jul 15 11:33:37.229268 augenrules[1160]: No rules Jul 15 11:33:37.228000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jul 15 11:33:37.228000 audit[1160]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc73645470 a2=420 a3=0 items=0 ppid=1140 pid=1160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:37.228000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Jul 15 11:33:37.230969 systemd[1]: Finished audit-rules.service. Jul 15 11:33:37.232506 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 15 11:33:37.232821 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 15 11:33:37.234937 systemd[1]: Starting modprobe@dm_mod.service... Jul 15 11:33:37.236883 systemd[1]: Starting modprobe@efi_pstore.service... Jul 15 11:33:37.238871 systemd[1]: Starting modprobe@loop.service... Jul 15 11:33:37.239830 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 15 11:33:37.239953 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 15 11:33:37.241082 systemd[1]: Starting systemd-update-done.service... Jul 15 11:33:37.242222 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 15 11:33:37.242338 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 15 11:33:37.244051 systemd[1]: Finished systemd-update-utmp.service. Jul 15 11:33:37.246366 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 15 11:33:37.246576 systemd[1]: Finished modprobe@dm_mod.service. Jul 15 11:33:37.248200 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 15 11:33:37.248288 systemd[1]: Finished modprobe@efi_pstore.service. Jul 15 11:33:37.250328 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 15 11:33:37.250493 systemd[1]: Finished modprobe@loop.service. Jul 15 11:33:37.252193 systemd[1]: Finished systemd-update-done.service. Jul 15 11:33:37.256805 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 15 11:33:37.257096 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 15 11:33:37.258558 systemd[1]: Starting modprobe@dm_mod.service... Jul 15 11:33:37.261388 systemd[1]: Starting modprobe@efi_pstore.service... Jul 15 11:33:37.264166 systemd[1]: Starting modprobe@loop.service... Jul 15 11:33:37.265280 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 15 11:33:37.265432 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 15 11:33:37.265572 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 15 11:33:37.265676 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 15 11:33:37.267031 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 15 11:33:37.267235 systemd[1]: Finished modprobe@dm_mod.service. Jul 15 11:33:37.269255 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 15 11:33:37.269376 systemd[1]: Finished modprobe@efi_pstore.service. Jul 15 11:33:37.271124 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 15 11:33:37.271285 systemd[1]: Finished modprobe@loop.service. Jul 15 11:33:37.272970 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 15 11:33:37.273203 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 15 11:33:37.278172 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 15 11:33:37.278434 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 15 11:33:37.279918 systemd[1]: Starting modprobe@dm_mod.service... Jul 15 11:33:37.282360 systemd[1]: Starting modprobe@drm.service... Jul 15 11:33:37.293342 systemd-timesyncd[1150]: Contacted time server 10.0.0.1:123 (10.0.0.1). Jul 15 11:33:37.293398 systemd-timesyncd[1150]: Initial clock synchronization to Tue 2025-07-15 11:33:37.522563 UTC. Jul 15 11:33:37.323904 systemd[1]: Starting modprobe@efi_pstore.service... Jul 15 11:33:37.326443 systemd[1]: Starting modprobe@loop.service... Jul 15 11:33:37.327350 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 15 11:33:37.327464 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 15 11:33:37.328756 systemd[1]: Starting systemd-networkd-wait-online.service... Jul 15 11:33:37.329899 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 15 11:33:37.330035 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 15 11:33:37.331273 systemd[1]: Started systemd-timesyncd.service. Jul 15 11:33:37.333484 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 15 11:33:37.333587 systemd[1]: Finished modprobe@dm_mod.service. Jul 15 11:33:37.334868 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 15 11:33:37.334961 systemd[1]: Finished modprobe@drm.service. Jul 15 11:33:37.336219 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 15 11:33:37.336323 systemd[1]: Finished modprobe@efi_pstore.service. Jul 15 11:33:37.337575 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 15 11:33:37.337679 systemd[1]: Finished modprobe@loop.service. Jul 15 11:33:37.339142 systemd[1]: Reached target time-set.target. Jul 15 11:33:37.340192 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 15 11:33:37.340227 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 15 11:33:37.340523 systemd[1]: Finished ensure-sysext.service. Jul 15 11:33:37.340862 systemd-resolved[1149]: Positive Trust Anchors: Jul 15 11:33:37.340875 systemd-resolved[1149]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 15 11:33:37.340907 systemd-resolved[1149]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 15 11:33:37.349758 systemd-resolved[1149]: Defaulting to hostname 'linux'. Jul 15 11:33:37.351549 systemd[1]: Started systemd-resolved.service. Jul 15 11:33:37.352589 systemd[1]: Reached target network.target. Jul 15 11:33:37.353440 systemd[1]: Reached target nss-lookup.target. Jul 15 11:33:37.354338 systemd[1]: Reached target sysinit.target. Jul 15 11:33:37.355249 systemd[1]: Started motdgen.path. Jul 15 11:33:37.356057 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Jul 15 11:33:37.357392 systemd[1]: Started logrotate.timer. Jul 15 11:33:37.358269 systemd[1]: Started mdadm.timer. Jul 15 11:33:37.359014 systemd[1]: Started systemd-tmpfiles-clean.timer. Jul 15 11:33:37.359940 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 15 11:33:37.359964 systemd[1]: Reached target paths.target. Jul 15 11:33:37.360771 systemd[1]: Reached target timers.target. Jul 15 11:33:37.361934 systemd[1]: Listening on dbus.socket. Jul 15 11:33:37.363843 systemd[1]: Starting docker.socket... Jul 15 11:33:37.366767 systemd[1]: Listening on sshd.socket. Jul 15 11:33:37.367658 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 15 11:33:37.368038 systemd[1]: Listening on docker.socket. Jul 15 11:33:37.368974 systemd[1]: Reached target sockets.target. Jul 15 11:33:37.369822 systemd[1]: Reached target basic.target. Jul 15 11:33:37.370695 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 15 11:33:37.370716 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 15 11:33:37.371580 systemd[1]: Starting containerd.service... Jul 15 11:33:37.373539 systemd[1]: Starting dbus.service... Jul 15 11:33:37.375225 systemd[1]: Starting enable-oem-cloudinit.service... Jul 15 11:33:37.376925 systemd[1]: Starting extend-filesystems.service... Jul 15 11:33:37.377936 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Jul 15 11:33:37.378866 systemd[1]: Starting motdgen.service... Jul 15 11:33:37.379373 jq[1182]: false Jul 15 11:33:37.380508 systemd[1]: Starting ssh-key-proc-cmdline.service... Jul 15 11:33:37.382561 systemd[1]: Starting sshd-keygen.service... Jul 15 11:33:37.385305 systemd[1]: Starting systemd-logind.service... Jul 15 11:33:37.385853 systemd-networkd[1029]: eth0: Gained IPv6LL Jul 15 11:33:37.386528 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 15 11:33:37.386579 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Jul 15 11:33:37.386920 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Jul 15 11:33:37.387586 systemd[1]: Starting update-engine.service... Jul 15 11:33:37.389587 systemd[1]: Starting update-ssh-keys-after-ignition.service... Jul 15 11:33:37.394241 systemd[1]: Finished systemd-networkd-wait-online.service. Jul 15 11:33:37.395554 jq[1194]: true Jul 15 11:33:37.396490 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 15 11:33:37.396649 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Jul 15 11:33:37.396928 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 15 11:33:37.397051 systemd[1]: Finished ssh-key-proc-cmdline.service. Jul 15 11:33:37.400090 dbus-daemon[1181]: [system] SELinux support is enabled Jul 15 11:33:37.400419 systemd[1]: Reached target network-online.target. Jul 15 11:33:37.404923 extend-filesystems[1183]: Found loop1 Jul 15 11:33:37.406044 extend-filesystems[1183]: Found sr0 Jul 15 11:33:37.406687 jq[1202]: true Jul 15 11:33:37.406843 extend-filesystems[1183]: Found vda Jul 15 11:33:37.406843 extend-filesystems[1183]: Found vda1 Jul 15 11:33:37.406843 extend-filesystems[1183]: Found vda2 Jul 15 11:33:37.406843 extend-filesystems[1183]: Found vda3 Jul 15 11:33:37.406843 extend-filesystems[1183]: Found usr Jul 15 11:33:37.406843 extend-filesystems[1183]: Found vda4 Jul 15 11:33:37.406843 extend-filesystems[1183]: Found vda6 Jul 15 11:33:37.406843 extend-filesystems[1183]: Found vda7 Jul 15 11:33:37.406843 extend-filesystems[1183]: Found vda9 Jul 15 11:33:37.406843 extend-filesystems[1183]: Checking size of /dev/vda9 Jul 15 11:33:37.410596 systemd[1]: Starting kubelet.service... Jul 15 11:33:37.415791 systemd[1]: Started dbus.service. Jul 15 11:33:37.419627 systemd[1]: motdgen.service: Deactivated successfully. Jul 15 11:33:37.419784 systemd[1]: Finished motdgen.service. Jul 15 11:33:37.423685 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Jul 15 11:33:37.423705 systemd[1]: Reached target system-config.target. Jul 15 11:33:37.424826 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Jul 15 11:33:37.424840 systemd[1]: Reached target user-config.target. Jul 15 11:33:37.449215 env[1203]: time="2025-07-15T11:33:37.449117379Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Jul 15 11:33:37.463842 systemd-logind[1190]: Watching system buttons on /dev/input/event1 (Power Button) Jul 15 11:33:37.463867 systemd-logind[1190]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Jul 15 11:33:37.464372 systemd-logind[1190]: New seat seat0. Jul 15 11:33:37.465559 update_engine[1192]: I0715 11:33:37.465173 1192 main.cc:92] Flatcar Update Engine starting Jul 15 11:33:37.467627 systemd[1]: Started systemd-logind.service. Jul 15 11:33:37.478876 env[1203]: time="2025-07-15T11:33:37.474188779Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Jul 15 11:33:37.478876 env[1203]: time="2025-07-15T11:33:37.474327549Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Jul 15 11:33:37.478876 env[1203]: time="2025-07-15T11:33:37.475962444Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.188-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Jul 15 11:33:37.478876 env[1203]: time="2025-07-15T11:33:37.476009061Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Jul 15 11:33:37.478876 env[1203]: time="2025-07-15T11:33:37.476282634Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 15 11:33:37.478876 env[1203]: time="2025-07-15T11:33:37.476303423Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Jul 15 11:33:37.478876 env[1203]: time="2025-07-15T11:33:37.476321527Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Jul 15 11:33:37.478876 env[1203]: time="2025-07-15T11:33:37.476333359Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Jul 15 11:33:37.478876 env[1203]: time="2025-07-15T11:33:37.476408410Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Jul 15 11:33:37.478876 env[1203]: time="2025-07-15T11:33:37.476637569Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Jul 15 11:33:37.479091 update_engine[1192]: I0715 11:33:37.468158 1192 update_check_scheduler.cc:74] Next update check in 4m44s Jul 15 11:33:37.479129 env[1203]: time="2025-07-15T11:33:37.476791718Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 15 11:33:37.479129 env[1203]: time="2025-07-15T11:33:37.476809421Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Jul 15 11:33:37.479129 env[1203]: time="2025-07-15T11:33:37.476857712Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Jul 15 11:33:37.479129 env[1203]: time="2025-07-15T11:33:37.476871448Z" level=info msg="metadata content store policy set" policy=shared Jul 15 11:33:37.481429 systemd[1]: Started update-engine.service. Jul 15 11:33:37.485177 systemd[1]: Started locksmithd.service. Jul 15 11:33:37.530882 locksmithd[1232]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Jul 15 11:33:37.543287 extend-filesystems[1183]: Resized partition /dev/vda9 Jul 15 11:33:37.722141 extend-filesystems[1240]: resize2fs 1.46.5 (30-Dec-2021) Jul 15 11:33:37.789781 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Jul 15 11:33:37.819767 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Jul 15 11:33:37.857740 extend-filesystems[1240]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Jul 15 11:33:37.857740 extend-filesystems[1240]: old_desc_blocks = 1, new_desc_blocks = 1 Jul 15 11:33:37.857740 extend-filesystems[1240]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Jul 15 11:33:37.862966 extend-filesystems[1183]: Resized filesystem in /dev/vda9 Jul 15 11:33:37.858814 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 15 11:33:37.864183 env[1203]: time="2025-07-15T11:33:37.858061743Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Jul 15 11:33:37.864183 env[1203]: time="2025-07-15T11:33:37.858180937Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Jul 15 11:33:37.864183 env[1203]: time="2025-07-15T11:33:37.858220821Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Jul 15 11:33:37.864183 env[1203]: time="2025-07-15T11:33:37.858281926Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Jul 15 11:33:37.864183 env[1203]: time="2025-07-15T11:33:37.858306642Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Jul 15 11:33:37.864183 env[1203]: time="2025-07-15T11:33:37.858320568Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Jul 15 11:33:37.864183 env[1203]: time="2025-07-15T11:33:37.858336919Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Jul 15 11:33:37.864183 env[1203]: time="2025-07-15T11:33:37.858354883Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Jul 15 11:33:37.864183 env[1203]: time="2025-07-15T11:33:37.858369029Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Jul 15 11:33:37.864183 env[1203]: time="2025-07-15T11:33:37.858380701Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Jul 15 11:33:37.864183 env[1203]: time="2025-07-15T11:33:37.858393545Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Jul 15 11:33:37.864183 env[1203]: time="2025-07-15T11:33:37.858405087Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Jul 15 11:33:37.864183 env[1203]: time="2025-07-15T11:33:37.858533758Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Jul 15 11:33:37.864183 env[1203]: time="2025-07-15T11:33:37.858613668Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Jul 15 11:33:37.858988 systemd[1]: Finished extend-filesystems.service. Jul 15 11:33:37.864745 env[1203]: time="2025-07-15T11:33:37.858858747Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Jul 15 11:33:37.864745 env[1203]: time="2025-07-15T11:33:37.858883664Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Jul 15 11:33:37.864745 env[1203]: time="2025-07-15T11:33:37.858901638Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Jul 15 11:33:37.864745 env[1203]: time="2025-07-15T11:33:37.858983191Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Jul 15 11:33:37.864745 env[1203]: time="2025-07-15T11:33:37.859008718Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Jul 15 11:33:37.864745 env[1203]: time="2025-07-15T11:33:37.859029417Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Jul 15 11:33:37.864745 env[1203]: time="2025-07-15T11:33:37.859174860Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Jul 15 11:33:37.864745 env[1203]: time="2025-07-15T11:33:37.859201941Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Jul 15 11:33:37.864745 env[1203]: time="2025-07-15T11:33:37.859218903Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Jul 15 11:33:37.864745 env[1203]: time="2025-07-15T11:33:37.859316155Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Jul 15 11:33:37.864745 env[1203]: time="2025-07-15T11:33:37.859341252Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Jul 15 11:33:37.864745 env[1203]: time="2025-07-15T11:33:37.859424197Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Jul 15 11:33:37.864745 env[1203]: time="2025-07-15T11:33:37.859585430Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Jul 15 11:33:37.864745 env[1203]: time="2025-07-15T11:33:37.859620596Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Jul 15 11:33:37.864745 env[1203]: time="2025-07-15T11:33:37.859641805Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Jul 15 11:33:37.865187 env[1203]: time="2025-07-15T11:33:37.859652565Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Jul 15 11:33:37.865187 env[1203]: time="2025-07-15T11:33:37.859672583Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Jul 15 11:33:37.865187 env[1203]: time="2025-07-15T11:33:37.859704302Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Jul 15 11:33:37.865187 env[1203]: time="2025-07-15T11:33:37.859748535Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Jul 15 11:33:37.865187 env[1203]: time="2025-07-15T11:33:37.859793720Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Jul 15 11:33:37.865301 bash[1228]: Updated "/home/core/.ssh/authorized_keys" Jul 15 11:33:37.865439 env[1203]: time="2025-07-15T11:33:37.860065109Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Jul 15 11:33:37.865439 env[1203]: time="2025-07-15T11:33:37.860172590Z" level=info msg="Connect containerd service" Jul 15 11:33:37.865439 env[1203]: time="2025-07-15T11:33:37.860246339Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Jul 15 11:33:37.867808 env[1203]: time="2025-07-15T11:33:37.867127228Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 15 11:33:37.867808 env[1203]: time="2025-07-15T11:33:37.867234128Z" level=info msg="Start subscribing containerd event" Jul 15 11:33:37.867808 env[1203]: time="2025-07-15T11:33:37.867276738Z" level=info msg="Start recovering state" Jul 15 11:33:37.867808 env[1203]: time="2025-07-15T11:33:37.867356468Z" level=info msg="Start event monitor" Jul 15 11:33:37.867808 env[1203]: time="2025-07-15T11:33:37.867563836Z" level=info msg="Start snapshots syncer" Jul 15 11:33:37.867808 env[1203]: time="2025-07-15T11:33:37.867584766Z" level=info msg="Start cni network conf syncer for default" Jul 15 11:33:37.867808 env[1203]: time="2025-07-15T11:33:37.867600655Z" level=info msg="Start streaming server" Jul 15 11:33:37.865474 systemd[1]: Finished update-ssh-keys-after-ignition.service. Jul 15 11:33:37.868657 env[1203]: time="2025-07-15T11:33:37.868579180Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Jul 15 11:33:37.868767 env[1203]: time="2025-07-15T11:33:37.868717549Z" level=info msg=serving... address=/run/containerd/containerd.sock Jul 15 11:33:37.868869 systemd[1]: Started containerd.service. Jul 15 11:33:37.873360 env[1203]: time="2025-07-15T11:33:37.873328283Z" level=info msg="containerd successfully booted in 0.425803s" Jul 15 11:33:38.379985 sshd_keygen[1201]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Jul 15 11:33:38.406965 systemd[1]: Finished sshd-keygen.service. Jul 15 11:33:38.410685 systemd[1]: Starting issuegen.service... Jul 15 11:33:38.418014 systemd[1]: issuegen.service: Deactivated successfully. Jul 15 11:33:38.418186 systemd[1]: Finished issuegen.service. Jul 15 11:33:38.421283 systemd[1]: Starting systemd-user-sessions.service... Jul 15 11:33:38.430254 systemd[1]: Finished systemd-user-sessions.service. Jul 15 11:33:38.433864 systemd[1]: Started getty@tty1.service. Jul 15 11:33:38.437426 systemd[1]: Started serial-getty@ttyS0.service. Jul 15 11:33:38.439052 systemd[1]: Reached target getty.target. Jul 15 11:33:38.844009 systemd[1]: Started kubelet.service. Jul 15 11:33:38.845317 systemd[1]: Reached target multi-user.target. Jul 15 11:33:38.847497 systemd[1]: Starting systemd-update-utmp-runlevel.service... Jul 15 11:33:38.854886 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 15 11:33:38.855057 systemd[1]: Finished systemd-update-utmp-runlevel.service. Jul 15 11:33:38.856229 systemd[1]: Startup finished in 599ms (kernel) + 4.257s (initrd) + 5.897s (userspace) = 10.754s. Jul 15 11:33:39.317035 kubelet[1259]: E0715 11:33:39.316932 1259 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 15 11:33:39.318644 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 15 11:33:39.318783 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 15 11:33:39.318987 systemd[1]: kubelet.service: Consumed 1.446s CPU time. Jul 15 11:33:41.682812 systemd[1]: Created slice system-sshd.slice. Jul 15 11:33:41.683835 systemd[1]: Started sshd@0-10.0.0.97:22-10.0.0.1:34090.service. Jul 15 11:33:41.727194 sshd[1268]: Accepted publickey for core from 10.0.0.1 port 34090 ssh2: RSA SHA256:UAnaMym03FNQ3Em4JmRfExsPnzWeaW932gzAKk7u+5w Jul 15 11:33:41.728612 sshd[1268]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 15 11:33:41.741144 systemd-logind[1190]: New session 1 of user core. Jul 15 11:33:41.742026 systemd[1]: Created slice user-500.slice. Jul 15 11:33:41.743059 systemd[1]: Starting user-runtime-dir@500.service... Jul 15 11:33:41.750657 systemd[1]: Finished user-runtime-dir@500.service. Jul 15 11:33:41.751821 systemd[1]: Starting user@500.service... Jul 15 11:33:41.754173 (systemd)[1271]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Jul 15 11:33:41.821404 systemd[1271]: Queued start job for default target default.target. Jul 15 11:33:41.821834 systemd[1271]: Reached target paths.target. Jul 15 11:33:41.821855 systemd[1271]: Reached target sockets.target. Jul 15 11:33:41.821868 systemd[1271]: Reached target timers.target. Jul 15 11:33:41.821880 systemd[1271]: Reached target basic.target. Jul 15 11:33:41.821913 systemd[1271]: Reached target default.target. Jul 15 11:33:41.821936 systemd[1271]: Startup finished in 62ms. Jul 15 11:33:41.822071 systemd[1]: Started user@500.service. Jul 15 11:33:41.823112 systemd[1]: Started session-1.scope. Jul 15 11:33:41.874170 systemd[1]: Started sshd@1-10.0.0.97:22-10.0.0.1:34102.service. Jul 15 11:33:41.914067 sshd[1280]: Accepted publickey for core from 10.0.0.1 port 34102 ssh2: RSA SHA256:UAnaMym03FNQ3Em4JmRfExsPnzWeaW932gzAKk7u+5w Jul 15 11:33:41.915284 sshd[1280]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 15 11:33:41.918621 systemd-logind[1190]: New session 2 of user core. Jul 15 11:33:41.919618 systemd[1]: Started session-2.scope. Jul 15 11:33:41.973200 sshd[1280]: pam_unix(sshd:session): session closed for user core Jul 15 11:33:41.976128 systemd[1]: sshd@1-10.0.0.97:22-10.0.0.1:34102.service: Deactivated successfully. Jul 15 11:33:41.976637 systemd[1]: session-2.scope: Deactivated successfully. Jul 15 11:33:41.977096 systemd-logind[1190]: Session 2 logged out. Waiting for processes to exit. Jul 15 11:33:41.978118 systemd[1]: Started sshd@2-10.0.0.97:22-10.0.0.1:34106.service. Jul 15 11:33:41.978685 systemd-logind[1190]: Removed session 2. Jul 15 11:33:42.018681 sshd[1286]: Accepted publickey for core from 10.0.0.1 port 34106 ssh2: RSA SHA256:UAnaMym03FNQ3Em4JmRfExsPnzWeaW932gzAKk7u+5w Jul 15 11:33:42.019979 sshd[1286]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 15 11:33:42.023645 systemd-logind[1190]: New session 3 of user core. Jul 15 11:33:42.024501 systemd[1]: Started session-3.scope. Jul 15 11:33:42.074975 sshd[1286]: pam_unix(sshd:session): session closed for user core Jul 15 11:33:42.078374 systemd[1]: sshd@2-10.0.0.97:22-10.0.0.1:34106.service: Deactivated successfully. Jul 15 11:33:42.079058 systemd[1]: session-3.scope: Deactivated successfully. Jul 15 11:33:42.079618 systemd-logind[1190]: Session 3 logged out. Waiting for processes to exit. Jul 15 11:33:42.080883 systemd[1]: Started sshd@3-10.0.0.97:22-10.0.0.1:34108.service. Jul 15 11:33:42.081556 systemd-logind[1190]: Removed session 3. Jul 15 11:33:42.121700 sshd[1292]: Accepted publickey for core from 10.0.0.1 port 34108 ssh2: RSA SHA256:UAnaMym03FNQ3Em4JmRfExsPnzWeaW932gzAKk7u+5w Jul 15 11:33:42.122821 sshd[1292]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 15 11:33:42.126150 systemd-logind[1190]: New session 4 of user core. Jul 15 11:33:42.126843 systemd[1]: Started session-4.scope. Jul 15 11:33:42.179439 sshd[1292]: pam_unix(sshd:session): session closed for user core Jul 15 11:33:42.181918 systemd[1]: sshd@3-10.0.0.97:22-10.0.0.1:34108.service: Deactivated successfully. Jul 15 11:33:42.182384 systemd[1]: session-4.scope: Deactivated successfully. Jul 15 11:33:42.182843 systemd-logind[1190]: Session 4 logged out. Waiting for processes to exit. Jul 15 11:33:42.183772 systemd[1]: Started sshd@4-10.0.0.97:22-10.0.0.1:34124.service. Jul 15 11:33:42.184391 systemd-logind[1190]: Removed session 4. Jul 15 11:33:42.224260 sshd[1298]: Accepted publickey for core from 10.0.0.1 port 34124 ssh2: RSA SHA256:UAnaMym03FNQ3Em4JmRfExsPnzWeaW932gzAKk7u+5w Jul 15 11:33:42.225582 sshd[1298]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 15 11:33:42.228789 systemd-logind[1190]: New session 5 of user core. Jul 15 11:33:42.229635 systemd[1]: Started session-5.scope. Jul 15 11:33:42.286552 sudo[1301]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Jul 15 11:33:42.286762 sudo[1301]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 15 11:33:42.295960 dbus-daemon[1181]: \xd0\xed\x88\u0014uU: received setenforce notice (enforcing=670972640) Jul 15 11:33:42.297909 sudo[1301]: pam_unix(sudo:session): session closed for user root Jul 15 11:33:42.299530 sshd[1298]: pam_unix(sshd:session): session closed for user core Jul 15 11:33:42.302135 systemd[1]: sshd@4-10.0.0.97:22-10.0.0.1:34124.service: Deactivated successfully. Jul 15 11:33:42.302644 systemd[1]: session-5.scope: Deactivated successfully. Jul 15 11:33:42.303206 systemd-logind[1190]: Session 5 logged out. Waiting for processes to exit. Jul 15 11:33:42.304221 systemd[1]: Started sshd@5-10.0.0.97:22-10.0.0.1:34128.service. Jul 15 11:33:42.304875 systemd-logind[1190]: Removed session 5. Jul 15 11:33:42.344953 sshd[1305]: Accepted publickey for core from 10.0.0.1 port 34128 ssh2: RSA SHA256:UAnaMym03FNQ3Em4JmRfExsPnzWeaW932gzAKk7u+5w Jul 15 11:33:42.346219 sshd[1305]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 15 11:33:42.349564 systemd-logind[1190]: New session 6 of user core. Jul 15 11:33:42.350277 systemd[1]: Started session-6.scope. Jul 15 11:33:42.404446 sudo[1309]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Jul 15 11:33:42.404693 sudo[1309]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 15 11:33:42.407065 sudo[1309]: pam_unix(sudo:session): session closed for user root Jul 15 11:33:42.411192 sudo[1308]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Jul 15 11:33:42.411381 sudo[1308]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 15 11:33:42.419516 systemd[1]: Stopping audit-rules.service... Jul 15 11:33:42.419000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 15 11:33:42.420880 auditctl[1312]: No rules Jul 15 11:33:42.421233 systemd[1]: audit-rules.service: Deactivated successfully. Jul 15 11:33:42.421387 systemd[1]: Stopped audit-rules.service. Jul 15 11:33:42.421543 kernel: kauditd_printk_skb: 225 callbacks suppressed Jul 15 11:33:42.421630 kernel: audit: type=1305 audit(1752579222.419:190): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 15 11:33:42.422766 systemd[1]: Starting audit-rules.service... Jul 15 11:33:42.419000 audit[1312]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe86787480 a2=420 a3=0 items=0 ppid=1 pid=1312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:42.427649 kernel: audit: type=1300 audit(1752579222.419:190): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe86787480 a2=420 a3=0 items=0 ppid=1 pid=1312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:42.429061 kernel: audit: type=1327 audit(1752579222.419:190): proctitle=2F7362696E2F617564697463746C002D44 Jul 15 11:33:42.419000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Jul 15 11:33:42.420000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:42.432127 kernel: audit: type=1131 audit(1752579222.420:191): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:42.442090 augenrules[1329]: No rules Jul 15 11:33:42.442825 systemd[1]: Finished audit-rules.service. Jul 15 11:33:42.441000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:42.443712 sudo[1308]: pam_unix(sudo:session): session closed for user root Jul 15 11:33:42.444893 sshd[1305]: pam_unix(sshd:session): session closed for user core Jul 15 11:33:42.443000 audit[1308]: USER_END pid=1308 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:33:42.447116 systemd[1]: sshd@5-10.0.0.97:22-10.0.0.1:34128.service: Deactivated successfully. Jul 15 11:33:42.447537 systemd[1]: session-6.scope: Deactivated successfully. Jul 15 11:33:42.447963 systemd-logind[1190]: Session 6 logged out. Waiting for processes to exit. Jul 15 11:33:42.448684 systemd[1]: Started sshd@6-10.0.0.97:22-10.0.0.1:34140.service. Jul 15 11:33:42.449401 systemd-logind[1190]: Removed session 6. Jul 15 11:33:42.450106 kernel: audit: type=1130 audit(1752579222.441:192): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:42.450146 kernel: audit: type=1106 audit(1752579222.443:193): pid=1308 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:33:42.443000 audit[1308]: CRED_DISP pid=1308 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:33:42.453347 kernel: audit: type=1104 audit(1752579222.443:194): pid=1308 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:33:42.453382 kernel: audit: type=1106 audit(1752579222.445:195): pid=1305 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:33:42.445000 audit[1305]: USER_END pid=1305 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:33:42.457618 kernel: audit: type=1104 audit(1752579222.445:196): pid=1305 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:33:42.445000 audit[1305]: CRED_DISP pid=1305 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:33:42.460985 kernel: audit: type=1131 audit(1752579222.446:197): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.97:22-10.0.0.1:34128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:42.446000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.97:22-10.0.0.1:34128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:42.448000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.97:22-10.0.0.1:34140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:42.489000 audit[1335]: USER_ACCT pid=1335 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:33:42.491620 sshd[1335]: Accepted publickey for core from 10.0.0.1 port 34140 ssh2: RSA SHA256:UAnaMym03FNQ3Em4JmRfExsPnzWeaW932gzAKk7u+5w Jul 15 11:33:42.490000 audit[1335]: CRED_ACQ pid=1335 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:33:42.490000 audit[1335]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe7cc1c980 a2=3 a3=0 items=0 ppid=1 pid=1335 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:42.490000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 15 11:33:42.492930 sshd[1335]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 15 11:33:42.496160 systemd-logind[1190]: New session 7 of user core. Jul 15 11:33:42.497004 systemd[1]: Started session-7.scope. Jul 15 11:33:42.498000 audit[1335]: USER_START pid=1335 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:33:42.499000 audit[1337]: CRED_ACQ pid=1337 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:33:42.547000 audit[1338]: USER_ACCT pid=1338 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:33:42.547000 audit[1338]: CRED_REFR pid=1338 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:33:42.549219 sudo[1338]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Jul 15 11:33:42.549450 sudo[1338]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 15 11:33:42.549000 audit[1338]: USER_START pid=1338 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:33:42.562112 systemd[1]: Starting coreos-metadata.service... Jul 15 11:33:42.570110 systemd[1]: coreos-metadata.service: Deactivated successfully. Jul 15 11:33:42.570243 systemd[1]: Finished coreos-metadata.service. Jul 15 11:33:42.569000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:42.569000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:43.384994 systemd[1]: Stopped kubelet.service. Jul 15 11:33:43.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:43.383000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:43.385218 systemd[1]: kubelet.service: Consumed 1.446s CPU time. Jul 15 11:33:43.387472 systemd[1]: Starting kubelet.service... Jul 15 11:33:43.410008 systemd[1]: Reloading. Jul 15 11:33:43.474890 /usr/lib/systemd/system-generators/torcx-generator[1397]: time="2025-07-15T11:33:43Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" Jul 15 11:33:43.474924 /usr/lib/systemd/system-generators/torcx-generator[1397]: time="2025-07-15T11:33:43Z" level=info msg="torcx already run" Jul 15 11:33:43.899220 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 15 11:33:43.899236 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 15 11:33:43.917356 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 15 11:33:43.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.975000 audit: BPF prog-id=43 op=LOAD Jul 15 11:33:43.975000 audit: BPF prog-id=27 op=UNLOAD Jul 15 11:33:43.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.976000 audit: BPF prog-id=44 op=LOAD Jul 15 11:33:43.976000 audit: BPF prog-id=41 op=UNLOAD Jul 15 11:33:43.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.977000 audit: BPF prog-id=45 op=LOAD Jul 15 11:33:43.977000 audit: BPF prog-id=36 op=UNLOAD Jul 15 11:33:43.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.979000 audit: BPF prog-id=46 op=LOAD Jul 15 11:33:43.979000 audit: BPF prog-id=38 op=UNLOAD Jul 15 11:33:43.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.979000 audit: BPF prog-id=47 op=LOAD Jul 15 11:33:43.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.979000 audit: BPF prog-id=48 op=LOAD Jul 15 11:33:43.979000 audit: BPF prog-id=39 op=UNLOAD Jul 15 11:33:43.979000 audit: BPF prog-id=40 op=UNLOAD Jul 15 11:33:43.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.980000 audit: BPF prog-id=49 op=LOAD Jul 15 11:33:43.980000 audit: BPF prog-id=37 op=UNLOAD Jul 15 11:33:43.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.980000 audit: BPF prog-id=50 op=LOAD Jul 15 11:33:43.980000 audit: BPF prog-id=28 op=UNLOAD Jul 15 11:33:43.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.980000 audit: BPF prog-id=51 op=LOAD Jul 15 11:33:43.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.980000 audit: BPF prog-id=52 op=LOAD Jul 15 11:33:43.980000 audit: BPF prog-id=29 op=UNLOAD Jul 15 11:33:43.980000 audit: BPF prog-id=30 op=UNLOAD Jul 15 11:33:43.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.981000 audit: BPF prog-id=53 op=LOAD Jul 15 11:33:43.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.981000 audit: BPF prog-id=54 op=LOAD Jul 15 11:33:43.981000 audit: BPF prog-id=31 op=UNLOAD Jul 15 11:33:43.981000 audit: BPF prog-id=32 op=UNLOAD Jul 15 11:33:43.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.982000 audit: BPF prog-id=55 op=LOAD Jul 15 11:33:43.982000 audit: BPF prog-id=33 op=UNLOAD Jul 15 11:33:43.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.982000 audit: BPF prog-id=56 op=LOAD Jul 15 11:33:43.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:43.982000 audit: BPF prog-id=57 op=LOAD Jul 15 11:33:43.982000 audit: BPF prog-id=34 op=UNLOAD Jul 15 11:33:43.982000 audit: BPF prog-id=35 op=UNLOAD Jul 15 11:33:43.992793 systemd[1]: Started kubelet.service. Jul 15 11:33:43.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:43.994079 systemd[1]: Stopping kubelet.service... Jul 15 11:33:43.994310 systemd[1]: kubelet.service: Deactivated successfully. Jul 15 11:33:43.994447 systemd[1]: Stopped kubelet.service. Jul 15 11:33:43.993000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:43.995590 systemd[1]: Starting kubelet.service... Jul 15 11:33:44.080273 systemd[1]: Started kubelet.service. Jul 15 11:33:44.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:44.118119 kubelet[1445]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 15 11:33:44.118119 kubelet[1445]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Jul 15 11:33:44.118119 kubelet[1445]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 15 11:33:44.118517 kubelet[1445]: I0715 11:33:44.118210 1445 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 15 11:33:44.422199 kubelet[1445]: I0715 11:33:44.422151 1445 server.go:520] "Kubelet version" kubeletVersion="v1.32.4" Jul 15 11:33:44.422199 kubelet[1445]: I0715 11:33:44.422182 1445 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 15 11:33:44.423760 kubelet[1445]: I0715 11:33:44.423732 1445 server.go:954] "Client rotation is on, will bootstrap in background" Jul 15 11:33:44.446011 kubelet[1445]: I0715 11:33:44.445968 1445 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 15 11:33:44.460336 kubelet[1445]: E0715 11:33:44.460281 1445 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Jul 15 11:33:44.460336 kubelet[1445]: I0715 11:33:44.460321 1445 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Jul 15 11:33:44.464703 kubelet[1445]: I0715 11:33:44.464647 1445 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 15 11:33:44.467478 kubelet[1445]: I0715 11:33:44.467409 1445 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 15 11:33:44.467676 kubelet[1445]: I0715 11:33:44.467467 1445 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.0.0.97","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Jul 15 11:33:44.467676 kubelet[1445]: I0715 11:33:44.467674 1445 topology_manager.go:138] "Creating topology manager with none policy" Jul 15 11:33:44.467861 kubelet[1445]: I0715 11:33:44.467683 1445 container_manager_linux.go:304] "Creating device plugin manager" Jul 15 11:33:44.467861 kubelet[1445]: I0715 11:33:44.467841 1445 state_mem.go:36] "Initialized new in-memory state store" Jul 15 11:33:44.470842 kubelet[1445]: I0715 11:33:44.470810 1445 kubelet.go:446] "Attempting to sync node with API server" Jul 15 11:33:44.470891 kubelet[1445]: I0715 11:33:44.470852 1445 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 15 11:33:44.470891 kubelet[1445]: I0715 11:33:44.470880 1445 kubelet.go:352] "Adding apiserver pod source" Jul 15 11:33:44.470935 kubelet[1445]: I0715 11:33:44.470893 1445 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 15 11:33:44.471116 kubelet[1445]: E0715 11:33:44.471079 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:44.471209 kubelet[1445]: E0715 11:33:44.471149 1445 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:44.474995 kubelet[1445]: I0715 11:33:44.474951 1445 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 15 11:33:44.475431 kubelet[1445]: I0715 11:33:44.475395 1445 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Jul 15 11:33:44.475955 kubelet[1445]: W0715 11:33:44.475926 1445 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Jul 15 11:33:44.476013 kubelet[1445]: W0715 11:33:44.475926 1445 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "10.0.0.97" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Jul 15 11:33:44.476013 kubelet[1445]: W0715 11:33:44.475927 1445 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Jul 15 11:33:44.476013 kubelet[1445]: E0715 11:33:44.475990 1445 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" Jul 15 11:33:44.476013 kubelet[1445]: E0715 11:33:44.476007 1445 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes \"10.0.0.97\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" Jul 15 11:33:44.481035 kubelet[1445]: I0715 11:33:44.480999 1445 watchdog_linux.go:99] "Systemd watchdog is not enabled" Jul 15 11:33:44.481035 kubelet[1445]: I0715 11:33:44.481038 1445 server.go:1287] "Started kubelet" Jul 15 11:33:44.490040 kubelet[1445]: I0715 11:33:44.490003 1445 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 Jul 15 11:33:44.490906 kubelet[1445]: I0715 11:33:44.490889 1445 server.go:479] "Adding debug handlers to kubelet server" Jul 15 11:33:44.490000 audit[1445]: AVC avc: denied { mac_admin } for pid=1445 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:44.490000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 15 11:33:44.490000 audit[1445]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c085a0 a1=c0001cfb18 a2=c000c08570 a3=25 items=0 ppid=1 pid=1445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:44.490000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 15 11:33:44.490000 audit[1445]: AVC avc: denied { mac_admin } for pid=1445 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:44.490000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 15 11:33:44.490000 audit[1445]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bbc900 a1=c0001cfb30 a2=c000c08630 a3=25 items=0 ppid=1 pid=1445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:44.490000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 15 11:33:44.493038 kubelet[1445]: I0715 11:33:44.492453 1445 kubelet.go:1507] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Jul 15 11:33:44.493038 kubelet[1445]: I0715 11:33:44.492527 1445 kubelet.go:1511] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Jul 15 11:33:44.493038 kubelet[1445]: I0715 11:33:44.492577 1445 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 15 11:33:44.494444 kubelet[1445]: I0715 11:33:44.494375 1445 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Jul 15 11:33:44.494623 kubelet[1445]: I0715 11:33:44.494608 1445 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 15 11:33:44.497491 kubelet[1445]: I0715 11:33:44.497471 1445 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Jul 15 11:33:44.498363 kubelet[1445]: E0715 11:33:44.498340 1445 kubelet.go:1555] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Jul 15 11:33:44.498840 kubelet[1445]: E0715 11:33:44.498822 1445 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.97\" not found" Jul 15 11:33:44.498906 kubelet[1445]: I0715 11:33:44.498885 1445 volume_manager.go:297] "Starting Kubelet Volume Manager" Jul 15 11:33:44.499093 kubelet[1445]: I0715 11:33:44.498902 1445 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Jul 15 11:33:44.499214 kubelet[1445]: I0715 11:33:44.499202 1445 reconciler.go:26] "Reconciler: start to sync state" Jul 15 11:33:44.501943 kubelet[1445]: I0715 11:33:44.501921 1445 factory.go:221] Registration of the systemd container factory successfully Jul 15 11:33:44.502046 kubelet[1445]: I0715 11:33:44.502028 1445 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Jul 15 11:33:44.504854 kubelet[1445]: I0715 11:33:44.504820 1445 factory.go:221] Registration of the containerd container factory successfully Jul 15 11:33:44.516948 kubelet[1445]: E0715 11:33:44.516888 1445 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.0.0.97\" not found" node="10.0.0.97" Jul 15 11:33:44.517228 kubelet[1445]: I0715 11:33:44.517211 1445 cpu_manager.go:221] "Starting CPU manager" policy="none" Jul 15 11:33:44.517228 kubelet[1445]: I0715 11:33:44.517225 1445 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Jul 15 11:33:44.517302 kubelet[1445]: I0715 11:33:44.517259 1445 state_mem.go:36] "Initialized new in-memory state store" Jul 15 11:33:44.527000 audit[1460]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1460 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:44.527000 audit[1460]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff3ec0ee90 a2=0 a3=7fff3ec0ee7c items=0 ppid=1445 pid=1460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:44.527000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 15 11:33:44.528000 audit[1466]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1466 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:44.528000 audit[1466]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffe49a53e60 a2=0 a3=7ffe49a53e4c items=0 ppid=1445 pid=1466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:44.528000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 15 11:33:44.599895 kubelet[1445]: E0715 11:33:44.599846 1445 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.97\" not found" Jul 15 11:33:44.700744 kubelet[1445]: E0715 11:33:44.700618 1445 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.97\" not found" Jul 15 11:33:44.801662 kubelet[1445]: E0715 11:33:44.801617 1445 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.97\" not found" Jul 15 11:33:44.902193 kubelet[1445]: E0715 11:33:44.902141 1445 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.97\" not found" Jul 15 11:33:45.003126 kubelet[1445]: E0715 11:33:45.002992 1445 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.97\" not found" Jul 15 11:33:45.104003 kubelet[1445]: E0715 11:33:45.103956 1445 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.97\" not found" Jul 15 11:33:44.530000 audit[1468]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1468 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:44.530000 audit[1468]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe1f3f2470 a2=0 a3=7ffe1f3f245c items=0 ppid=1445 pid=1468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:44.530000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 15 11:33:45.193000 audit[1474]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1474 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:45.193000 audit[1474]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffebd128710 a2=0 a3=7ffebd1286fc items=0 ppid=1445 pid=1474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:45.193000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 15 11:33:45.204957 kubelet[1445]: E0715 11:33:45.204923 1445 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.97\" not found" Jul 15 11:33:45.227000 audit[1479]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1479 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:45.227000 audit[1479]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffc2e3263d0 a2=0 a3=7ffc2e3263bc items=0 ppid=1445 pid=1479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:45.227000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Jul 15 11:33:45.229261 kubelet[1445]: I0715 11:33:45.229208 1445 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Jul 15 11:33:45.228000 audit[1480]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1480 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:45.228000 audit[1480]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd84400060 a2=0 a3=7ffd8440004c items=0 ppid=1445 pid=1480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:45.228000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 15 11:33:45.230201 kubelet[1445]: I0715 11:33:45.230114 1445 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Jul 15 11:33:45.230201 kubelet[1445]: I0715 11:33:45.230166 1445 status_manager.go:227] "Starting to sync pod status with apiserver" Jul 15 11:33:45.230280 kubelet[1445]: I0715 11:33:45.230223 1445 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Jul 15 11:33:45.230280 kubelet[1445]: I0715 11:33:45.230233 1445 kubelet.go:2382] "Starting kubelet main sync loop" Jul 15 11:33:45.230427 kubelet[1445]: E0715 11:33:45.230399 1445 kubelet.go:2406] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Jul 15 11:33:45.228000 audit[1481]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1481 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:45.228000 audit[1481]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff5918a040 a2=0 a3=7fff5918a02c items=0 ppid=1445 pid=1481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:45.228000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 15 11:33:45.229000 audit[1483]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=1483 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:45.229000 audit[1483]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc94b1c9d0 a2=0 a3=7ffc94b1c9bc items=0 ppid=1445 pid=1483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:45.229000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 15 11:33:45.229000 audit[1482]: NETFILTER_CFG table=mangle:10 family=10 entries=1 op=nft_register_chain pid=1482 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:45.229000 audit[1482]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd39dbd640 a2=0 a3=7ffd39dbd62c items=0 ppid=1445 pid=1482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:45.229000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 15 11:33:45.230000 audit[1484]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1484 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:45.230000 audit[1484]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd3a618e00 a2=0 a3=7ffd3a618dec items=0 ppid=1445 pid=1484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:45.230000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 15 11:33:45.230000 audit[1485]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1485 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:45.230000 audit[1485]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd464fe7a0 a2=0 a3=7ffd464fe78c items=0 ppid=1445 pid=1485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:45.230000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 15 11:33:45.231000 audit[1486]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1486 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:45.231000 audit[1486]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff1a14bae0 a2=0 a3=7fff1a14bacc items=0 ppid=1445 pid=1486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:45.231000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 15 11:33:45.252621 kubelet[1445]: I0715 11:33:45.252582 1445 policy_none.go:49] "None policy: Start" Jul 15 11:33:45.252621 kubelet[1445]: I0715 11:33:45.252606 1445 memory_manager.go:186] "Starting memorymanager" policy="None" Jul 15 11:33:45.252621 kubelet[1445]: I0715 11:33:45.252616 1445 state_mem.go:35] "Initializing new in-memory state store" Jul 15 11:33:45.305529 kubelet[1445]: E0715 11:33:45.305418 1445 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.97\" not found" Jul 15 11:33:45.330914 kubelet[1445]: E0715 11:33:45.330859 1445 kubelet.go:2406] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Jul 15 11:33:45.348815 systemd[1]: Created slice kubepods.slice. Jul 15 11:33:45.352566 systemd[1]: Created slice kubepods-burstable.slice. Jul 15 11:33:45.354942 systemd[1]: Created slice kubepods-besteffort.slice. Jul 15 11:33:45.368341 kubelet[1445]: I0715 11:33:45.368304 1445 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Jul 15 11:33:45.367000 audit[1445]: AVC avc: denied { mac_admin } for pid=1445 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:45.367000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 15 11:33:45.367000 audit[1445]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0003e98c0 a1=c0009693e0 a2=c0003e9860 a3=25 items=0 ppid=1 pid=1445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:45.367000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 15 11:33:45.368607 kubelet[1445]: I0715 11:33:45.368386 1445 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" Jul 15 11:33:45.368607 kubelet[1445]: I0715 11:33:45.368508 1445 eviction_manager.go:189] "Eviction manager: starting control loop" Jul 15 11:33:45.368607 kubelet[1445]: I0715 11:33:45.368518 1445 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Jul 15 11:33:45.369229 kubelet[1445]: I0715 11:33:45.368772 1445 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 15 11:33:45.369274 kubelet[1445]: E0715 11:33:45.369235 1445 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Jul 15 11:33:45.369274 kubelet[1445]: E0715 11:33:45.369262 1445 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.97\" not found" Jul 15 11:33:45.425634 kubelet[1445]: I0715 11:33:45.425584 1445 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Jul 15 11:33:45.425845 kubelet[1445]: W0715 11:33:45.425777 1445 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Jul 15 11:33:45.425845 kubelet[1445]: W0715 11:33:45.425812 1445 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Jul 15 11:33:45.470180 kubelet[1445]: I0715 11:33:45.470143 1445 kubelet_node_status.go:75] "Attempting to register node" node="10.0.0.97" Jul 15 11:33:45.471583 kubelet[1445]: E0715 11:33:45.471529 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:45.480420 kubelet[1445]: I0715 11:33:45.480384 1445 kubelet_node_status.go:78] "Successfully registered node" node="10.0.0.97" Jul 15 11:33:45.480420 kubelet[1445]: E0715 11:33:45.480419 1445 kubelet_node_status.go:548] "Error updating node status, will retry" err="error getting node \"10.0.0.97\": node \"10.0.0.97\" not found" Jul 15 11:33:45.521064 kubelet[1445]: E0715 11:33:45.521018 1445 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.97\" not found" Jul 15 11:33:45.604293 sudo[1338]: pam_unix(sudo:session): session closed for user root Jul 15 11:33:45.603000 audit[1338]: USER_END pid=1338 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:33:45.603000 audit[1338]: CRED_DISP pid=1338 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:33:45.605608 sshd[1335]: pam_unix(sshd:session): session closed for user core Jul 15 11:33:45.605000 audit[1335]: USER_END pid=1335 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:33:45.605000 audit[1335]: CRED_DISP pid=1335 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:33:45.607704 systemd[1]: sshd@6-10.0.0.97:22-10.0.0.1:34140.service: Deactivated successfully. Jul 15 11:33:45.607000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.97:22-10.0.0.1:34140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:33:45.608472 systemd[1]: session-7.scope: Deactivated successfully. Jul 15 11:33:45.609180 systemd-logind[1190]: Session 7 logged out. Waiting for processes to exit. Jul 15 11:33:45.609929 systemd-logind[1190]: Removed session 7. Jul 15 11:33:45.621392 kubelet[1445]: E0715 11:33:45.621344 1445 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"10.0.0.97\" not found" Jul 15 11:33:45.722640 kubelet[1445]: I0715 11:33:45.722606 1445 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Jul 15 11:33:45.723095 env[1203]: time="2025-07-15T11:33:45.723042291Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Jul 15 11:33:45.723416 kubelet[1445]: I0715 11:33:45.723262 1445 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Jul 15 11:33:46.472089 kubelet[1445]: E0715 11:33:46.472063 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:46.472438 kubelet[1445]: I0715 11:33:46.472091 1445 apiserver.go:52] "Watching apiserver" Jul 15 11:33:46.475229 kubelet[1445]: E0715 11:33:46.475198 1445 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8hg42" podUID="d9742bb2-a259-4759-a746-30d9f682ecb8" Jul 15 11:33:46.478702 systemd[1]: Created slice kubepods-besteffort-podc4457746_4fff_4e49_8d6b_fecd02a8b5c5.slice. Jul 15 11:33:46.494870 systemd[1]: Created slice kubepods-besteffort-pod016a27cb_6865_448b_a50c_5b7894dd0b61.slice. Jul 15 11:33:46.500480 kubelet[1445]: I0715 11:33:46.500447 1445 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Jul 15 11:33:46.511447 kubelet[1445]: I0715 11:33:46.511426 1445 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/016a27cb-6865-448b-a50c-5b7894dd0b61-cni-bin-dir\") pod \"calico-node-stlwr\" (UID: \"016a27cb-6865-448b-a50c-5b7894dd0b61\") " pod="calico-system/calico-node-stlwr" Jul 15 11:33:46.511534 kubelet[1445]: I0715 11:33:46.511452 1445 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/016a27cb-6865-448b-a50c-5b7894dd0b61-cni-net-dir\") pod \"calico-node-stlwr\" (UID: \"016a27cb-6865-448b-a50c-5b7894dd0b61\") " pod="calico-system/calico-node-stlwr" Jul 15 11:33:46.511534 kubelet[1445]: I0715 11:33:46.511468 1445 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/016a27cb-6865-448b-a50c-5b7894dd0b61-flexvol-driver-host\") pod \"calico-node-stlwr\" (UID: \"016a27cb-6865-448b-a50c-5b7894dd0b61\") " pod="calico-system/calico-node-stlwr" Jul 15 11:33:46.511534 kubelet[1445]: I0715 11:33:46.511484 1445 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/016a27cb-6865-448b-a50c-5b7894dd0b61-lib-modules\") pod \"calico-node-stlwr\" (UID: \"016a27cb-6865-448b-a50c-5b7894dd0b61\") " pod="calico-system/calico-node-stlwr" Jul 15 11:33:46.511534 kubelet[1445]: I0715 11:33:46.511499 1445 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/016a27cb-6865-448b-a50c-5b7894dd0b61-node-certs\") pod \"calico-node-stlwr\" (UID: \"016a27cb-6865-448b-a50c-5b7894dd0b61\") " pod="calico-system/calico-node-stlwr" Jul 15 11:33:46.511534 kubelet[1445]: I0715 11:33:46.511515 1445 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-s7nrs\" (UniqueName: \"kubernetes.io/projected/016a27cb-6865-448b-a50c-5b7894dd0b61-kube-api-access-s7nrs\") pod \"calico-node-stlwr\" (UID: \"016a27cb-6865-448b-a50c-5b7894dd0b61\") " pod="calico-system/calico-node-stlwr" Jul 15 11:33:46.511686 kubelet[1445]: I0715 11:33:46.511532 1445 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/c4457746-4fff-4e49-8d6b-fecd02a8b5c5-xtables-lock\") pod \"kube-proxy-s26z6\" (UID: \"c4457746-4fff-4e49-8d6b-fecd02a8b5c5\") " pod="kube-system/kube-proxy-s26z6" Jul 15 11:33:46.511686 kubelet[1445]: I0715 11:33:46.511551 1445 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/016a27cb-6865-448b-a50c-5b7894dd0b61-cni-log-dir\") pod \"calico-node-stlwr\" (UID: \"016a27cb-6865-448b-a50c-5b7894dd0b61\") " pod="calico-system/calico-node-stlwr" Jul 15 11:33:46.511686 kubelet[1445]: I0715 11:33:46.511592 1445 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/016a27cb-6865-448b-a50c-5b7894dd0b61-tigera-ca-bundle\") pod \"calico-node-stlwr\" (UID: \"016a27cb-6865-448b-a50c-5b7894dd0b61\") " pod="calico-system/calico-node-stlwr" Jul 15 11:33:46.511686 kubelet[1445]: I0715 11:33:46.511622 1445 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/016a27cb-6865-448b-a50c-5b7894dd0b61-var-lib-calico\") pod \"calico-node-stlwr\" (UID: \"016a27cb-6865-448b-a50c-5b7894dd0b61\") " pod="calico-system/calico-node-stlwr" Jul 15 11:33:46.511686 kubelet[1445]: I0715 11:33:46.511639 1445 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/d9742bb2-a259-4759-a746-30d9f682ecb8-socket-dir\") pod \"csi-node-driver-8hg42\" (UID: \"d9742bb2-a259-4759-a746-30d9f682ecb8\") " pod="calico-system/csi-node-driver-8hg42" Jul 15 11:33:46.511859 kubelet[1445]: I0715 11:33:46.511658 1445 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/d9742bb2-a259-4759-a746-30d9f682ecb8-varrun\") pod \"csi-node-driver-8hg42\" (UID: \"d9742bb2-a259-4759-a746-30d9f682ecb8\") " pod="calico-system/csi-node-driver-8hg42" Jul 15 11:33:46.511859 kubelet[1445]: I0715 11:33:46.511693 1445 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-s7f6d\" (UniqueName: \"kubernetes.io/projected/d9742bb2-a259-4759-a746-30d9f682ecb8-kube-api-access-s7f6d\") pod \"csi-node-driver-8hg42\" (UID: \"d9742bb2-a259-4759-a746-30d9f682ecb8\") " pod="calico-system/csi-node-driver-8hg42" Jul 15 11:33:46.511859 kubelet[1445]: I0715 11:33:46.511738 1445 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/c4457746-4fff-4e49-8d6b-fecd02a8b5c5-kube-proxy\") pod \"kube-proxy-s26z6\" (UID: \"c4457746-4fff-4e49-8d6b-fecd02a8b5c5\") " pod="kube-system/kube-proxy-s26z6" Jul 15 11:33:46.511859 kubelet[1445]: I0715 11:33:46.511761 1445 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/016a27cb-6865-448b-a50c-5b7894dd0b61-policysync\") pod \"calico-node-stlwr\" (UID: \"016a27cb-6865-448b-a50c-5b7894dd0b61\") " pod="calico-system/calico-node-stlwr" Jul 15 11:33:46.511859 kubelet[1445]: I0715 11:33:46.511781 1445 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/016a27cb-6865-448b-a50c-5b7894dd0b61-var-run-calico\") pod \"calico-node-stlwr\" (UID: \"016a27cb-6865-448b-a50c-5b7894dd0b61\") " pod="calico-system/calico-node-stlwr" Jul 15 11:33:46.511991 kubelet[1445]: I0715 11:33:46.511800 1445 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/016a27cb-6865-448b-a50c-5b7894dd0b61-xtables-lock\") pod \"calico-node-stlwr\" (UID: \"016a27cb-6865-448b-a50c-5b7894dd0b61\") " pod="calico-system/calico-node-stlwr" Jul 15 11:33:46.511991 kubelet[1445]: I0715 11:33:46.511814 1445 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/d9742bb2-a259-4759-a746-30d9f682ecb8-kubelet-dir\") pod \"csi-node-driver-8hg42\" (UID: \"d9742bb2-a259-4759-a746-30d9f682ecb8\") " pod="calico-system/csi-node-driver-8hg42" Jul 15 11:33:46.511991 kubelet[1445]: I0715 11:33:46.511829 1445 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/d9742bb2-a259-4759-a746-30d9f682ecb8-registration-dir\") pod \"csi-node-driver-8hg42\" (UID: \"d9742bb2-a259-4759-a746-30d9f682ecb8\") " pod="calico-system/csi-node-driver-8hg42" Jul 15 11:33:46.511991 kubelet[1445]: I0715 11:33:46.511847 1445 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/c4457746-4fff-4e49-8d6b-fecd02a8b5c5-lib-modules\") pod \"kube-proxy-s26z6\" (UID: \"c4457746-4fff-4e49-8d6b-fecd02a8b5c5\") " pod="kube-system/kube-proxy-s26z6" Jul 15 11:33:46.511991 kubelet[1445]: I0715 11:33:46.511867 1445 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jh7ns\" (UniqueName: \"kubernetes.io/projected/c4457746-4fff-4e49-8d6b-fecd02a8b5c5-kube-api-access-jh7ns\") pod \"kube-proxy-s26z6\" (UID: \"c4457746-4fff-4e49-8d6b-fecd02a8b5c5\") " pod="kube-system/kube-proxy-s26z6" Jul 15 11:33:46.612651 kubelet[1445]: I0715 11:33:46.612599 1445 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Jul 15 11:33:46.615223 kubelet[1445]: E0715 11:33:46.615194 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:46.615223 kubelet[1445]: W0715 11:33:46.615208 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:46.615223 kubelet[1445]: E0715 11:33:46.615227 1445 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:46.619535 kubelet[1445]: E0715 11:33:46.619510 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:46.619535 kubelet[1445]: W0715 11:33:46.619526 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:46.619535 kubelet[1445]: E0715 11:33:46.619539 1445 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:46.621348 kubelet[1445]: E0715 11:33:46.621327 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:46.621348 kubelet[1445]: W0715 11:33:46.621341 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:46.621469 kubelet[1445]: E0715 11:33:46.621355 1445 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:46.621528 kubelet[1445]: E0715 11:33:46.621514 1445 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 15 11:33:46.621528 kubelet[1445]: W0715 11:33:46.621525 1445 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 15 11:33:46.621583 kubelet[1445]: E0715 11:33:46.621535 1445 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 15 11:33:46.793485 kubelet[1445]: E0715 11:33:46.793370 1445 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 15 11:33:46.794060 env[1203]: time="2025-07-15T11:33:46.794005288Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-s26z6,Uid:c4457746-4fff-4e49-8d6b-fecd02a8b5c5,Namespace:kube-system,Attempt:0,}" Jul 15 11:33:46.797114 env[1203]: time="2025-07-15T11:33:46.797077659Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-stlwr,Uid:016a27cb-6865-448b-a50c-5b7894dd0b61,Namespace:calico-system,Attempt:0,}" Jul 15 11:33:47.473480 kubelet[1445]: E0715 11:33:47.473435 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:48.009991 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2518560323.mount: Deactivated successfully. Jul 15 11:33:48.017337 env[1203]: time="2025-07-15T11:33:48.017284808Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:48.019922 env[1203]: time="2025-07-15T11:33:48.019895334Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:48.020989 env[1203]: time="2025-07-15T11:33:48.020967706Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:48.021744 env[1203]: time="2025-07-15T11:33:48.021696426Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:48.024089 env[1203]: time="2025-07-15T11:33:48.024061681Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:48.025403 env[1203]: time="2025-07-15T11:33:48.025369836Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:48.027961 env[1203]: time="2025-07-15T11:33:48.027920775Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:48.033250 env[1203]: time="2025-07-15T11:33:48.033218434Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:48.052057 env[1203]: time="2025-07-15T11:33:48.051968542Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 15 11:33:48.052057 env[1203]: time="2025-07-15T11:33:48.052011211Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 15 11:33:48.052057 env[1203]: time="2025-07-15T11:33:48.052022022Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 15 11:33:48.052256 env[1203]: time="2025-07-15T11:33:48.052168026Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3522cef795436f42dba5566eb1921543edf5c15cfba8c7c0c1a03d3ab570706b pid=1506 runtime=io.containerd.runc.v2 Jul 15 11:33:48.063426 env[1203]: time="2025-07-15T11:33:48.063253989Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 15 11:33:48.063426 env[1203]: time="2025-07-15T11:33:48.063294993Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 15 11:33:48.063426 env[1203]: time="2025-07-15T11:33:48.063307984Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 15 11:33:48.063794 env[1203]: time="2025-07-15T11:33:48.063733984Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/47606c5724cacce9eea3994ba08d7cc6e47158eb6475daea79a6ec509b8252d4 pid=1524 runtime=io.containerd.runc.v2 Jul 15 11:33:48.067835 systemd[1]: Started cri-containerd-3522cef795436f42dba5566eb1921543edf5c15cfba8c7c0c1a03d3ab570706b.scope. Jul 15 11:33:48.080478 systemd[1]: Started cri-containerd-47606c5724cacce9eea3994ba08d7cc6e47158eb6475daea79a6ec509b8252d4.scope. Jul 15 11:33:48.092837 kernel: kauditd_printk_skb: 243 callbacks suppressed Jul 15 11:33:48.092973 kernel: audit: type=1400 audit(1752579228.088:406): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.102764 kernel: audit: type=1400 audit(1752579228.088:407): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.102808 kernel: audit: type=1400 audit(1752579228.088:408): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.102826 kernel: audit: type=1400 audit(1752579228.088:409): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.106556 kernel: audit: type=1400 audit(1752579228.088:410): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.106788 kernel: audit: type=1400 audit(1752579228.088:411): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.113432 kernel: audit: type=1400 audit(1752579228.088:412): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.117050 kernel: audit: type=1400 audit(1752579228.088:413): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.117089 kernel: audit: type=1400 audit(1752579228.088:414): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.120227 kernel: audit: type=1400 audit(1752579228.092:415): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.092000 audit: BPF prog-id=58 op=LOAD Jul 15 11:33:48.092000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.092000 audit[1517]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=1506 pid=1517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:48.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335323263656637393534333666343264626135353636656231393231 Jul 15 11:33:48.092000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.092000 audit[1517]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=1506 pid=1517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:48.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335323263656637393534333666343264626135353636656231393231 Jul 15 11:33:48.092000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.092000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.092000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.092000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.092000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.092000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.092000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.092000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.092000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.092000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.092000 audit: BPF prog-id=59 op=LOAD Jul 15 11:33:48.092000 audit[1517]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0000256d0 items=0 ppid=1506 pid=1517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:48.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335323263656637393534333666343264626135353636656231393231 Jul 15 11:33:48.143000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.143000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.143000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.143000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.143000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.143000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.143000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.143000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.143000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.143000 audit: BPF prog-id=60 op=LOAD Jul 15 11:33:48.143000 audit[1517]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000025718 items=0 ppid=1506 pid=1517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:48.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335323263656637393534333666343264626135353636656231393231 Jul 15 11:33:48.143000 audit: BPF prog-id=60 op=UNLOAD Jul 15 11:33:48.143000 audit: BPF prog-id=59 op=UNLOAD Jul 15 11:33:48.143000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.143000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.143000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.143000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.143000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.143000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.143000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.143000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.143000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.143000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.143000 audit: BPF prog-id=61 op=LOAD Jul 15 11:33:48.143000 audit[1517]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000025b28 items=0 ppid=1506 pid=1517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:48.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335323263656637393534333666343264626135353636656231393231 Jul 15 11:33:48.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.156000 audit: BPF prog-id=62 op=LOAD Jul 15 11:33:48.156000 audit[1543]: AVC avc: denied { bpf } for pid=1543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.156000 audit[1543]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1524 pid=1543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:48.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437363036633537323463616363653965656133393934626130386437 Jul 15 11:33:48.156000 audit[1543]: AVC avc: denied { perfmon } for pid=1543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.156000 audit[1543]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1524 pid=1543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:48.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437363036633537323463616363653965656133393934626130386437 Jul 15 11:33:48.156000 audit[1543]: AVC avc: denied { bpf } for pid=1543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.156000 audit[1543]: AVC avc: denied { bpf } for pid=1543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.156000 audit[1543]: AVC avc: denied { bpf } for pid=1543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.156000 audit[1543]: AVC avc: denied { perfmon } for pid=1543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.156000 audit[1543]: AVC avc: denied { perfmon } for pid=1543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.156000 audit[1543]: AVC avc: denied { perfmon } for pid=1543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.156000 audit[1543]: AVC avc: denied { perfmon } for pid=1543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.156000 audit[1543]: AVC avc: denied { perfmon } for pid=1543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.156000 audit[1543]: AVC avc: denied { bpf } for pid=1543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.156000 audit[1543]: AVC avc: denied { bpf } for pid=1543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.156000 audit: BPF prog-id=63 op=LOAD Jul 15 11:33:48.156000 audit[1543]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000220cb0 items=0 ppid=1524 pid=1543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:48.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437363036633537323463616363653965656133393934626130386437 Jul 15 11:33:48.156000 audit[1543]: AVC avc: denied { bpf } for pid=1543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.156000 audit[1543]: AVC avc: denied { bpf } for pid=1543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.156000 audit[1543]: AVC avc: denied { perfmon } for pid=1543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.156000 audit[1543]: AVC avc: denied { perfmon } for pid=1543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.156000 audit[1543]: AVC avc: denied { perfmon } for pid=1543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.156000 audit[1543]: AVC avc: denied { perfmon } for pid=1543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.156000 audit[1543]: AVC avc: denied { perfmon } for pid=1543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.156000 audit[1543]: AVC avc: denied { bpf } for pid=1543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.156000 audit[1543]: AVC avc: denied { bpf } for pid=1543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.156000 audit: BPF prog-id=64 op=LOAD Jul 15 11:33:48.156000 audit[1543]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000220cf8 items=0 ppid=1524 pid=1543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:48.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437363036633537323463616363653965656133393934626130386437 Jul 15 11:33:48.156000 audit: BPF prog-id=64 op=UNLOAD Jul 15 11:33:48.157000 audit: BPF prog-id=63 op=UNLOAD Jul 15 11:33:48.157000 audit[1543]: AVC avc: denied { bpf } for pid=1543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.157000 audit[1543]: AVC avc: denied { bpf } for pid=1543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.157000 audit[1543]: AVC avc: denied { bpf } for pid=1543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.157000 audit[1543]: AVC avc: denied { perfmon } for pid=1543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.157000 audit[1543]: AVC avc: denied { perfmon } for pid=1543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.157000 audit[1543]: AVC avc: denied { perfmon } for pid=1543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.157000 audit[1543]: AVC avc: denied { perfmon } for pid=1543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.157000 audit[1543]: AVC avc: denied { perfmon } for pid=1543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.157000 audit[1543]: AVC avc: denied { bpf } for pid=1543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.157000 audit[1543]: AVC avc: denied { bpf } for pid=1543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:48.157000 audit: BPF prog-id=65 op=LOAD Jul 15 11:33:48.157000 audit[1543]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000221108 items=0 ppid=1524 pid=1543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:48.157000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437363036633537323463616363653965656133393934626130386437 Jul 15 11:33:48.161214 env[1203]: time="2025-07-15T11:33:48.161173932Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-stlwr,Uid:016a27cb-6865-448b-a50c-5b7894dd0b61,Namespace:calico-system,Attempt:0,} returns sandbox id \"3522cef795436f42dba5566eb1921543edf5c15cfba8c7c0c1a03d3ab570706b\"" Jul 15 11:33:48.163342 env[1203]: time="2025-07-15T11:33:48.163308107Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2\"" Jul 15 11:33:48.168234 env[1203]: time="2025-07-15T11:33:48.168199762Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-s26z6,Uid:c4457746-4fff-4e49-8d6b-fecd02a8b5c5,Namespace:kube-system,Attempt:0,} returns sandbox id \"47606c5724cacce9eea3994ba08d7cc6e47158eb6475daea79a6ec509b8252d4\"" Jul 15 11:33:48.168819 kubelet[1445]: E0715 11:33:48.168797 1445 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 15 11:33:48.231358 kubelet[1445]: E0715 11:33:48.231333 1445 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8hg42" podUID="d9742bb2-a259-4759-a746-30d9f682ecb8" Jul 15 11:33:48.473959 kubelet[1445]: E0715 11:33:48.473860 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:49.420253 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3696421959.mount: Deactivated successfully. Jul 15 11:33:49.474714 kubelet[1445]: E0715 11:33:49.474671 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:49.665395 env[1203]: time="2025-07-15T11:33:49.665324701Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:49.667132 env[1203]: time="2025-07-15T11:33:49.667098533Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:639615519fa6f7bc4b4756066ba9780068fd291eacc36c120f6c555e62f2b00e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:49.668677 env[1203]: time="2025-07-15T11:33:49.668626384Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:49.669996 env[1203]: time="2025-07-15T11:33:49.669967039Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:972be127eaecd7d1a2d5393b8d14f1ae8f88550bee83e0519e9590c7e15eb41b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:49.670412 env[1203]: time="2025-07-15T11:33:49.670333786Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2\" returns image reference \"sha256:639615519fa6f7bc4b4756066ba9780068fd291eacc36c120f6c555e62f2b00e\"" Jul 15 11:33:49.671535 env[1203]: time="2025-07-15T11:33:49.671504097Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.6\"" Jul 15 11:33:49.673474 env[1203]: time="2025-07-15T11:33:49.673454798Z" level=info msg="CreateContainer within sandbox \"3522cef795436f42dba5566eb1921543edf5c15cfba8c7c0c1a03d3ab570706b\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Jul 15 11:33:49.687770 env[1203]: time="2025-07-15T11:33:49.687725091Z" level=info msg="CreateContainer within sandbox \"3522cef795436f42dba5566eb1921543edf5c15cfba8c7c0c1a03d3ab570706b\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"2a91db81e5a4f4638c38e38c00dd180d3b630884b62c38ab98947f91ba93dcf9\"" Jul 15 11:33:49.688224 env[1203]: time="2025-07-15T11:33:49.688200967Z" level=info msg="StartContainer for \"2a91db81e5a4f4638c38e38c00dd180d3b630884b62c38ab98947f91ba93dcf9\"" Jul 15 11:33:49.702212 systemd[1]: Started cri-containerd-2a91db81e5a4f4638c38e38c00dd180d3b630884b62c38ab98947f91ba93dcf9.scope. Jul 15 11:33:49.714000 audit[1586]: AVC avc: denied { perfmon } for pid=1586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:49.714000 audit[1586]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f88e46791e8 items=0 ppid=1506 pid=1586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:49.714000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261393164623831653561346634363338633338653338633030646431 Jul 15 11:33:49.714000 audit[1586]: AVC avc: denied { bpf } for pid=1586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:49.714000 audit[1586]: AVC avc: denied { bpf } for pid=1586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:49.714000 audit[1586]: AVC avc: denied { bpf } for pid=1586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:49.714000 audit[1586]: AVC avc: denied { perfmon } for pid=1586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:49.714000 audit[1586]: AVC avc: denied { perfmon } for pid=1586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:49.714000 audit[1586]: AVC avc: denied { perfmon } for pid=1586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:49.714000 audit[1586]: AVC avc: denied { perfmon } for pid=1586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:49.714000 audit[1586]: AVC avc: denied { perfmon } for pid=1586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:49.714000 audit[1586]: AVC avc: denied { bpf } for pid=1586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:49.714000 audit[1586]: AVC avc: denied { bpf } for pid=1586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:49.714000 audit: BPF prog-id=66 op=LOAD Jul 15 11:33:49.714000 audit[1586]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00026df58 items=0 ppid=1506 pid=1586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:49.714000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261393164623831653561346634363338633338653338633030646431 Jul 15 11:33:49.714000 audit[1586]: AVC avc: denied { bpf } for pid=1586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:49.714000 audit[1586]: AVC avc: denied { bpf } for pid=1586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:49.714000 audit[1586]: AVC avc: denied { perfmon } for pid=1586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:49.714000 audit[1586]: AVC avc: denied { perfmon } for pid=1586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:49.714000 audit[1586]: AVC avc: denied { perfmon } for pid=1586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:49.714000 audit[1586]: AVC avc: denied { perfmon } for pid=1586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:49.714000 audit[1586]: AVC avc: denied { perfmon } for pid=1586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:49.714000 audit[1586]: AVC avc: denied { bpf } for pid=1586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:49.714000 audit[1586]: AVC avc: denied { bpf } for pid=1586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:49.714000 audit: BPF prog-id=67 op=LOAD Jul 15 11:33:49.714000 audit[1586]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00026dfa8 items=0 ppid=1506 pid=1586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:49.714000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261393164623831653561346634363338633338653338633030646431 Jul 15 11:33:49.714000 audit: BPF prog-id=67 op=UNLOAD Jul 15 11:33:49.714000 audit: BPF prog-id=66 op=UNLOAD Jul 15 11:33:49.714000 audit[1586]: AVC avc: denied { bpf } for pid=1586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:49.714000 audit[1586]: AVC avc: denied { bpf } for pid=1586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:49.714000 audit[1586]: AVC avc: denied { bpf } for pid=1586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:49.714000 audit[1586]: AVC avc: denied { perfmon } for pid=1586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:49.714000 audit[1586]: AVC avc: denied { perfmon } for pid=1586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:49.714000 audit[1586]: AVC avc: denied { perfmon } for pid=1586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:49.714000 audit[1586]: AVC avc: denied { perfmon } for pid=1586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:49.714000 audit[1586]: AVC avc: denied { perfmon } for pid=1586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:49.714000 audit[1586]: AVC avc: denied { bpf } for pid=1586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:49.714000 audit[1586]: AVC avc: denied { bpf } for pid=1586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:49.714000 audit: BPF prog-id=68 op=LOAD Jul 15 11:33:49.714000 audit[1586]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003a6038 items=0 ppid=1506 pid=1586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:49.714000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261393164623831653561346634363338633338653338633030646431 Jul 15 11:33:49.727419 env[1203]: time="2025-07-15T11:33:49.727382908Z" level=info msg="StartContainer for \"2a91db81e5a4f4638c38e38c00dd180d3b630884b62c38ab98947f91ba93dcf9\" returns successfully" Jul 15 11:33:49.731746 systemd[1]: cri-containerd-2a91db81e5a4f4638c38e38c00dd180d3b630884b62c38ab98947f91ba93dcf9.scope: Deactivated successfully. Jul 15 11:33:49.736000 audit: BPF prog-id=68 op=UNLOAD Jul 15 11:33:49.824633 env[1203]: time="2025-07-15T11:33:49.824582204Z" level=info msg="shim disconnected" id=2a91db81e5a4f4638c38e38c00dd180d3b630884b62c38ab98947f91ba93dcf9 Jul 15 11:33:49.824633 env[1203]: time="2025-07-15T11:33:49.824635140Z" level=warning msg="cleaning up after shim disconnected" id=2a91db81e5a4f4638c38e38c00dd180d3b630884b62c38ab98947f91ba93dcf9 namespace=k8s.io Jul 15 11:33:49.824857 env[1203]: time="2025-07-15T11:33:49.824646273Z" level=info msg="cleaning up dead shim" Jul 15 11:33:49.831148 env[1203]: time="2025-07-15T11:33:49.831099082Z" level=warning msg="cleanup warnings time=\"2025-07-15T11:33:49Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1624 runtime=io.containerd.runc.v2\n" Jul 15 11:33:50.230956 kubelet[1445]: E0715 11:33:50.230896 1445 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8hg42" podUID="d9742bb2-a259-4759-a746-30d9f682ecb8" Jul 15 11:33:50.475337 kubelet[1445]: E0715 11:33:50.475291 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:50.873854 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2282304089.mount: Deactivated successfully. Jul 15 11:33:51.475488 kubelet[1445]: E0715 11:33:51.475429 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:51.484998 env[1203]: time="2025-07-15T11:33:51.484952297Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:51.486802 env[1203]: time="2025-07-15T11:33:51.486771264Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:63f0cbe3b7339c5d006efc9964228e48271bae73039320037c451b5e8f763e02,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:51.488169 env[1203]: time="2025-07-15T11:33:51.488129011Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:51.489386 env[1203]: time="2025-07-15T11:33:51.489347448Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:b13d9da413b983d130bf090b83fce12e1ccc704e95f366da743c18e964d9d7e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:51.489827 env[1203]: time="2025-07-15T11:33:51.489789727Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.6\" returns image reference \"sha256:63f0cbe3b7339c5d006efc9964228e48271bae73039320037c451b5e8f763e02\"" Jul 15 11:33:51.490718 env[1203]: time="2025-07-15T11:33:51.490692136Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.2\"" Jul 15 11:33:51.491555 env[1203]: time="2025-07-15T11:33:51.491529517Z" level=info msg="CreateContainer within sandbox \"47606c5724cacce9eea3994ba08d7cc6e47158eb6475daea79a6ec509b8252d4\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Jul 15 11:33:51.501360 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount615323312.mount: Deactivated successfully. Jul 15 11:33:51.504326 env[1203]: time="2025-07-15T11:33:51.504286164Z" level=info msg="CreateContainer within sandbox \"47606c5724cacce9eea3994ba08d7cc6e47158eb6475daea79a6ec509b8252d4\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"9d0926793475ee602eef09d82c78d7710b64b318d55e728492320380fd867160\"" Jul 15 11:33:51.504802 env[1203]: time="2025-07-15T11:33:51.504778145Z" level=info msg="StartContainer for \"9d0926793475ee602eef09d82c78d7710b64b318d55e728492320380fd867160\"" Jul 15 11:33:51.522521 systemd[1]: Started cri-containerd-9d0926793475ee602eef09d82c78d7710b64b318d55e728492320380fd867160.scope. Jul 15 11:33:51.535000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:51.535000 audit[1649]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7feb781eec88 items=0 ppid=1524 pid=1649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964303932363739333437356565363032656566303964383263373864 Jul 15 11:33:51.536000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:51.536000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:51.536000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:51.536000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:51.536000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:51.536000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:51.536000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:51.536000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:51.536000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:51.536000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:51.536000 audit: BPF prog-id=69 op=LOAD Jul 15 11:33:51.536000 audit[1649]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c00020ed78 items=0 ppid=1524 pid=1649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.536000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964303932363739333437356565363032656566303964383263373864 Jul 15 11:33:51.536000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:51.536000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:51.536000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:51.536000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:51.536000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:51.536000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:51.536000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:51.536000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:51.536000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:51.536000 audit: BPF prog-id=70 op=LOAD Jul 15 11:33:51.536000 audit[1649]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c00020edc8 items=0 ppid=1524 pid=1649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.536000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964303932363739333437356565363032656566303964383263373864 Jul 15 11:33:51.536000 audit: BPF prog-id=70 op=UNLOAD Jul 15 11:33:51.536000 audit: BPF prog-id=69 op=UNLOAD Jul 15 11:33:51.536000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:51.536000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:51.536000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:51.536000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:51.536000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:51.536000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:51.536000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:51.536000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:51.536000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:51.536000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:51.536000 audit: BPF prog-id=71 op=LOAD Jul 15 11:33:51.536000 audit[1649]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c00020ee58 items=0 ppid=1524 pid=1649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.536000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964303932363739333437356565363032656566303964383263373864 Jul 15 11:33:51.548650 env[1203]: time="2025-07-15T11:33:51.548598479Z" level=info msg="StartContainer for \"9d0926793475ee602eef09d82c78d7710b64b318d55e728492320380fd867160\" returns successfully" Jul 15 11:33:51.637000 audit[1710]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1710 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:51.637000 audit[1710]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc7354c050 a2=0 a3=7ffc7354c03c items=0 ppid=1660 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.637000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 15 11:33:51.637000 audit[1711]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1711 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:51.637000 audit[1711]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe3a5a1e00 a2=0 a3=7ffe3a5a1dec items=0 ppid=1660 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.637000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 15 11:33:51.639000 audit[1715]: NETFILTER_CFG table=nat:16 family=10 entries=1 op=nft_register_chain pid=1715 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:51.639000 audit[1715]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffde577c2a0 a2=0 a3=7ffde577c28c items=0 ppid=1660 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.639000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 15 11:33:51.639000 audit[1713]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_chain pid=1713 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:51.639000 audit[1713]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd6de27640 a2=0 a3=7ffd6de2762c items=0 ppid=1660 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.639000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 15 11:33:51.640000 audit[1717]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=1717 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:51.640000 audit[1717]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffd9c90bf0 a2=0 a3=7fffd9c90bdc items=0 ppid=1660 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.640000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 15 11:33:51.640000 audit[1718]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1718 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:51.640000 audit[1718]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff8aff4460 a2=0 a3=7fff8aff444c items=0 ppid=1660 pid=1718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.640000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 15 11:33:51.740000 audit[1719]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1719 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:51.740000 audit[1719]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe4e401df0 a2=0 a3=7ffe4e401ddc items=0 ppid=1660 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.740000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 15 11:33:51.742000 audit[1721]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1721 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:51.742000 audit[1721]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffeb069e200 a2=0 a3=7ffeb069e1ec items=0 ppid=1660 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.742000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Jul 15 11:33:51.745000 audit[1724]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1724 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:51.745000 audit[1724]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff7bed3e00 a2=0 a3=7fff7bed3dec items=0 ppid=1660 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.745000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Jul 15 11:33:51.746000 audit[1725]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1725 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:51.746000 audit[1725]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc67d68570 a2=0 a3=7ffc67d6855c items=0 ppid=1660 pid=1725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.746000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 15 11:33:51.748000 audit[1727]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1727 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:51.748000 audit[1727]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd122f99d0 a2=0 a3=7ffd122f99bc items=0 ppid=1660 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.748000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 15 11:33:51.748000 audit[1728]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1728 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:51.748000 audit[1728]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe3e7d3450 a2=0 a3=7ffe3e7d343c items=0 ppid=1660 pid=1728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.748000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 15 11:33:51.750000 audit[1730]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1730 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:51.750000 audit[1730]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc331e7650 a2=0 a3=7ffc331e763c items=0 ppid=1660 pid=1730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.750000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 15 11:33:51.753000 audit[1733]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1733 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:51.753000 audit[1733]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffda4a5c350 a2=0 a3=7ffda4a5c33c items=0 ppid=1660 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.753000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Jul 15 11:33:51.754000 audit[1734]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1734 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:51.754000 audit[1734]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe8cecf8f0 a2=0 a3=7ffe8cecf8dc items=0 ppid=1660 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.754000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 15 11:33:51.756000 audit[1736]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1736 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:51.756000 audit[1736]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc9244b5c0 a2=0 a3=7ffc9244b5ac items=0 ppid=1660 pid=1736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.756000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 15 11:33:51.757000 audit[1737]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1737 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:51.757000 audit[1737]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc0a0bbb80 a2=0 a3=7ffc0a0bbb6c items=0 ppid=1660 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.757000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 15 11:33:51.758000 audit[1739]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1739 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:51.758000 audit[1739]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe80dad600 a2=0 a3=7ffe80dad5ec items=0 ppid=1660 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.758000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 15 11:33:51.761000 audit[1742]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1742 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:51.761000 audit[1742]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffef7c89490 a2=0 a3=7ffef7c8947c items=0 ppid=1660 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.761000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 15 11:33:51.764000 audit[1745]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1745 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:51.764000 audit[1745]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdfd1d5fe0 a2=0 a3=7ffdfd1d5fcc items=0 ppid=1660 pid=1745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.764000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 15 11:33:51.765000 audit[1746]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1746 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:51.765000 audit[1746]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffff6db26b0 a2=0 a3=7ffff6db269c items=0 ppid=1660 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.765000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 15 11:33:51.766000 audit[1748]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1748 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:51.766000 audit[1748]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff669f3d60 a2=0 a3=7fff669f3d4c items=0 ppid=1660 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.766000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 15 11:33:51.787000 audit[1752]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1752 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:51.787000 audit[1752]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe600af210 a2=0 a3=7ffe600af1fc items=0 ppid=1660 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.787000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 15 11:33:51.788000 audit[1753]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1753 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:51.788000 audit[1753]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd6d15c300 a2=0 a3=7ffd6d15c2ec items=0 ppid=1660 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.788000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 15 11:33:51.789000 audit[1755]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1755 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:33:51.789000 audit[1755]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fffd6b02380 a2=0 a3=7fffd6b0236c items=0 ppid=1660 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.789000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 15 11:33:51.809000 audit[1761]: NETFILTER_CFG table=filter:39 family=2 entries=11 op=nft_register_rule pid=1761 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:33:51.809000 audit[1761]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffca5dbf160 a2=0 a3=7ffca5dbf14c items=0 ppid=1660 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.809000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:33:51.823000 audit[1761]: NETFILTER_CFG table=nat:40 family=2 entries=21 op=nft_register_chain pid=1761 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:33:51.823000 audit[1761]: SYSCALL arch=c000003e syscall=46 success=yes exit=9084 a0=3 a1=7ffca5dbf160 a2=0 a3=7ffca5dbf14c items=0 ppid=1660 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.823000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:33:51.824000 audit[1768]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1768 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:51.824000 audit[1768]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc811767c0 a2=0 a3=7ffc811767ac items=0 ppid=1660 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.824000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 15 11:33:51.826000 audit[1770]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1770 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:51.826000 audit[1770]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffbc39b9a0 a2=0 a3=7fffbc39b98c items=0 ppid=1660 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.826000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Jul 15 11:33:51.829000 audit[1773]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1773 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:51.829000 audit[1773]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffca8f81d0 a2=0 a3=7fffca8f81bc items=0 ppid=1660 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.829000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Jul 15 11:33:51.830000 audit[1774]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1774 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:51.830000 audit[1774]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffde4d69860 a2=0 a3=7ffde4d6984c items=0 ppid=1660 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.830000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 15 11:33:51.832000 audit[1776]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1776 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:51.832000 audit[1776]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff4076ef70 a2=0 a3=7fff4076ef5c items=0 ppid=1660 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.832000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 15 11:33:51.833000 audit[1777]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1777 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:51.833000 audit[1777]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffde3fb4d50 a2=0 a3=7ffde3fb4d3c items=0 ppid=1660 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.833000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 15 11:33:51.834000 audit[1779]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1779 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:51.834000 audit[1779]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff6c645240 a2=0 a3=7fff6c64522c items=0 ppid=1660 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.834000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Jul 15 11:33:51.837000 audit[1782]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1782 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:51.837000 audit[1782]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff85803280 a2=0 a3=7fff8580326c items=0 ppid=1660 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.837000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 15 11:33:51.838000 audit[1783]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1783 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:51.838000 audit[1783]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffd2048380 a2=0 a3=7fffd204836c items=0 ppid=1660 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.838000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 15 11:33:51.839000 audit[1785]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1785 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:51.839000 audit[1785]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc46502c60 a2=0 a3=7ffc46502c4c items=0 ppid=1660 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.839000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 15 11:33:51.840000 audit[1786]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1786 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:51.840000 audit[1786]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd9a55caa0 a2=0 a3=7ffd9a55ca8c items=0 ppid=1660 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.840000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 15 11:33:51.842000 audit[1788]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1788 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:51.842000 audit[1788]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffef46b3a20 a2=0 a3=7ffef46b3a0c items=0 ppid=1660 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.842000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 15 11:33:51.845000 audit[1791]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1791 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:51.845000 audit[1791]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd8c99e090 a2=0 a3=7ffd8c99e07c items=0 ppid=1660 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.845000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 15 11:33:51.847000 audit[1794]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1794 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:51.847000 audit[1794]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff379efb90 a2=0 a3=7fff379efb7c items=0 ppid=1660 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.847000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Jul 15 11:33:51.848000 audit[1795]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1795 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:51.848000 audit[1795]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdeee61e50 a2=0 a3=7ffdeee61e3c items=0 ppid=1660 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.848000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 15 11:33:51.850000 audit[1797]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1797 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:51.850000 audit[1797]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff7ffc08c0 a2=0 a3=7fff7ffc08ac items=0 ppid=1660 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.850000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 15 11:33:51.852000 audit[1800]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1800 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:51.852000 audit[1800]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffff5174640 a2=0 a3=7ffff517462c items=0 ppid=1660 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.852000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 15 11:33:51.853000 audit[1801]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1801 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:51.853000 audit[1801]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc4a9e2530 a2=0 a3=7ffc4a9e251c items=0 ppid=1660 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.853000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 15 11:33:51.855000 audit[1803]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1803 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:51.855000 audit[1803]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff0bb47ae0 a2=0 a3=7fff0bb47acc items=0 ppid=1660 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.855000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 15 11:33:51.856000 audit[1804]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1804 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:51.856000 audit[1804]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe110862f0 a2=0 a3=7ffe110862dc items=0 ppid=1660 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.856000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 15 11:33:51.858000 audit[1806]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1806 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:51.858000 audit[1806]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd7ff595a0 a2=0 a3=7ffd7ff5958c items=0 ppid=1660 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.858000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 15 11:33:51.860000 audit[1809]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1809 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 15 11:33:51.860000 audit[1809]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdb5789d00 a2=0 a3=7ffdb5789cec items=0 ppid=1660 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.860000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 15 11:33:51.863000 audit[1811]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1811 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 15 11:33:51.863000 audit[1811]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffc4b580dd0 a2=0 a3=7ffc4b580dbc items=0 ppid=1660 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.863000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:33:51.863000 audit[1811]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1811 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 15 11:33:51.863000 audit[1811]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffc4b580dd0 a2=0 a3=7ffc4b580dbc items=0 ppid=1660 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:51.863000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:33:52.231496 kubelet[1445]: E0715 11:33:52.231396 1445 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8hg42" podUID="d9742bb2-a259-4759-a746-30d9f682ecb8" Jul 15 11:33:52.244235 kubelet[1445]: E0715 11:33:52.244203 1445 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 15 11:33:52.476075 kubelet[1445]: E0715 11:33:52.476013 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:52.499102 systemd[1]: run-containerd-runc-k8s.io-9d0926793475ee602eef09d82c78d7710b64b318d55e728492320380fd867160-runc.yKTMts.mount: Deactivated successfully. Jul 15 11:33:53.073000 audit[1813]: NETFILTER_CFG table=filter:65 family=2 entries=20 op=nft_register_rule pid=1813 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:33:53.073000 audit[1813]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7fff8d9174f0 a2=0 a3=7fff8d9174dc items=0 ppid=1660 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:53.073000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:33:53.079000 audit[1813]: NETFILTER_CFG table=nat:66 family=2 entries=14 op=nft_register_rule pid=1813 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:33:53.079000 audit[1813]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fff8d9174f0 a2=0 a3=0 items=0 ppid=1660 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:53.079000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:33:53.099000 audit[1816]: NETFILTER_CFG table=filter:67 family=2 entries=17 op=nft_register_rule pid=1816 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:33:53.101049 kernel: kauditd_printk_skb: 350 callbacks suppressed Jul 15 11:33:53.101179 kernel: audit: type=1325 audit(1752579233.099:508): table=filter:67 family=2 entries=17 op=nft_register_rule pid=1816 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:33:53.099000 audit[1816]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fffe4450670 a2=0 a3=7fffe445065c items=0 ppid=1660 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:53.115494 kernel: audit: type=1300 audit(1752579233.099:508): arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fffe4450670 a2=0 a3=7fffe445065c items=0 ppid=1660 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:53.115597 kernel: audit: type=1327 audit(1752579233.099:508): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:33:53.099000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:33:53.119000 audit[1816]: NETFILTER_CFG table=nat:68 family=2 entries=35 op=nft_register_chain pid=1816 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:33:53.119000 audit[1816]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7fffe4450670 a2=0 a3=7fffe445065c items=0 ppid=1660 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:53.128477 kernel: audit: type=1325 audit(1752579233.119:509): table=nat:68 family=2 entries=35 op=nft_register_chain pid=1816 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:33:53.128556 kernel: audit: type=1300 audit(1752579233.119:509): arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7fffe4450670 a2=0 a3=7fffe445065c items=0 ppid=1660 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:53.128587 kernel: audit: type=1327 audit(1752579233.119:509): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:33:53.119000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:33:53.245318 kubelet[1445]: E0715 11:33:53.245274 1445 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 15 11:33:53.476918 kubelet[1445]: E0715 11:33:53.476752 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:54.230849 kubelet[1445]: E0715 11:33:54.230803 1445 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8hg42" podUID="d9742bb2-a259-4759-a746-30d9f682ecb8" Jul 15 11:33:54.477624 kubelet[1445]: E0715 11:33:54.477576 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:55.478615 kubelet[1445]: E0715 11:33:55.478544 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:56.208000 audit[1818]: NETFILTER_CFG table=filter:69 family=2 entries=13 op=nft_register_rule pid=1818 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:33:56.208000 audit[1818]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffc1e23b230 a2=0 a3=7ffc1e23b21c items=0 ppid=1660 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:56.219416 kernel: audit: type=1325 audit(1752579236.208:510): table=filter:69 family=2 entries=13 op=nft_register_rule pid=1818 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:33:56.219567 kernel: audit: type=1300 audit(1752579236.208:510): arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffc1e23b230 a2=0 a3=7ffc1e23b21c items=0 ppid=1660 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:56.219585 kernel: audit: type=1327 audit(1752579236.208:510): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:33:56.208000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:33:56.225542 env[1203]: time="2025-07-15T11:33:56.225490237Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:56.227391 env[1203]: time="2025-07-15T11:33:56.227360117Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:77a357d0d33e3016e61153f7d2b7de72371579c4aaeb767fb7ef0af606fe1630,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:56.225000 audit[1818]: NETFILTER_CFG table=nat:70 family=2 entries=27 op=nft_register_chain pid=1818 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:33:56.229125 env[1203]: time="2025-07-15T11:33:56.229077115Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:56.225000 audit[1818]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffc1e23b230 a2=0 a3=7ffc1e23b21c items=0 ppid=1660 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:56.225000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:33:56.230754 kernel: audit: type=1325 audit(1752579236.225:511): table=nat:70 family=2 entries=27 op=nft_register_chain pid=1818 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:33:56.230874 kubelet[1445]: E0715 11:33:56.230843 1445 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8hg42" podUID="d9742bb2-a259-4759-a746-30d9f682ecb8" Jul 15 11:33:56.231081 env[1203]: time="2025-07-15T11:33:56.231048134Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:50686775cc60acb78bd92a66fa2d84e1700b2d8e43a718fbadbf35e59baefb4d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:33:56.231319 env[1203]: time="2025-07-15T11:33:56.231280942Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.2\" returns image reference \"sha256:77a357d0d33e3016e61153f7d2b7de72371579c4aaeb767fb7ef0af606fe1630\"" Jul 15 11:33:56.233417 env[1203]: time="2025-07-15T11:33:56.233373161Z" level=info msg="CreateContainer within sandbox \"3522cef795436f42dba5566eb1921543edf5c15cfba8c7c0c1a03d3ab570706b\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Jul 15 11:33:56.238000 audit[1820]: NETFILTER_CFG table=filter:71 family=2 entries=12 op=nft_register_rule pid=1820 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:33:56.238000 audit[1820]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffe54a6af60 a2=0 a3=7ffe54a6af4c items=0 ppid=1660 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:56.238000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:33:56.248034 env[1203]: time="2025-07-15T11:33:56.247976349Z" level=info msg="CreateContainer within sandbox \"3522cef795436f42dba5566eb1921543edf5c15cfba8c7c0c1a03d3ab570706b\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"7c0bf0e411165937fa352b34a4b2c9b83d4ed56dc6cc3c0680398f7c9b6566b6\"" Jul 15 11:33:56.246000 audit[1820]: NETFILTER_CFG table=nat:72 family=2 entries=58 op=nft_register_chain pid=1820 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:33:56.246000 audit[1820]: SYSCALL arch=c000003e syscall=46 success=yes exit=20628 a0=3 a1=7ffe54a6af60 a2=0 a3=7ffe54a6af4c items=0 ppid=1660 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:56.246000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:33:56.248869 env[1203]: time="2025-07-15T11:33:56.248747795Z" level=info msg="StartContainer for \"7c0bf0e411165937fa352b34a4b2c9b83d4ed56dc6cc3c0680398f7c9b6566b6\"" Jul 15 11:33:56.265044 systemd[1]: Started cri-containerd-7c0bf0e411165937fa352b34a4b2c9b83d4ed56dc6cc3c0680398f7c9b6566b6.scope. Jul 15 11:33:56.275000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:56.275000 audit[1831]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f3f606bd888 items=0 ppid=1506 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:56.275000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763306266306534313131363539333766613335326233346134623263 Jul 15 11:33:56.275000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:56.275000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:56.275000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:56.275000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:56.275000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:56.275000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:56.275000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:56.275000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:56.275000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:56.275000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:56.275000 audit: BPF prog-id=72 op=LOAD Jul 15 11:33:56.275000 audit[1831]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0003e0078 items=0 ppid=1506 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:56.275000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763306266306534313131363539333766613335326233346134623263 Jul 15 11:33:56.275000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:56.275000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:56.275000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:56.275000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:56.275000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:56.275000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:56.275000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:56.275000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:56.275000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:56.275000 audit: BPF prog-id=73 op=LOAD Jul 15 11:33:56.275000 audit[1831]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0003e00c8 items=0 ppid=1506 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:56.275000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763306266306534313131363539333766613335326233346134623263 Jul 15 11:33:56.275000 audit: BPF prog-id=73 op=UNLOAD Jul 15 11:33:56.275000 audit: BPF prog-id=72 op=UNLOAD Jul 15 11:33:56.275000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:56.275000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:56.275000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:56.275000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:56.275000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:56.275000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:56.275000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:56.275000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:56.275000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:56.275000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:33:56.275000 audit: BPF prog-id=74 op=LOAD Jul 15 11:33:56.275000 audit[1831]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0003e0158 items=0 ppid=1506 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:33:56.275000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763306266306534313131363539333766613335326233346134623263 Jul 15 11:33:56.288169 env[1203]: time="2025-07-15T11:33:56.288126561Z" level=info msg="StartContainer for \"7c0bf0e411165937fa352b34a4b2c9b83d4ed56dc6cc3c0680398f7c9b6566b6\" returns successfully" Jul 15 11:33:56.479344 kubelet[1445]: E0715 11:33:56.479199 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:57.268853 kubelet[1445]: I0715 11:33:57.268750 1445 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-s26z6" podStartSLOduration=8.947388142 podStartE2EDuration="12.268717594s" podCreationTimestamp="2025-07-15 11:33:45 +0000 UTC" firstStartedPulling="2025-07-15 11:33:48.169221369 +0000 UTC m=+4.085536485" lastFinishedPulling="2025-07-15 11:33:51.490550792 +0000 UTC m=+7.406865937" observedRunningTime="2025-07-15 11:33:52.251817752 +0000 UTC m=+8.168132867" watchObservedRunningTime="2025-07-15 11:33:57.268717594 +0000 UTC m=+13.185032699" Jul 15 11:33:57.413191 env[1203]: time="2025-07-15T11:33:57.413111166Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 15 11:33:57.414791 systemd[1]: cri-containerd-7c0bf0e411165937fa352b34a4b2c9b83d4ed56dc6cc3c0680398f7c9b6566b6.scope: Deactivated successfully. Jul 15 11:33:57.418000 audit: BPF prog-id=74 op=UNLOAD Jul 15 11:33:57.437112 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-7c0bf0e411165937fa352b34a4b2c9b83d4ed56dc6cc3c0680398f7c9b6566b6-rootfs.mount: Deactivated successfully. Jul 15 11:33:57.465208 kubelet[1445]: I0715 11:33:57.465173 1445 kubelet_node_status.go:501] "Fast updating node status as it just became ready" Jul 15 11:33:57.480292 kubelet[1445]: E0715 11:33:57.479447 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:58.238441 systemd[1]: Created slice kubepods-besteffort-podd9742bb2_a259_4759_a746_30d9f682ecb8.slice. Jul 15 11:33:58.240970 env[1203]: time="2025-07-15T11:33:58.240920163Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-8hg42,Uid:d9742bb2-a259-4759-a746-30d9f682ecb8,Namespace:calico-system,Attempt:0,}" Jul 15 11:33:58.480607 kubelet[1445]: E0715 11:33:58.480497 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:33:58.788986 env[1203]: time="2025-07-15T11:33:58.788932485Z" level=info msg="shim disconnected" id=7c0bf0e411165937fa352b34a4b2c9b83d4ed56dc6cc3c0680398f7c9b6566b6 Jul 15 11:33:58.788986 env[1203]: time="2025-07-15T11:33:58.788981012Z" level=warning msg="cleaning up after shim disconnected" id=7c0bf0e411165937fa352b34a4b2c9b83d4ed56dc6cc3c0680398f7c9b6566b6 namespace=k8s.io Jul 15 11:33:58.788986 env[1203]: time="2025-07-15T11:33:58.788993761Z" level=info msg="cleaning up dead shim" Jul 15 11:33:58.797258 env[1203]: time="2025-07-15T11:33:58.797172949Z" level=warning msg="cleanup warnings time=\"2025-07-15T11:33:58Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1873 runtime=io.containerd.runc.v2\n" Jul 15 11:33:58.855575 env[1203]: time="2025-07-15T11:33:58.855478840Z" level=error msg="Failed to destroy network for sandbox \"8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 15 11:33:58.855972 env[1203]: time="2025-07-15T11:33:58.855894923Z" level=error msg="encountered an error cleaning up failed sandbox \"8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 15 11:33:58.856035 env[1203]: time="2025-07-15T11:33:58.855987529Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-8hg42,Uid:d9742bb2-a259-4759-a746-30d9f682ecb8,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 15 11:33:58.856316 kubelet[1445]: E0715 11:33:58.856258 1445 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 15 11:33:58.856399 kubelet[1445]: E0715 11:33:58.856357 1445 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-8hg42" Jul 15 11:33:58.856438 kubelet[1445]: E0715 11:33:58.856389 1445 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-8hg42" Jul 15 11:33:58.856511 kubelet[1445]: E0715 11:33:58.856473 1445 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-8hg42_calico-system(d9742bb2-a259-4759-a746-30d9f682ecb8)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-8hg42_calico-system(d9742bb2-a259-4759-a746-30d9f682ecb8)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-8hg42" podUID="d9742bb2-a259-4759-a746-30d9f682ecb8" Jul 15 11:33:58.857222 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c-shm.mount: Deactivated successfully. Jul 15 11:33:59.261081 kubelet[1445]: I0715 11:33:59.260449 1445 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c" Jul 15 11:33:59.261249 env[1203]: time="2025-07-15T11:33:59.260744980Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.2\"" Jul 15 11:33:59.261249 env[1203]: time="2025-07-15T11:33:59.260994760Z" level=info msg="StopPodSandbox for \"8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c\"" Jul 15 11:33:59.283186 env[1203]: time="2025-07-15T11:33:59.283081688Z" level=error msg="StopPodSandbox for \"8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c\" failed" error="failed to destroy network for sandbox \"8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 15 11:33:59.283459 kubelet[1445]: E0715 11:33:59.283378 1445 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c" Jul 15 11:33:59.283545 kubelet[1445]: E0715 11:33:59.283465 1445 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c"} Jul 15 11:33:59.283584 kubelet[1445]: E0715 11:33:59.283550 1445 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d9742bb2-a259-4759-a746-30d9f682ecb8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 15 11:33:59.283661 kubelet[1445]: E0715 11:33:59.283582 1445 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d9742bb2-a259-4759-a746-30d9f682ecb8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-8hg42" podUID="d9742bb2-a259-4759-a746-30d9f682ecb8" Jul 15 11:33:59.481499 kubelet[1445]: E0715 11:33:59.481441 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:00.482190 kubelet[1445]: E0715 11:34:00.482123 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:01.140000 audit[1939]: NETFILTER_CFG table=filter:73 family=2 entries=12 op=nft_register_rule pid=1939 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:34:01.143073 kernel: kauditd_printk_skb: 52 callbacks suppressed Jul 15 11:34:01.143204 kernel: audit: type=1325 audit(1752579241.140:521): table=filter:73 family=2 entries=12 op=nft_register_rule pid=1939 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:34:01.140000 audit[1939]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffeefeafc40 a2=0 a3=7ffeefeafc2c items=0 ppid=1660 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:01.150469 kernel: audit: type=1300 audit(1752579241.140:521): arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffeefeafc40 a2=0 a3=7ffeefeafc2c items=0 ppid=1660 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:01.150510 kernel: audit: type=1327 audit(1752579241.140:521): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:34:01.140000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:34:01.154000 audit[1939]: NETFILTER_CFG table=nat:74 family=2 entries=22 op=nft_register_rule pid=1939 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:34:01.154000 audit[1939]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffeefeafc40 a2=0 a3=7ffeefeafc2c items=0 ppid=1660 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:01.167154 kernel: audit: type=1325 audit(1752579241.154:522): table=nat:74 family=2 entries=22 op=nft_register_rule pid=1939 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:34:01.167377 kernel: audit: type=1300 audit(1752579241.154:522): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffeefeafc40 a2=0 a3=7ffeefeafc2c items=0 ppid=1660 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:01.167399 kernel: audit: type=1327 audit(1752579241.154:522): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:34:01.154000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:34:01.482705 kubelet[1445]: E0715 11:34:01.482580 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:02.142000 audit[1941]: NETFILTER_CFG table=filter:75 family=2 entries=12 op=nft_register_rule pid=1941 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:34:02.142000 audit[1941]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffd26881ff0 a2=0 a3=7ffd26881fdc items=0 ppid=1660 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:02.151230 kernel: audit: type=1325 audit(1752579242.142:523): table=filter:75 family=2 entries=12 op=nft_register_rule pid=1941 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:34:02.151285 kernel: audit: type=1300 audit(1752579242.142:523): arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffd26881ff0 a2=0 a3=7ffd26881fdc items=0 ppid=1660 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:02.151310 kernel: audit: type=1327 audit(1752579242.142:523): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:34:02.142000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:34:02.178000 audit[1941]: NETFILTER_CFG table=nat:76 family=2 entries=22 op=nft_register_rule pid=1941 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:34:02.178000 audit[1941]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd26881ff0 a2=0 a3=7ffd26881fdc items=0 ppid=1660 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:02.178000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:34:02.183756 kernel: audit: type=1325 audit(1752579242.178:524): table=nat:76 family=2 entries=22 op=nft_register_rule pid=1941 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:34:02.444864 systemd[1]: Created slice kubepods-besteffort-pod4bb21fac_42ba_44fa_94e2_a7d2565b8791.slice. Jul 15 11:34:02.483694 kubelet[1445]: E0715 11:34:02.483621 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:02.511340 kubelet[1445]: I0715 11:34:02.511286 1445 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dqdmj\" (UniqueName: \"kubernetes.io/projected/4bb21fac-42ba-44fa-94e2-a7d2565b8791-kube-api-access-dqdmj\") pod \"nginx-deployment-7fcdb87857-wxx57\" (UID: \"4bb21fac-42ba-44fa-94e2-a7d2565b8791\") " pod="default/nginx-deployment-7fcdb87857-wxx57" Jul 15 11:34:02.747639 env[1203]: time="2025-07-15T11:34:02.747591044Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-wxx57,Uid:4bb21fac-42ba-44fa-94e2-a7d2565b8791,Namespace:default,Attempt:0,}" Jul 15 11:34:02.827224 env[1203]: time="2025-07-15T11:34:02.827145707Z" level=error msg="Failed to destroy network for sandbox \"c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 15 11:34:02.828791 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca-shm.mount: Deactivated successfully. Jul 15 11:34:02.829571 env[1203]: time="2025-07-15T11:34:02.829530533Z" level=error msg="encountered an error cleaning up failed sandbox \"c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 15 11:34:02.829693 env[1203]: time="2025-07-15T11:34:02.829580264Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-wxx57,Uid:4bb21fac-42ba-44fa-94e2-a7d2565b8791,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 15 11:34:02.829891 kubelet[1445]: E0715 11:34:02.829854 1445 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 15 11:34:02.829935 kubelet[1445]: E0715 11:34:02.829919 1445 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-wxx57" Jul 15 11:34:02.829970 kubelet[1445]: E0715 11:34:02.829941 1445 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-wxx57" Jul 15 11:34:02.830005 kubelet[1445]: E0715 11:34:02.829978 1445 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-7fcdb87857-wxx57_default(4bb21fac-42ba-44fa-94e2-a7d2565b8791)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-7fcdb87857-wxx57_default(4bb21fac-42ba-44fa-94e2-a7d2565b8791)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-wxx57" podUID="4bb21fac-42ba-44fa-94e2-a7d2565b8791" Jul 15 11:34:03.267448 kubelet[1445]: I0715 11:34:03.267417 1445 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca" Jul 15 11:34:03.267919 env[1203]: time="2025-07-15T11:34:03.267878571Z" level=info msg="StopPodSandbox for \"c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca\"" Jul 15 11:34:03.302050 env[1203]: time="2025-07-15T11:34:03.301983851Z" level=error msg="StopPodSandbox for \"c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca\" failed" error="failed to destroy network for sandbox \"c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 15 11:34:03.302279 kubelet[1445]: E0715 11:34:03.302242 1445 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca" Jul 15 11:34:03.302328 kubelet[1445]: E0715 11:34:03.302294 1445 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca"} Jul 15 11:34:03.302353 kubelet[1445]: E0715 11:34:03.302330 1445 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4bb21fac-42ba-44fa-94e2-a7d2565b8791\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 15 11:34:03.302421 kubelet[1445]: E0715 11:34:03.302354 1445 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4bb21fac-42ba-44fa-94e2-a7d2565b8791\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-wxx57" podUID="4bb21fac-42ba-44fa-94e2-a7d2565b8791" Jul 15 11:34:03.484372 kubelet[1445]: E0715 11:34:03.484312 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:04.472007 kubelet[1445]: E0715 11:34:04.471929 1445 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:04.484426 kubelet[1445]: E0715 11:34:04.484404 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:05.484754 kubelet[1445]: E0715 11:34:05.484667 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:06.485537 kubelet[1445]: E0715 11:34:06.485492 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:07.114910 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1282690978.mount: Deactivated successfully. Jul 15 11:34:07.485920 kubelet[1445]: E0715 11:34:07.485801 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:08.471182 env[1203]: time="2025-07-15T11:34:08.471124383Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:34:08.476509 env[1203]: time="2025-07-15T11:34:08.476471973Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cc52550d767f73458fee2ee68db9db5de30d175e8fa4569ebdb43610127b6d20,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:34:08.478244 env[1203]: time="2025-07-15T11:34:08.478219649Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:34:08.480114 env[1203]: time="2025-07-15T11:34:08.480090821Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e94d49349cc361ef2216d27dda4a097278984d778279f66e79b0616c827c6760,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:34:08.480457 env[1203]: time="2025-07-15T11:34:08.480429542Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.2\" returns image reference \"sha256:cc52550d767f73458fee2ee68db9db5de30d175e8fa4569ebdb43610127b6d20\"" Jul 15 11:34:08.485985 kubelet[1445]: E0715 11:34:08.485954 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:08.489599 env[1203]: time="2025-07-15T11:34:08.489545417Z" level=info msg="CreateContainer within sandbox \"3522cef795436f42dba5566eb1921543edf5c15cfba8c7c0c1a03d3ab570706b\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Jul 15 11:34:08.504854 env[1203]: time="2025-07-15T11:34:08.504810742Z" level=info msg="CreateContainer within sandbox \"3522cef795436f42dba5566eb1921543edf5c15cfba8c7c0c1a03d3ab570706b\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"382e957c09fd5f17b5d39da5d6b81f39e6ad37ad6cbe18f2574348f74a0e7b01\"" Jul 15 11:34:08.505276 env[1203]: time="2025-07-15T11:34:08.505257733Z" level=info msg="StartContainer for \"382e957c09fd5f17b5d39da5d6b81f39e6ad37ad6cbe18f2574348f74a0e7b01\"" Jul 15 11:34:08.568394 systemd[1]: Started cri-containerd-382e957c09fd5f17b5d39da5d6b81f39e6ad37ad6cbe18f2574348f74a0e7b01.scope. Jul 15 11:34:08.674000 audit[2008]: AVC avc: denied { perfmon } for pid=2008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:08.676076 kernel: kauditd_printk_skb: 2 callbacks suppressed Jul 15 11:34:08.676149 kernel: audit: type=1400 audit(1752579248.674:525): avc: denied { perfmon } for pid=2008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:08.674000 audit[2008]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f6fc875a458 items=0 ppid=1506 pid=2008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:08.683499 kernel: audit: type=1300 audit(1752579248.674:525): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f6fc875a458 items=0 ppid=1506 pid=2008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:08.683555 kernel: audit: type=1327 audit(1752579248.674:525): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338326539353763303966643566313762356433396461356436623831 Jul 15 11:34:08.674000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338326539353763303966643566313762356433396461356436623831 Jul 15 11:34:08.674000 audit[2008]: AVC avc: denied { bpf } for pid=2008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:08.690421 kernel: audit: type=1400 audit(1752579248.674:526): avc: denied { bpf } for pid=2008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:08.690463 kernel: audit: type=1400 audit(1752579248.674:526): avc: denied { bpf } for pid=2008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:08.674000 audit[2008]: AVC avc: denied { bpf } for pid=2008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:08.674000 audit[2008]: AVC avc: denied { bpf } for pid=2008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:08.696879 kernel: audit: type=1400 audit(1752579248.674:526): avc: denied { bpf } for pid=2008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:08.696968 kernel: audit: type=1400 audit(1752579248.674:526): avc: denied { perfmon } for pid=2008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:08.674000 audit[2008]: AVC avc: denied { perfmon } for pid=2008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:08.702782 kernel: audit: type=1400 audit(1752579248.674:526): avc: denied { perfmon } for pid=2008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:08.702893 kernel: audit: type=1400 audit(1752579248.674:526): avc: denied { perfmon } for pid=2008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:08.674000 audit[2008]: AVC avc: denied { perfmon } for pid=2008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:08.674000 audit[2008]: AVC avc: denied { perfmon } for pid=2008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:08.705577 kernel: audit: type=1400 audit(1752579248.674:526): avc: denied { perfmon } for pid=2008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:08.674000 audit[2008]: AVC avc: denied { perfmon } for pid=2008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:08.674000 audit[2008]: AVC avc: denied { perfmon } for pid=2008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:08.674000 audit[2008]: AVC avc: denied { bpf } for pid=2008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:08.674000 audit[2008]: AVC avc: denied { bpf } for pid=2008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:08.674000 audit: BPF prog-id=75 op=LOAD Jul 15 11:34:08.674000 audit[2008]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0003480f8 items=0 ppid=1506 pid=2008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:08.674000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338326539353763303966643566313762356433396461356436623831 Jul 15 11:34:08.678000 audit[2008]: AVC avc: denied { bpf } for pid=2008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:08.678000 audit[2008]: AVC avc: denied { bpf } for pid=2008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:08.678000 audit[2008]: AVC avc: denied { perfmon } for pid=2008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:08.678000 audit[2008]: AVC avc: denied { perfmon } for pid=2008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:08.678000 audit[2008]: AVC avc: denied { perfmon } for pid=2008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:08.678000 audit[2008]: AVC avc: denied { perfmon } for pid=2008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:08.678000 audit[2008]: AVC avc: denied { perfmon } for pid=2008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:08.678000 audit[2008]: AVC avc: denied { bpf } for pid=2008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:08.678000 audit[2008]: AVC avc: denied { bpf } for pid=2008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:08.678000 audit: BPF prog-id=76 op=LOAD Jul 15 11:34:08.678000 audit[2008]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000348148 items=0 ppid=1506 pid=2008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:08.678000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338326539353763303966643566313762356433396461356436623831 Jul 15 11:34:08.687000 audit: BPF prog-id=76 op=UNLOAD Jul 15 11:34:08.687000 audit: BPF prog-id=75 op=UNLOAD Jul 15 11:34:08.687000 audit[2008]: AVC avc: denied { bpf } for pid=2008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:08.687000 audit[2008]: AVC avc: denied { bpf } for pid=2008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:08.687000 audit[2008]: AVC avc: denied { bpf } for pid=2008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:08.687000 audit[2008]: AVC avc: denied { perfmon } for pid=2008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:08.687000 audit[2008]: AVC avc: denied { perfmon } for pid=2008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:08.687000 audit[2008]: AVC avc: denied { perfmon } for pid=2008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:08.687000 audit[2008]: AVC avc: denied { perfmon } for pid=2008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:08.687000 audit[2008]: AVC avc: denied { perfmon } for pid=2008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:08.687000 audit[2008]: AVC avc: denied { bpf } for pid=2008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:08.687000 audit[2008]: AVC avc: denied { bpf } for pid=2008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:08.687000 audit: BPF prog-id=77 op=LOAD Jul 15 11:34:08.687000 audit[2008]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0003481d8 items=0 ppid=1506 pid=2008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:08.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338326539353763303966643566313762356433396461356436623831 Jul 15 11:34:08.711252 env[1203]: time="2025-07-15T11:34:08.711213833Z" level=info msg="StartContainer for \"382e957c09fd5f17b5d39da5d6b81f39e6ad37ad6cbe18f2574348f74a0e7b01\" returns successfully" Jul 15 11:34:08.800571 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Jul 15 11:34:08.800688 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Jul 15 11:34:09.487157 kubelet[1445]: E0715 11:34:09.487114 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:09.906105 kubelet[1445]: I0715 11:34:09.906054 1445 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-stlwr" podStartSLOduration=4.587637433 podStartE2EDuration="24.906038912s" podCreationTimestamp="2025-07-15 11:33:45 +0000 UTC" firstStartedPulling="2025-07-15 11:33:48.162714005 +0000 UTC m=+4.079029121" lastFinishedPulling="2025-07-15 11:34:08.481115485 +0000 UTC m=+24.397430600" observedRunningTime="2025-07-15 11:34:09.820169643 +0000 UTC m=+25.736484768" watchObservedRunningTime="2025-07-15 11:34:09.906038912 +0000 UTC m=+25.822354027" Jul 15 11:34:10.202000 audit[2089]: NETFILTER_CFG table=filter:77 family=2 entries=12 op=nft_register_rule pid=2089 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:34:10.202000 audit[2089]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7fffad9128d0 a2=0 a3=7fffad9128bc items=0 ppid=1660 pid=2089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:10.202000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:34:10.211000 audit[2089]: NETFILTER_CFG table=nat:78 family=2 entries=22 op=nft_register_rule pid=2089 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:34:10.211000 audit[2089]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fffad9128d0 a2=0 a3=7fffad9128bc items=0 ppid=1660 pid=2089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:10.211000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:34:10.227000 audit[2091]: NETFILTER_CFG table=filter:79 family=2 entries=11 op=nft_register_rule pid=2091 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:34:10.227000 audit[2091]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffee243a490 a2=0 a3=7ffee243a47c items=0 ppid=1660 pid=2091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:10.227000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:34:10.232000 audit[2091]: NETFILTER_CFG table=nat:80 family=2 entries=29 op=nft_register_chain pid=2091 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:34:10.232000 audit[2091]: SYSCALL arch=c000003e syscall=46 success=yes exit=10116 a0=3 a1=7ffee243a490 a2=0 a3=7ffee243a47c items=0 ppid=1660 pid=2091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:10.232000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:34:10.296580 systemd[1]: run-containerd-runc-k8s.io-382e957c09fd5f17b5d39da5d6b81f39e6ad37ad6cbe18f2574348f74a0e7b01-runc.rUt4Vs.mount: Deactivated successfully. Jul 15 11:34:10.488379 kubelet[1445]: E0715 11:34:10.488192 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:11.155000 audit[2150]: AVC avc: denied { write } for pid=2150 comm="tee" name="fd" dev="proc" ino=21647 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 15 11:34:11.155000 audit[2150]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd6d7287da a2=241 a3=1b6 items=1 ppid=2129 pid=2150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.155000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Jul 15 11:34:11.155000 audit: PATH item=0 name="/dev/fd/63" inode=21641 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:34:11.155000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 15 11:34:11.157000 audit[2158]: AVC avc: denied { write } for pid=2158 comm="tee" name="fd" dev="proc" ino=21651 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 15 11:34:11.157000 audit[2158]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd52b617e9 a2=241 a3=1b6 items=1 ppid=2134 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.157000 audit: CWD cwd="/etc/service/enabled/felix/log" Jul 15 11:34:11.157000 audit: PATH item=0 name="/dev/fd/63" inode=21644 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:34:11.157000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 15 11:34:11.161000 audit[2167]: AVC avc: denied { write } for pid=2167 comm="tee" name="fd" dev="proc" ino=20720 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 15 11:34:11.161000 audit[2167]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd7b3667e9 a2=241 a3=1b6 items=1 ppid=2136 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.161000 audit: CWD cwd="/etc/service/enabled/bird6/log" Jul 15 11:34:11.161000 audit: PATH item=0 name="/dev/fd/63" inode=20713 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:34:11.161000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 15 11:34:11.163000 audit[2179]: AVC avc: denied { write } for pid=2179 comm="tee" name="fd" dev="proc" ino=20724 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 15 11:34:11.163000 audit[2179]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe87b6a7e9 a2=241 a3=1b6 items=1 ppid=2127 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.163000 audit: CWD cwd="/etc/service/enabled/confd/log" Jul 15 11:34:11.163000 audit: PATH item=0 name="/dev/fd/63" inode=20717 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:34:11.163000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 15 11:34:11.166000 audit[2193]: AVC avc: denied { write } for pid=2193 comm="tee" name="fd" dev="proc" ino=20731 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 15 11:34:11.166000 audit[2193]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd5054d7ea a2=241 a3=1b6 items=1 ppid=2123 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.166000 audit: CWD cwd="/etc/service/enabled/bird/log" Jul 15 11:34:11.166000 audit: PATH item=0 name="/dev/fd/63" inode=20728 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:34:11.166000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 15 11:34:11.176000 audit[2177]: AVC avc: denied { write } for pid=2177 comm="tee" name="fd" dev="proc" ino=20735 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 15 11:34:11.176000 audit[2177]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdacf1a7d9 a2=241 a3=1b6 items=1 ppid=2124 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.176000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Jul 15 11:34:11.176000 audit: PATH item=0 name="/dev/fd/63" inode=19189 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:34:11.176000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 15 11:34:11.177000 audit[2181]: AVC avc: denied { write } for pid=2181 comm="tee" name="fd" dev="proc" ino=21663 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 15 11:34:11.177000 audit[2181]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcd63487eb a2=241 a3=1b6 items=1 ppid=2133 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.177000 audit: CWD cwd="/etc/service/enabled/cni/log" Jul 15 11:34:11.177000 audit: PATH item=0 name="/dev/fd/63" inode=19190 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:34:11.177000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 15 11:34:11.297000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.297000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.297000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.297000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.297000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.297000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.297000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.297000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.297000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.297000 audit: BPF prog-id=78 op=LOAD Jul 15 11:34:11.297000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd7ebcac70 a2=98 a3=1fffffffffffffff items=0 ppid=2135 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.297000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 15 11:34:11.298000 audit: BPF prog-id=78 op=UNLOAD Jul 15 11:34:11.298000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.298000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.298000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.298000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.298000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.298000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.298000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.298000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.298000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.298000 audit: BPF prog-id=79 op=LOAD Jul 15 11:34:11.298000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd7ebcab50 a2=94 a3=3 items=0 ppid=2135 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.298000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 15 11:34:11.298000 audit: BPF prog-id=79 op=UNLOAD Jul 15 11:34:11.298000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.298000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.298000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.298000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.298000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.298000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.298000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.298000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.298000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.298000 audit: BPF prog-id=80 op=LOAD Jul 15 11:34:11.298000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd7ebcab90 a2=94 a3=7ffd7ebcad70 items=0 ppid=2135 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.298000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 15 11:34:11.298000 audit: BPF prog-id=80 op=UNLOAD Jul 15 11:34:11.298000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.298000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffd7ebcac60 a2=50 a3=a000000085 items=0 ppid=2135 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.298000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 15 11:34:11.299000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.299000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.299000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.299000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.299000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.299000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.299000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.299000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.299000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.299000 audit: BPF prog-id=81 op=LOAD Jul 15 11:34:11.299000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffeed085e60 a2=98 a3=3 items=0 ppid=2135 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.299000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:34:11.300000 audit: BPF prog-id=81 op=UNLOAD Jul 15 11:34:11.300000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.300000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.300000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.300000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.300000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.300000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.300000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.300000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.300000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.300000 audit: BPF prog-id=82 op=LOAD Jul 15 11:34:11.300000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffeed085c50 a2=94 a3=54428f items=0 ppid=2135 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.300000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:34:11.300000 audit: BPF prog-id=82 op=UNLOAD Jul 15 11:34:11.300000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.300000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.300000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.300000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.300000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.300000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.300000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.300000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.300000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.300000 audit: BPF prog-id=83 op=LOAD Jul 15 11:34:11.300000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffeed085c80 a2=94 a3=2 items=0 ppid=2135 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.300000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:34:11.300000 audit: BPF prog-id=83 op=UNLOAD Jul 15 11:34:11.400000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.400000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.400000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.400000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.400000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.400000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.400000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.400000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.400000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.400000 audit: BPF prog-id=84 op=LOAD Jul 15 11:34:11.400000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffeed085b40 a2=94 a3=1 items=0 ppid=2135 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.400000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:34:11.400000 audit: BPF prog-id=84 op=UNLOAD Jul 15 11:34:11.400000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.400000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffeed085c10 a2=50 a3=7ffeed085cf0 items=0 ppid=2135 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.400000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:34:11.408000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.408000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeed085b50 a2=28 a3=0 items=0 ppid=2135 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.408000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:34:11.408000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.408000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeed085b80 a2=28 a3=0 items=0 ppid=2135 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.408000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:34:11.408000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.408000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeed085a90 a2=28 a3=0 items=0 ppid=2135 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.408000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:34:11.408000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.408000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeed085ba0 a2=28 a3=0 items=0 ppid=2135 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.408000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:34:11.408000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.408000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeed085b80 a2=28 a3=0 items=0 ppid=2135 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.408000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:34:11.408000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.408000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeed085b70 a2=28 a3=0 items=0 ppid=2135 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.408000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:34:11.408000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.408000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeed085ba0 a2=28 a3=0 items=0 ppid=2135 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.408000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:34:11.408000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.408000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeed085b80 a2=28 a3=0 items=0 ppid=2135 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.408000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:34:11.408000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.408000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeed085ba0 a2=28 a3=0 items=0 ppid=2135 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.408000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:34:11.408000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.408000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeed085b70 a2=28 a3=0 items=0 ppid=2135 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.408000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:34:11.408000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.408000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeed085be0 a2=28 a3=0 items=0 ppid=2135 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.408000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:34:11.408000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.408000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffeed085990 a2=50 a3=1 items=0 ppid=2135 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.408000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:34:11.408000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.408000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.408000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.408000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.408000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.408000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.408000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.408000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.408000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.408000 audit: BPF prog-id=85 op=LOAD Jul 15 11:34:11.408000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffeed085990 a2=94 a3=5 items=0 ppid=2135 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.408000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:34:11.408000 audit: BPF prog-id=85 op=UNLOAD Jul 15 11:34:11.408000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.408000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffeed085a40 a2=50 a3=1 items=0 ppid=2135 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.408000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:34:11.408000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.408000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffeed085b60 a2=4 a3=38 items=0 ppid=2135 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.408000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:34:11.408000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.408000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.408000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.408000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.408000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.408000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.408000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.408000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.408000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.408000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.408000 audit[2243]: AVC avc: denied { confidentiality } for pid=2243 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:11.408000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffeed085bb0 a2=94 a3=6 items=0 ppid=2135 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.408000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:34:11.409000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.409000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.409000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.409000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.409000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.409000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.409000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.409000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.409000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.409000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.409000 audit[2243]: AVC avc: denied { confidentiality } for pid=2243 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:11.409000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffeed085360 a2=94 a3=88 items=0 ppid=2135 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.409000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:34:11.409000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.409000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.409000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.409000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.409000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.409000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.409000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.409000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.409000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.409000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.409000 audit[2243]: AVC avc: denied { confidentiality } for pid=2243 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:11.409000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffeed085360 a2=94 a3=88 items=0 ppid=2135 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.409000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 15 11:34:11.415000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.415000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.415000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.415000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.415000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.415000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.415000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.415000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.415000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.415000 audit: BPF prog-id=86 op=LOAD Jul 15 11:34:11.415000 audit[2246]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcdabf44f0 a2=98 a3=1999999999999999 items=0 ppid=2135 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.415000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Jul 15 11:34:11.415000 audit: BPF prog-id=86 op=UNLOAD Jul 15 11:34:11.415000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.415000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.415000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.415000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.415000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.415000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.415000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.415000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.415000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.415000 audit: BPF prog-id=87 op=LOAD Jul 15 11:34:11.415000 audit[2246]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcdabf43d0 a2=94 a3=ffff items=0 ppid=2135 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.415000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Jul 15 11:34:11.415000 audit: BPF prog-id=87 op=UNLOAD Jul 15 11:34:11.415000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.415000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.415000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.415000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.415000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.415000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.415000 audit[2246]: AVC avc: denied { perfmon } for pid=2246 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.415000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.415000 audit[2246]: AVC avc: denied { bpf } for pid=2246 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.415000 audit: BPF prog-id=88 op=LOAD Jul 15 11:34:11.415000 audit[2246]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcdabf4410 a2=94 a3=7ffcdabf45f0 items=0 ppid=2135 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.415000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Jul 15 11:34:11.415000 audit: BPF prog-id=88 op=UNLOAD Jul 15 11:34:11.459696 systemd-networkd[1029]: vxlan.calico: Link UP Jul 15 11:34:11.459704 systemd-networkd[1029]: vxlan.calico: Gained carrier Jul 15 11:34:11.478000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.478000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.478000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.478000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.478000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.478000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.478000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.478000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.478000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.478000 audit: BPF prog-id=89 op=LOAD Jul 15 11:34:11.478000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff7c3b6720 a2=98 a3=0 items=0 ppid=2135 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.478000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:34:11.478000 audit: BPF prog-id=89 op=UNLOAD Jul 15 11:34:11.479000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.479000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.479000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.479000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.479000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.479000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.479000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.479000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.479000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.479000 audit: BPF prog-id=90 op=LOAD Jul 15 11:34:11.479000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff7c3b6530 a2=94 a3=54428f items=0 ppid=2135 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.479000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:34:11.479000 audit: BPF prog-id=90 op=UNLOAD Jul 15 11:34:11.479000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.479000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.479000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.479000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.479000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.479000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.479000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.479000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.479000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.479000 audit: BPF prog-id=91 op=LOAD Jul 15 11:34:11.479000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff7c3b6560 a2=94 a3=2 items=0 ppid=2135 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.479000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:34:11.479000 audit: BPF prog-id=91 op=UNLOAD Jul 15 11:34:11.479000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.479000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff7c3b6430 a2=28 a3=0 items=0 ppid=2135 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.479000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:34:11.479000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.479000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff7c3b6460 a2=28 a3=0 items=0 ppid=2135 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.479000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:34:11.479000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.479000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff7c3b6370 a2=28 a3=0 items=0 ppid=2135 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.479000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:34:11.479000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.479000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff7c3b6480 a2=28 a3=0 items=0 ppid=2135 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.479000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:34:11.479000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.479000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff7c3b6460 a2=28 a3=0 items=0 ppid=2135 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.479000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:34:11.479000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.479000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff7c3b6450 a2=28 a3=0 items=0 ppid=2135 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.479000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:34:11.479000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.479000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff7c3b6480 a2=28 a3=0 items=0 ppid=2135 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.479000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:34:11.479000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.479000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff7c3b6460 a2=28 a3=0 items=0 ppid=2135 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.479000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:34:11.479000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.479000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff7c3b6480 a2=28 a3=0 items=0 ppid=2135 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.479000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:34:11.479000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.479000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff7c3b6450 a2=28 a3=0 items=0 ppid=2135 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.479000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:34:11.479000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.479000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff7c3b64c0 a2=28 a3=0 items=0 ppid=2135 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.479000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:34:11.479000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.479000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.479000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.479000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.479000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.479000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.479000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.479000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.479000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.479000 audit: BPF prog-id=92 op=LOAD Jul 15 11:34:11.479000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff7c3b6330 a2=94 a3=0 items=0 ppid=2135 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.479000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:34:11.479000 audit: BPF prog-id=92 op=UNLOAD Jul 15 11:34:11.480000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.480000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fff7c3b6320 a2=50 a3=2800 items=0 ppid=2135 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.480000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:34:11.480000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.480000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fff7c3b6320 a2=50 a3=2800 items=0 ppid=2135 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.480000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:34:11.480000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.480000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.480000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.480000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.480000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.480000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.480000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.480000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.480000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.480000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.480000 audit: BPF prog-id=93 op=LOAD Jul 15 11:34:11.480000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff7c3b5b40 a2=94 a3=2 items=0 ppid=2135 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.480000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:34:11.480000 audit: BPF prog-id=93 op=UNLOAD Jul 15 11:34:11.480000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.480000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.480000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.480000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.480000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.480000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.480000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.480000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.480000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.480000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.480000 audit: BPF prog-id=94 op=LOAD Jul 15 11:34:11.480000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff7c3b5c40 a2=94 a3=30 items=0 ppid=2135 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.480000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 15 11:34:11.484000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.484000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.484000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.484000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.484000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.484000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.484000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.484000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.484000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.484000 audit: BPF prog-id=95 op=LOAD Jul 15 11:34:11.484000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc80ec7a70 a2=98 a3=0 items=0 ppid=2135 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.484000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:34:11.484000 audit: BPF prog-id=95 op=UNLOAD Jul 15 11:34:11.484000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.484000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.484000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.484000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.484000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.484000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.484000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.484000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.484000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.484000 audit: BPF prog-id=96 op=LOAD Jul 15 11:34:11.484000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc80ec7860 a2=94 a3=54428f items=0 ppid=2135 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.484000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:34:11.484000 audit: BPF prog-id=96 op=UNLOAD Jul 15 11:34:11.484000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.484000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.484000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.484000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.484000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.484000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.484000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.484000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.484000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.484000 audit: BPF prog-id=97 op=LOAD Jul 15 11:34:11.484000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc80ec7890 a2=94 a3=2 items=0 ppid=2135 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.484000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:34:11.484000 audit: BPF prog-id=97 op=UNLOAD Jul 15 11:34:11.488615 kubelet[1445]: E0715 11:34:11.488578 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:11.585000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.585000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.585000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.585000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.585000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.585000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.585000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.585000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.585000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.585000 audit: BPF prog-id=98 op=LOAD Jul 15 11:34:11.585000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc80ec7750 a2=94 a3=1 items=0 ppid=2135 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.585000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:34:11.585000 audit: BPF prog-id=98 op=UNLOAD Jul 15 11:34:11.585000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.585000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc80ec7820 a2=50 a3=7ffc80ec7900 items=0 ppid=2135 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.585000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:34:11.593000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.593000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc80ec7760 a2=28 a3=0 items=0 ppid=2135 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.593000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:34:11.593000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.593000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc80ec7790 a2=28 a3=0 items=0 ppid=2135 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.593000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:34:11.593000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.593000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc80ec76a0 a2=28 a3=0 items=0 ppid=2135 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.593000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:34:11.593000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.593000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc80ec77b0 a2=28 a3=0 items=0 ppid=2135 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.593000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:34:11.593000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.593000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc80ec7790 a2=28 a3=0 items=0 ppid=2135 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.593000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:34:11.593000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.593000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc80ec7780 a2=28 a3=0 items=0 ppid=2135 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.593000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:34:11.593000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.593000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc80ec77b0 a2=28 a3=0 items=0 ppid=2135 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.593000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:34:11.593000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.593000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc80ec7790 a2=28 a3=0 items=0 ppid=2135 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.593000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:34:11.593000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.593000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc80ec77b0 a2=28 a3=0 items=0 ppid=2135 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.593000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:34:11.593000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.593000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc80ec7780 a2=28 a3=0 items=0 ppid=2135 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.593000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:34:11.593000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.593000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc80ec77f0 a2=28 a3=0 items=0 ppid=2135 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.593000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:34:11.593000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.593000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc80ec75a0 a2=50 a3=1 items=0 ppid=2135 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.593000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:34:11.593000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.593000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.593000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.593000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.593000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.593000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.593000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.593000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.593000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.593000 audit: BPF prog-id=99 op=LOAD Jul 15 11:34:11.593000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc80ec75a0 a2=94 a3=5 items=0 ppid=2135 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.593000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:34:11.593000 audit: BPF prog-id=99 op=UNLOAD Jul 15 11:34:11.593000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.593000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc80ec7650 a2=50 a3=1 items=0 ppid=2135 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.593000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:34:11.593000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.593000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc80ec7770 a2=4 a3=38 items=0 ppid=2135 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.593000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:34:11.593000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.593000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.593000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.593000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.593000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.593000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.593000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.593000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.593000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.593000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.593000 audit[2276]: AVC avc: denied { confidentiality } for pid=2276 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:11.593000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc80ec77c0 a2=94 a3=6 items=0 ppid=2135 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.593000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:34:11.593000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.593000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.593000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.593000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.593000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.593000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.593000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.593000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.593000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.593000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.593000 audit[2276]: AVC avc: denied { confidentiality } for pid=2276 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:11.593000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc80ec6f70 a2=94 a3=88 items=0 ppid=2135 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.593000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:34:11.594000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.594000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.594000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.594000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.594000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.594000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.594000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.594000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.594000 audit[2276]: AVC avc: denied { perfmon } for pid=2276 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.594000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.594000 audit[2276]: AVC avc: denied { confidentiality } for pid=2276 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:11.594000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc80ec6f70 a2=94 a3=88 items=0 ppid=2135 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.594000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:34:11.594000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.594000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc80ec89a0 a2=10 a3=208 items=0 ppid=2135 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.594000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:34:11.594000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.594000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc80ec8840 a2=10 a3=3 items=0 ppid=2135 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.594000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:34:11.594000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.594000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc80ec87e0 a2=10 a3=3 items=0 ppid=2135 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.594000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:34:11.594000 audit[2276]: AVC avc: denied { bpf } for pid=2276 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:11.594000 audit[2276]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc80ec87e0 a2=10 a3=7 items=0 ppid=2135 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.594000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 15 11:34:11.601000 audit: BPF prog-id=94 op=UNLOAD Jul 15 11:34:11.634000 audit[2304]: NETFILTER_CFG table=mangle:81 family=2 entries=16 op=nft_register_chain pid=2304 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 15 11:34:11.634000 audit[2304]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffdb23da110 a2=0 a3=7ffdb23da0fc items=0 ppid=2135 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.634000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 15 11:34:11.638000 audit[2303]: NETFILTER_CFG table=nat:82 family=2 entries=15 op=nft_register_chain pid=2303 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 15 11:34:11.638000 audit[2303]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7fffd7efec80 a2=0 a3=7fffd7efec6c items=0 ppid=2135 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.638000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 15 11:34:11.640000 audit[2307]: NETFILTER_CFG table=filter:83 family=2 entries=39 op=nft_register_chain pid=2307 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 15 11:34:11.640000 audit[2307]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffc9ebebbb0 a2=0 a3=7ffc9ebebb9c items=0 ppid=2135 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.640000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 15 11:34:11.642000 audit[2302]: NETFILTER_CFG table=raw:84 family=2 entries=21 op=nft_register_chain pid=2302 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 15 11:34:11.642000 audit[2302]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7fff700cc580 a2=0 a3=7fff700cc56c items=0 ppid=2135 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:11.642000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 15 11:34:12.231337 env[1203]: time="2025-07-15T11:34:12.231276770Z" level=info msg="StopPodSandbox for \"8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c\"" Jul 15 11:34:12.300697 env[1203]: 2025-07-15 11:34:12.269 [INFO][2324] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c" Jul 15 11:34:12.300697 env[1203]: 2025-07-15 11:34:12.270 [INFO][2324] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c" iface="eth0" netns="/var/run/netns/cni-d390f897-0e72-0401-1285-2b81a8a9d744" Jul 15 11:34:12.300697 env[1203]: 2025-07-15 11:34:12.270 [INFO][2324] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c" iface="eth0" netns="/var/run/netns/cni-d390f897-0e72-0401-1285-2b81a8a9d744" Jul 15 11:34:12.300697 env[1203]: 2025-07-15 11:34:12.270 [INFO][2324] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c" iface="eth0" netns="/var/run/netns/cni-d390f897-0e72-0401-1285-2b81a8a9d744" Jul 15 11:34:12.300697 env[1203]: 2025-07-15 11:34:12.270 [INFO][2324] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c" Jul 15 11:34:12.300697 env[1203]: 2025-07-15 11:34:12.270 [INFO][2324] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c" Jul 15 11:34:12.300697 env[1203]: 2025-07-15 11:34:12.288 [INFO][2333] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c" HandleID="k8s-pod-network.8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c" Workload="10.0.0.97-k8s-csi--node--driver--8hg42-eth0" Jul 15 11:34:12.300697 env[1203]: 2025-07-15 11:34:12.289 [INFO][2333] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 15 11:34:12.300697 env[1203]: 2025-07-15 11:34:12.289 [INFO][2333] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 15 11:34:12.300697 env[1203]: 2025-07-15 11:34:12.294 [WARNING][2333] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c" HandleID="k8s-pod-network.8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c" Workload="10.0.0.97-k8s-csi--node--driver--8hg42-eth0" Jul 15 11:34:12.300697 env[1203]: 2025-07-15 11:34:12.294 [INFO][2333] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c" HandleID="k8s-pod-network.8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c" Workload="10.0.0.97-k8s-csi--node--driver--8hg42-eth0" Jul 15 11:34:12.300697 env[1203]: 2025-07-15 11:34:12.295 [INFO][2333] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 15 11:34:12.300697 env[1203]: 2025-07-15 11:34:12.299 [INFO][2324] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c" Jul 15 11:34:12.302225 systemd[1]: run-netns-cni\x2dd390f897\x2d0e72\x2d0401\x2d1285\x2d2b81a8a9d744.mount: Deactivated successfully. Jul 15 11:34:12.302437 env[1203]: time="2025-07-15T11:34:12.302210832Z" level=info msg="TearDown network for sandbox \"8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c\" successfully" Jul 15 11:34:12.302437 env[1203]: time="2025-07-15T11:34:12.302240523Z" level=info msg="StopPodSandbox for \"8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c\" returns successfully" Jul 15 11:34:12.303053 env[1203]: time="2025-07-15T11:34:12.303027262Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-8hg42,Uid:d9742bb2-a259-4759-a746-30d9f682ecb8,Namespace:calico-system,Attempt:1,}" Jul 15 11:34:12.489707 kubelet[1445]: E0715 11:34:12.489671 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:12.731696 systemd-networkd[1029]: cali166b9c3a681: Link UP Jul 15 11:34:12.733889 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 15 11:34:12.733942 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali166b9c3a681: link becomes ready Jul 15 11:34:12.733893 systemd-networkd[1029]: cali166b9c3a681: Gained carrier Jul 15 11:34:12.744017 env[1203]: 2025-07-15 11:34:12.682 [INFO][2342] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.97-k8s-csi--node--driver--8hg42-eth0 csi-node-driver- calico-system d9742bb2-a259-4759-a746-30d9f682ecb8 1209 0 2025-07-15 11:33:45 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:8967bcb6f k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.0.0.97 csi-node-driver-8hg42 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali166b9c3a681 [] [] }} ContainerID="b31e143a54b4c6125b633735a19303ae87d6b741b82ef71b5a3157470850669d" Namespace="calico-system" Pod="csi-node-driver-8hg42" WorkloadEndpoint="10.0.0.97-k8s-csi--node--driver--8hg42-" Jul 15 11:34:12.744017 env[1203]: 2025-07-15 11:34:12.682 [INFO][2342] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="b31e143a54b4c6125b633735a19303ae87d6b741b82ef71b5a3157470850669d" Namespace="calico-system" Pod="csi-node-driver-8hg42" WorkloadEndpoint="10.0.0.97-k8s-csi--node--driver--8hg42-eth0" Jul 15 11:34:12.744017 env[1203]: 2025-07-15 11:34:12.702 [INFO][2355] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b31e143a54b4c6125b633735a19303ae87d6b741b82ef71b5a3157470850669d" HandleID="k8s-pod-network.b31e143a54b4c6125b633735a19303ae87d6b741b82ef71b5a3157470850669d" Workload="10.0.0.97-k8s-csi--node--driver--8hg42-eth0" Jul 15 11:34:12.744017 env[1203]: 2025-07-15 11:34:12.702 [INFO][2355] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b31e143a54b4c6125b633735a19303ae87d6b741b82ef71b5a3157470850669d" HandleID="k8s-pod-network.b31e143a54b4c6125b633735a19303ae87d6b741b82ef71b5a3157470850669d" Workload="10.0.0.97-k8s-csi--node--driver--8hg42-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000138610), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.97", "pod":"csi-node-driver-8hg42", "timestamp":"2025-07-15 11:34:12.702744342 +0000 UTC"}, Hostname:"10.0.0.97", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 15 11:34:12.744017 env[1203]: 2025-07-15 11:34:12.703 [INFO][2355] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 15 11:34:12.744017 env[1203]: 2025-07-15 11:34:12.703 [INFO][2355] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 15 11:34:12.744017 env[1203]: 2025-07-15 11:34:12.703 [INFO][2355] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.97' Jul 15 11:34:12.744017 env[1203]: 2025-07-15 11:34:12.708 [INFO][2355] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.b31e143a54b4c6125b633735a19303ae87d6b741b82ef71b5a3157470850669d" host="10.0.0.97" Jul 15 11:34:12.744017 env[1203]: 2025-07-15 11:34:12.712 [INFO][2355] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.97" Jul 15 11:34:12.744017 env[1203]: 2025-07-15 11:34:12.716 [INFO][2355] ipam/ipam.go 511: Trying affinity for 192.168.107.192/26 host="10.0.0.97" Jul 15 11:34:12.744017 env[1203]: 2025-07-15 11:34:12.717 [INFO][2355] ipam/ipam.go 158: Attempting to load block cidr=192.168.107.192/26 host="10.0.0.97" Jul 15 11:34:12.744017 env[1203]: 2025-07-15 11:34:12.719 [INFO][2355] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.107.192/26 host="10.0.0.97" Jul 15 11:34:12.744017 env[1203]: 2025-07-15 11:34:12.719 [INFO][2355] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.107.192/26 handle="k8s-pod-network.b31e143a54b4c6125b633735a19303ae87d6b741b82ef71b5a3157470850669d" host="10.0.0.97" Jul 15 11:34:12.744017 env[1203]: 2025-07-15 11:34:12.720 [INFO][2355] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.b31e143a54b4c6125b633735a19303ae87d6b741b82ef71b5a3157470850669d Jul 15 11:34:12.744017 env[1203]: 2025-07-15 11:34:12.723 [INFO][2355] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.107.192/26 handle="k8s-pod-network.b31e143a54b4c6125b633735a19303ae87d6b741b82ef71b5a3157470850669d" host="10.0.0.97" Jul 15 11:34:12.744017 env[1203]: 2025-07-15 11:34:12.728 [INFO][2355] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.107.193/26] block=192.168.107.192/26 handle="k8s-pod-network.b31e143a54b4c6125b633735a19303ae87d6b741b82ef71b5a3157470850669d" host="10.0.0.97" Jul 15 11:34:12.744017 env[1203]: 2025-07-15 11:34:12.728 [INFO][2355] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.107.193/26] handle="k8s-pod-network.b31e143a54b4c6125b633735a19303ae87d6b741b82ef71b5a3157470850669d" host="10.0.0.97" Jul 15 11:34:12.744017 env[1203]: 2025-07-15 11:34:12.728 [INFO][2355] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 15 11:34:12.744017 env[1203]: 2025-07-15 11:34:12.728 [INFO][2355] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.107.193/26] IPv6=[] ContainerID="b31e143a54b4c6125b633735a19303ae87d6b741b82ef71b5a3157470850669d" HandleID="k8s-pod-network.b31e143a54b4c6125b633735a19303ae87d6b741b82ef71b5a3157470850669d" Workload="10.0.0.97-k8s-csi--node--driver--8hg42-eth0" Jul 15 11:34:12.744760 env[1203]: 2025-07-15 11:34:12.729 [INFO][2342] cni-plugin/k8s.go 418: Populated endpoint ContainerID="b31e143a54b4c6125b633735a19303ae87d6b741b82ef71b5a3157470850669d" Namespace="calico-system" Pod="csi-node-driver-8hg42" WorkloadEndpoint="10.0.0.97-k8s-csi--node--driver--8hg42-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.97-k8s-csi--node--driver--8hg42-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d9742bb2-a259-4759-a746-30d9f682ecb8", ResourceVersion:"1209", Generation:0, CreationTimestamp:time.Date(2025, time.July, 15, 11, 33, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"8967bcb6f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.97", ContainerID:"", Pod:"csi-node-driver-8hg42", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.107.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali166b9c3a681", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 15 11:34:12.744760 env[1203]: 2025-07-15 11:34:12.729 [INFO][2342] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.107.193/32] ContainerID="b31e143a54b4c6125b633735a19303ae87d6b741b82ef71b5a3157470850669d" Namespace="calico-system" Pod="csi-node-driver-8hg42" WorkloadEndpoint="10.0.0.97-k8s-csi--node--driver--8hg42-eth0" Jul 15 11:34:12.744760 env[1203]: 2025-07-15 11:34:12.729 [INFO][2342] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali166b9c3a681 ContainerID="b31e143a54b4c6125b633735a19303ae87d6b741b82ef71b5a3157470850669d" Namespace="calico-system" Pod="csi-node-driver-8hg42" WorkloadEndpoint="10.0.0.97-k8s-csi--node--driver--8hg42-eth0" Jul 15 11:34:12.744760 env[1203]: 2025-07-15 11:34:12.734 [INFO][2342] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b31e143a54b4c6125b633735a19303ae87d6b741b82ef71b5a3157470850669d" Namespace="calico-system" Pod="csi-node-driver-8hg42" WorkloadEndpoint="10.0.0.97-k8s-csi--node--driver--8hg42-eth0" Jul 15 11:34:12.744760 env[1203]: 2025-07-15 11:34:12.734 [INFO][2342] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="b31e143a54b4c6125b633735a19303ae87d6b741b82ef71b5a3157470850669d" Namespace="calico-system" Pod="csi-node-driver-8hg42" WorkloadEndpoint="10.0.0.97-k8s-csi--node--driver--8hg42-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.97-k8s-csi--node--driver--8hg42-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d9742bb2-a259-4759-a746-30d9f682ecb8", ResourceVersion:"1209", Generation:0, CreationTimestamp:time.Date(2025, time.July, 15, 11, 33, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"8967bcb6f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.97", ContainerID:"b31e143a54b4c6125b633735a19303ae87d6b741b82ef71b5a3157470850669d", Pod:"csi-node-driver-8hg42", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.107.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali166b9c3a681", MAC:"3a:d9:41:d5:96:fc", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 15 11:34:12.744760 env[1203]: 2025-07-15 11:34:12.742 [INFO][2342] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="b31e143a54b4c6125b633735a19303ae87d6b741b82ef71b5a3157470850669d" Namespace="calico-system" Pod="csi-node-driver-8hg42" WorkloadEndpoint="10.0.0.97-k8s-csi--node--driver--8hg42-eth0" Jul 15 11:34:12.754875 env[1203]: time="2025-07-15T11:34:12.754813455Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 15 11:34:12.754875 env[1203]: time="2025-07-15T11:34:12.754855665Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 15 11:34:12.754875 env[1203]: time="2025-07-15T11:34:12.754870900Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 15 11:34:12.755122 env[1203]: time="2025-07-15T11:34:12.755024681Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b31e143a54b4c6125b633735a19303ae87d6b741b82ef71b5a3157470850669d pid=2380 runtime=io.containerd.runc.v2 Jul 15 11:34:12.769098 systemd[1]: Started cri-containerd-b31e143a54b4c6125b633735a19303ae87d6b741b82ef71b5a3157470850669d.scope. Jul 15 11:34:12.759000 audit[2381]: NETFILTER_CFG table=filter:85 family=2 entries=38 op=nft_register_chain pid=2381 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 15 11:34:12.759000 audit[2381]: SYSCALL arch=c000003e syscall=46 success=yes exit=21364 a0=3 a1=7ffd78b90e20 a2=0 a3=7ffd78b90e0c items=0 ppid=2135 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:12.759000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 15 11:34:12.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:12.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:12.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:12.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:12.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:12.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:12.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:12.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:12.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:12.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:12.776000 audit: BPF prog-id=100 op=LOAD Jul 15 11:34:12.776000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:12.776000 audit[2391]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2380 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:12.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233316531343361353462346336313235623633333733356131393330 Jul 15 11:34:12.776000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:12.776000 audit[2391]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2380 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:12.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233316531343361353462346336313235623633333733356131393330 Jul 15 11:34:12.776000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:12.776000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:12.776000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:12.776000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:12.776000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:12.776000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:12.776000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:12.776000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:12.776000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:12.776000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:12.776000 audit: BPF prog-id=101 op=LOAD Jul 15 11:34:12.776000 audit[2391]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000323b50 items=0 ppid=2380 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:12.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233316531343361353462346336313235623633333733356131393330 Jul 15 11:34:12.777000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:12.777000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:12.777000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:12.777000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:12.777000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:12.777000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:12.777000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:12.777000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:12.777000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:12.777000 audit: BPF prog-id=102 op=LOAD Jul 15 11:34:12.777000 audit[2391]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000323b98 items=0 ppid=2380 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:12.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233316531343361353462346336313235623633333733356131393330 Jul 15 11:34:12.777000 audit: BPF prog-id=102 op=UNLOAD Jul 15 11:34:12.777000 audit: BPF prog-id=101 op=UNLOAD Jul 15 11:34:12.777000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:12.777000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:12.777000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:12.777000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:12.777000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:12.777000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:12.777000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:12.777000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:12.777000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:12.777000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:12.777000 audit: BPF prog-id=103 op=LOAD Jul 15 11:34:12.777000 audit[2391]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000323fa8 items=0 ppid=2380 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:12.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233316531343361353462346336313235623633333733356131393330 Jul 15 11:34:12.778302 systemd-resolved[1149]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 15 11:34:12.785863 env[1203]: time="2025-07-15T11:34:12.785085293Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-8hg42,Uid:d9742bb2-a259-4759-a746-30d9f682ecb8,Namespace:calico-system,Attempt:1,} returns sandbox id \"b31e143a54b4c6125b633735a19303ae87d6b741b82ef71b5a3157470850669d\"" Jul 15 11:34:12.786291 env[1203]: time="2025-07-15T11:34:12.786272424Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.2\"" Jul 15 11:34:13.160949 systemd-networkd[1029]: vxlan.calico: Gained IPv6LL Jul 15 11:34:13.490089 kubelet[1445]: E0715 11:34:13.490033 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:14.249041 env[1203]: time="2025-07-15T11:34:14.248990443Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:34:14.251926 env[1203]: time="2025-07-15T11:34:14.251899976Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c7fd1cc652979d89a51bbcc125e28e90c9815c0bd8f922a5bd36eed4e1927c6d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:34:14.253429 env[1203]: time="2025-07-15T11:34:14.253400780Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:34:14.254797 env[1203]: time="2025-07-15T11:34:14.254769629Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e570128aa8067a2f06b96d3cc98afa2e0a4b9790b435ee36ca051c8e72aeb8d0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:34:14.255177 env[1203]: time="2025-07-15T11:34:14.255145824Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.2\" returns image reference \"sha256:c7fd1cc652979d89a51bbcc125e28e90c9815c0bd8f922a5bd36eed4e1927c6d\"" Jul 15 11:34:14.256703 env[1203]: time="2025-07-15T11:34:14.256682038Z" level=info msg="CreateContainer within sandbox \"b31e143a54b4c6125b633735a19303ae87d6b741b82ef71b5a3157470850669d\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Jul 15 11:34:14.269912 env[1203]: time="2025-07-15T11:34:14.269877073Z" level=info msg="CreateContainer within sandbox \"b31e143a54b4c6125b633735a19303ae87d6b741b82ef71b5a3157470850669d\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"f0dd9315db3b9bed76bb3d6b7d6581b89ba5738c64de5c73b9c76cb59cf9af3f\"" Jul 15 11:34:14.270313 env[1203]: time="2025-07-15T11:34:14.270292027Z" level=info msg="StartContainer for \"f0dd9315db3b9bed76bb3d6b7d6581b89ba5738c64de5c73b9c76cb59cf9af3f\"" Jul 15 11:34:14.286549 systemd[1]: Started cri-containerd-f0dd9315db3b9bed76bb3d6b7d6581b89ba5738c64de5c73b9c76cb59cf9af3f.scope. Jul 15 11:34:14.296000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:14.299010 kernel: kauditd_printk_skb: 662 callbacks suppressed Jul 15 11:34:14.299065 kernel: audit: type=1400 audit(1752579254.296:663): avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:14.296000 audit[2426]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fe6f24e50a8 items=0 ppid=2380 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:14.306186 kernel: audit: type=1300 audit(1752579254.296:663): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fe6f24e50a8 items=0 ppid=2380 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:14.306233 kernel: audit: type=1327 audit(1752579254.296:663): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630646439333135646233623962656437366262336436623764363538 Jul 15 11:34:14.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630646439333135646233623962656437366262336436623764363538 Jul 15 11:34:14.296000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:14.312803 kernel: audit: type=1400 audit(1752579254.296:664): avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:14.312875 kernel: audit: type=1400 audit(1752579254.296:664): avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:14.296000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:14.296000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:14.318285 kernel: audit: type=1400 audit(1752579254.296:664): avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:14.296000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:14.321175 kernel: audit: type=1400 audit(1752579254.296:664): avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:14.324396 kernel: audit: type=1400 audit(1752579254.296:664): avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:14.296000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:14.327746 kernel: audit: type=1400 audit(1752579254.296:664): avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:14.296000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:14.327850 env[1203]: time="2025-07-15T11:34:14.325366265Z" level=info msg="StartContainer for \"f0dd9315db3b9bed76bb3d6b7d6581b89ba5738c64de5c73b9c76cb59cf9af3f\" returns successfully" Jul 15 11:34:14.327850 env[1203]: time="2025-07-15T11:34:14.326441679Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2\"" Jul 15 11:34:14.331412 kernel: audit: type=1400 audit(1752579254.296:664): avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:14.296000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:14.296000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:14.296000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:14.296000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:14.296000 audit: BPF prog-id=104 op=LOAD Jul 15 11:34:14.296000 audit[2426]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001f92c8 items=0 ppid=2380 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:14.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630646439333135646233623962656437366262336436623764363538 Jul 15 11:34:14.300000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:14.300000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:14.300000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:14.300000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:14.300000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:14.300000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:14.300000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:14.300000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:14.300000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:14.300000 audit: BPF prog-id=105 op=LOAD Jul 15 11:34:14.300000 audit[2426]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001f9318 items=0 ppid=2380 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:14.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630646439333135646233623962656437366262336436623764363538 Jul 15 11:34:14.304000 audit: BPF prog-id=105 op=UNLOAD Jul 15 11:34:14.304000 audit: BPF prog-id=104 op=UNLOAD Jul 15 11:34:14.304000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:14.304000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:14.304000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:14.304000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:14.304000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:14.304000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:14.304000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:14.304000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:14.304000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:14.304000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:14.304000 audit: BPF prog-id=106 op=LOAD Jul 15 11:34:14.304000 audit[2426]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001f93a8 items=0 ppid=2380 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:14.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630646439333135646233623962656437366262336436623764363538 Jul 15 11:34:14.376929 systemd-networkd[1029]: cali166b9c3a681: Gained IPv6LL Jul 15 11:34:14.490675 kubelet[1445]: E0715 11:34:14.490644 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:15.231755 env[1203]: time="2025-07-15T11:34:15.231691932Z" level=info msg="StopPodSandbox for \"c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca\"" Jul 15 11:34:15.293498 env[1203]: 2025-07-15 11:34:15.266 [INFO][2465] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca" Jul 15 11:34:15.293498 env[1203]: 2025-07-15 11:34:15.266 [INFO][2465] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca" iface="eth0" netns="/var/run/netns/cni-93512d2b-699b-06f5-7e47-d301d03a3012" Jul 15 11:34:15.293498 env[1203]: 2025-07-15 11:34:15.267 [INFO][2465] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca" iface="eth0" netns="/var/run/netns/cni-93512d2b-699b-06f5-7e47-d301d03a3012" Jul 15 11:34:15.293498 env[1203]: 2025-07-15 11:34:15.267 [INFO][2465] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca" iface="eth0" netns="/var/run/netns/cni-93512d2b-699b-06f5-7e47-d301d03a3012" Jul 15 11:34:15.293498 env[1203]: 2025-07-15 11:34:15.267 [INFO][2465] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca" Jul 15 11:34:15.293498 env[1203]: 2025-07-15 11:34:15.267 [INFO][2465] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca" Jul 15 11:34:15.293498 env[1203]: 2025-07-15 11:34:15.283 [INFO][2474] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca" HandleID="k8s-pod-network.c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca" Workload="10.0.0.97-k8s-nginx--deployment--7fcdb87857--wxx57-eth0" Jul 15 11:34:15.293498 env[1203]: 2025-07-15 11:34:15.283 [INFO][2474] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 15 11:34:15.293498 env[1203]: 2025-07-15 11:34:15.283 [INFO][2474] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 15 11:34:15.293498 env[1203]: 2025-07-15 11:34:15.289 [WARNING][2474] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca" HandleID="k8s-pod-network.c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca" Workload="10.0.0.97-k8s-nginx--deployment--7fcdb87857--wxx57-eth0" Jul 15 11:34:15.293498 env[1203]: 2025-07-15 11:34:15.289 [INFO][2474] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca" HandleID="k8s-pod-network.c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca" Workload="10.0.0.97-k8s-nginx--deployment--7fcdb87857--wxx57-eth0" Jul 15 11:34:15.293498 env[1203]: 2025-07-15 11:34:15.290 [INFO][2474] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 15 11:34:15.293498 env[1203]: 2025-07-15 11:34:15.292 [INFO][2465] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca" Jul 15 11:34:15.294370 env[1203]: time="2025-07-15T11:34:15.293749051Z" level=info msg="TearDown network for sandbox \"c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca\" successfully" Jul 15 11:34:15.294370 env[1203]: time="2025-07-15T11:34:15.293783590Z" level=info msg="StopPodSandbox for \"c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca\" returns successfully" Jul 15 11:34:15.294370 env[1203]: time="2025-07-15T11:34:15.294298653Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-wxx57,Uid:4bb21fac-42ba-44fa-94e2-a7d2565b8791,Namespace:default,Attempt:1,}" Jul 15 11:34:15.295203 systemd[1]: run-netns-cni\x2d93512d2b\x2d699b\x2d06f5\x2d7e47\x2dd301d03a3012.mount: Deactivated successfully. Jul 15 11:34:15.491091 kubelet[1445]: E0715 11:34:15.490797 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:15.978485 systemd-networkd[1029]: calie16cf7fc1bb: Link UP Jul 15 11:34:15.979755 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 15 11:34:15.979805 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie16cf7fc1bb: link becomes ready Jul 15 11:34:15.981180 systemd-networkd[1029]: calie16cf7fc1bb: Gained carrier Jul 15 11:34:15.995857 env[1203]: 2025-07-15 11:34:15.332 [INFO][2483] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.97-k8s-nginx--deployment--7fcdb87857--wxx57-eth0 nginx-deployment-7fcdb87857- default 4bb21fac-42ba-44fa-94e2-a7d2565b8791 1227 0 2025-07-15 11:34:02 +0000 UTC map[app:nginx pod-template-hash:7fcdb87857 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.97 nginx-deployment-7fcdb87857-wxx57 eth0 default [] [] [kns.default ksa.default.default] calie16cf7fc1bb [] [] }} ContainerID="17af47a95d3cf268670f2bb3723e6c32512a22fb95e2f37f9f7bd89dec9933f4" Namespace="default" Pod="nginx-deployment-7fcdb87857-wxx57" WorkloadEndpoint="10.0.0.97-k8s-nginx--deployment--7fcdb87857--wxx57-" Jul 15 11:34:15.995857 env[1203]: 2025-07-15 11:34:15.332 [INFO][2483] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="17af47a95d3cf268670f2bb3723e6c32512a22fb95e2f37f9f7bd89dec9933f4" Namespace="default" Pod="nginx-deployment-7fcdb87857-wxx57" WorkloadEndpoint="10.0.0.97-k8s-nginx--deployment--7fcdb87857--wxx57-eth0" Jul 15 11:34:15.995857 env[1203]: 2025-07-15 11:34:15.355 [INFO][2496] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="17af47a95d3cf268670f2bb3723e6c32512a22fb95e2f37f9f7bd89dec9933f4" HandleID="k8s-pod-network.17af47a95d3cf268670f2bb3723e6c32512a22fb95e2f37f9f7bd89dec9933f4" Workload="10.0.0.97-k8s-nginx--deployment--7fcdb87857--wxx57-eth0" Jul 15 11:34:15.995857 env[1203]: 2025-07-15 11:34:15.355 [INFO][2496] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="17af47a95d3cf268670f2bb3723e6c32512a22fb95e2f37f9f7bd89dec9933f4" HandleID="k8s-pod-network.17af47a95d3cf268670f2bb3723e6c32512a22fb95e2f37f9f7bd89dec9933f4" Workload="10.0.0.97-k8s-nginx--deployment--7fcdb87857--wxx57-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004e810), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.97", "pod":"nginx-deployment-7fcdb87857-wxx57", "timestamp":"2025-07-15 11:34:15.355635604 +0000 UTC"}, Hostname:"10.0.0.97", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 15 11:34:15.995857 env[1203]: 2025-07-15 11:34:15.355 [INFO][2496] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 15 11:34:15.995857 env[1203]: 2025-07-15 11:34:15.355 [INFO][2496] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 15 11:34:15.995857 env[1203]: 2025-07-15 11:34:15.355 [INFO][2496] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.97' Jul 15 11:34:15.995857 env[1203]: 2025-07-15 11:34:15.362 [INFO][2496] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.17af47a95d3cf268670f2bb3723e6c32512a22fb95e2f37f9f7bd89dec9933f4" host="10.0.0.97" Jul 15 11:34:15.995857 env[1203]: 2025-07-15 11:34:15.367 [INFO][2496] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.97" Jul 15 11:34:15.995857 env[1203]: 2025-07-15 11:34:15.371 [INFO][2496] ipam/ipam.go 511: Trying affinity for 192.168.107.192/26 host="10.0.0.97" Jul 15 11:34:15.995857 env[1203]: 2025-07-15 11:34:15.373 [INFO][2496] ipam/ipam.go 158: Attempting to load block cidr=192.168.107.192/26 host="10.0.0.97" Jul 15 11:34:15.995857 env[1203]: 2025-07-15 11:34:15.375 [INFO][2496] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.107.192/26 host="10.0.0.97" Jul 15 11:34:15.995857 env[1203]: 2025-07-15 11:34:15.375 [INFO][2496] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.107.192/26 handle="k8s-pod-network.17af47a95d3cf268670f2bb3723e6c32512a22fb95e2f37f9f7bd89dec9933f4" host="10.0.0.97" Jul 15 11:34:15.995857 env[1203]: 2025-07-15 11:34:15.377 [INFO][2496] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.17af47a95d3cf268670f2bb3723e6c32512a22fb95e2f37f9f7bd89dec9933f4 Jul 15 11:34:15.995857 env[1203]: 2025-07-15 11:34:15.382 [INFO][2496] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.107.192/26 handle="k8s-pod-network.17af47a95d3cf268670f2bb3723e6c32512a22fb95e2f37f9f7bd89dec9933f4" host="10.0.0.97" Jul 15 11:34:15.995857 env[1203]: 2025-07-15 11:34:15.648 [INFO][2496] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.107.194/26] block=192.168.107.192/26 handle="k8s-pod-network.17af47a95d3cf268670f2bb3723e6c32512a22fb95e2f37f9f7bd89dec9933f4" host="10.0.0.97" Jul 15 11:34:15.995857 env[1203]: 2025-07-15 11:34:15.648 [INFO][2496] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.107.194/26] handle="k8s-pod-network.17af47a95d3cf268670f2bb3723e6c32512a22fb95e2f37f9f7bd89dec9933f4" host="10.0.0.97" Jul 15 11:34:15.995857 env[1203]: 2025-07-15 11:34:15.648 [INFO][2496] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 15 11:34:15.995857 env[1203]: 2025-07-15 11:34:15.648 [INFO][2496] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.107.194/26] IPv6=[] ContainerID="17af47a95d3cf268670f2bb3723e6c32512a22fb95e2f37f9f7bd89dec9933f4" HandleID="k8s-pod-network.17af47a95d3cf268670f2bb3723e6c32512a22fb95e2f37f9f7bd89dec9933f4" Workload="10.0.0.97-k8s-nginx--deployment--7fcdb87857--wxx57-eth0" Jul 15 11:34:15.996551 env[1203]: 2025-07-15 11:34:15.650 [INFO][2483] cni-plugin/k8s.go 418: Populated endpoint ContainerID="17af47a95d3cf268670f2bb3723e6c32512a22fb95e2f37f9f7bd89dec9933f4" Namespace="default" Pod="nginx-deployment-7fcdb87857-wxx57" WorkloadEndpoint="10.0.0.97-k8s-nginx--deployment--7fcdb87857--wxx57-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.97-k8s-nginx--deployment--7fcdb87857--wxx57-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"4bb21fac-42ba-44fa-94e2-a7d2565b8791", ResourceVersion:"1227", Generation:0, CreationTimestamp:time.Date(2025, time.July, 15, 11, 34, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.97", ContainerID:"", Pod:"nginx-deployment-7fcdb87857-wxx57", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.107.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calie16cf7fc1bb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 15 11:34:15.996551 env[1203]: 2025-07-15 11:34:15.650 [INFO][2483] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.107.194/32] ContainerID="17af47a95d3cf268670f2bb3723e6c32512a22fb95e2f37f9f7bd89dec9933f4" Namespace="default" Pod="nginx-deployment-7fcdb87857-wxx57" WorkloadEndpoint="10.0.0.97-k8s-nginx--deployment--7fcdb87857--wxx57-eth0" Jul 15 11:34:15.996551 env[1203]: 2025-07-15 11:34:15.650 [INFO][2483] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calie16cf7fc1bb ContainerID="17af47a95d3cf268670f2bb3723e6c32512a22fb95e2f37f9f7bd89dec9933f4" Namespace="default" Pod="nginx-deployment-7fcdb87857-wxx57" WorkloadEndpoint="10.0.0.97-k8s-nginx--deployment--7fcdb87857--wxx57-eth0" Jul 15 11:34:15.996551 env[1203]: 2025-07-15 11:34:15.981 [INFO][2483] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="17af47a95d3cf268670f2bb3723e6c32512a22fb95e2f37f9f7bd89dec9933f4" Namespace="default" Pod="nginx-deployment-7fcdb87857-wxx57" WorkloadEndpoint="10.0.0.97-k8s-nginx--deployment--7fcdb87857--wxx57-eth0" Jul 15 11:34:15.996551 env[1203]: 2025-07-15 11:34:15.981 [INFO][2483] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="17af47a95d3cf268670f2bb3723e6c32512a22fb95e2f37f9f7bd89dec9933f4" Namespace="default" Pod="nginx-deployment-7fcdb87857-wxx57" WorkloadEndpoint="10.0.0.97-k8s-nginx--deployment--7fcdb87857--wxx57-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.97-k8s-nginx--deployment--7fcdb87857--wxx57-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"4bb21fac-42ba-44fa-94e2-a7d2565b8791", ResourceVersion:"1227", Generation:0, CreationTimestamp:time.Date(2025, time.July, 15, 11, 34, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.97", ContainerID:"17af47a95d3cf268670f2bb3723e6c32512a22fb95e2f37f9f7bd89dec9933f4", Pod:"nginx-deployment-7fcdb87857-wxx57", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.107.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calie16cf7fc1bb", MAC:"26:49:6e:b6:5f:e6", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 15 11:34:15.996551 env[1203]: 2025-07-15 11:34:15.989 [INFO][2483] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="17af47a95d3cf268670f2bb3723e6c32512a22fb95e2f37f9f7bd89dec9933f4" Namespace="default" Pod="nginx-deployment-7fcdb87857-wxx57" WorkloadEndpoint="10.0.0.97-k8s-nginx--deployment--7fcdb87857--wxx57-eth0" Jul 15 11:34:16.002000 audit[2513]: NETFILTER_CFG table=filter:86 family=2 entries=42 op=nft_register_chain pid=2513 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 15 11:34:16.002000 audit[2513]: SYSCALL arch=c000003e syscall=46 success=yes exit=22512 a0=3 a1=7ffc346ae5a0 a2=0 a3=7ffc346ae58c items=0 ppid=2135 pid=2513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:16.002000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 15 11:34:16.011836 env[1203]: time="2025-07-15T11:34:16.011779442Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 15 11:34:16.011968 env[1203]: time="2025-07-15T11:34:16.011830728Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 15 11:34:16.011968 env[1203]: time="2025-07-15T11:34:16.011840661Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 15 11:34:16.012072 env[1203]: time="2025-07-15T11:34:16.011966334Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/17af47a95d3cf268670f2bb3723e6c32512a22fb95e2f37f9f7bd89dec9933f4 pid=2520 runtime=io.containerd.runc.v2 Jul 15 11:34:16.040961 systemd[1]: Started cri-containerd-17af47a95d3cf268670f2bb3723e6c32512a22fb95e2f37f9f7bd89dec9933f4.scope. Jul 15 11:34:16.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.050000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.050000 audit: BPF prog-id=107 op=LOAD Jul 15 11:34:16.050000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.050000 audit[2529]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2520 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:16.050000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137616634376139356433636632363836373066326262333732336536 Jul 15 11:34:16.050000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.050000 audit[2529]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2520 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:16.050000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137616634376139356433636632363836373066326262333732336536 Jul 15 11:34:16.050000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.050000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.050000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.050000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.050000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.050000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.050000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.050000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.050000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.050000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.050000 audit: BPF prog-id=108 op=LOAD Jul 15 11:34:16.050000 audit[2529]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00026bf10 items=0 ppid=2520 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:16.050000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137616634376139356433636632363836373066326262333732336536 Jul 15 11:34:16.050000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.050000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.050000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.050000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.050000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.050000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.050000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.050000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.050000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.050000 audit: BPF prog-id=109 op=LOAD Jul 15 11:34:16.050000 audit[2529]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00026bf58 items=0 ppid=2520 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:16.050000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137616634376139356433636632363836373066326262333732336536 Jul 15 11:34:16.050000 audit: BPF prog-id=109 op=UNLOAD Jul 15 11:34:16.050000 audit: BPF prog-id=108 op=UNLOAD Jul 15 11:34:16.050000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.050000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.050000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.050000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.050000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.050000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.050000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.050000 audit[2529]: AVC avc: denied { perfmon } for pid=2529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.050000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.050000 audit[2529]: AVC avc: denied { bpf } for pid=2529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.050000 audit: BPF prog-id=110 op=LOAD Jul 15 11:34:16.050000 audit[2529]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00036a368 items=0 ppid=2520 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:16.050000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137616634376139356433636632363836373066326262333732336536 Jul 15 11:34:16.051915 systemd-resolved[1149]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 15 11:34:16.070808 env[1203]: time="2025-07-15T11:34:16.070761683Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-wxx57,Uid:4bb21fac-42ba-44fa-94e2-a7d2565b8791,Namespace:default,Attempt:1,} returns sandbox id \"17af47a95d3cf268670f2bb3723e6c32512a22fb95e2f37f9f7bd89dec9933f4\"" Jul 15 11:34:16.290677 env[1203]: time="2025-07-15T11:34:16.290617826Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:34:16.292490 env[1203]: time="2025-07-15T11:34:16.292435756Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9e48822a4fe26f4ed9231b361fdd1357ea3567f1fc0a8db4d616622fe570a866,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:34:16.294244 env[1203]: time="2025-07-15T11:34:16.294205610Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:34:16.295598 env[1203]: time="2025-07-15T11:34:16.295573015Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:8fec2de12dfa51bae89d941938a07af2598eb8bfcab55d0dded1d9c193d7b99f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:34:16.296012 env[1203]: time="2025-07-15T11:34:16.295991750Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2\" returns image reference \"sha256:9e48822a4fe26f4ed9231b361fdd1357ea3567f1fc0a8db4d616622fe570a866\"" Jul 15 11:34:16.297300 env[1203]: time="2025-07-15T11:34:16.297283093Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Jul 15 11:34:16.297989 env[1203]: time="2025-07-15T11:34:16.297958627Z" level=info msg="CreateContainer within sandbox \"b31e143a54b4c6125b633735a19303ae87d6b741b82ef71b5a3157470850669d\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Jul 15 11:34:16.316009 env[1203]: time="2025-07-15T11:34:16.315975816Z" level=info msg="CreateContainer within sandbox \"b31e143a54b4c6125b633735a19303ae87d6b741b82ef71b5a3157470850669d\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"a8240d0730a1b4d970d0e71766a3b808c70ea8f9c2ab52c01d96dc9624699642\"" Jul 15 11:34:16.316403 env[1203]: time="2025-07-15T11:34:16.316370947Z" level=info msg="StartContainer for \"a8240d0730a1b4d970d0e71766a3b808c70ea8f9c2ab52c01d96dc9624699642\"" Jul 15 11:34:16.333862 systemd[1]: Started cri-containerd-a8240d0730a1b4d970d0e71766a3b808c70ea8f9c2ab52c01d96dc9624699642.scope. Jul 15 11:34:16.342000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.342000 audit[2563]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f5b0a489130 items=0 ppid=2380 pid=2563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:16.342000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138323430643037333061316234643937306430653731373636613362 Jul 15 11:34:16.342000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.342000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.342000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.342000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.342000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.342000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.342000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.342000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.342000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.342000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.342000 audit: BPF prog-id=111 op=LOAD Jul 15 11:34:16.342000 audit[2563]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003a8c98 items=0 ppid=2380 pid=2563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:16.342000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138323430643037333061316234643937306430653731373636613362 Jul 15 11:34:16.342000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.342000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.342000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.342000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.342000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.342000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.342000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.342000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.342000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.342000 audit: BPF prog-id=112 op=LOAD Jul 15 11:34:16.342000 audit[2563]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003a8ce8 items=0 ppid=2380 pid=2563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:16.342000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138323430643037333061316234643937306430653731373636613362 Jul 15 11:34:16.342000 audit: BPF prog-id=112 op=UNLOAD Jul 15 11:34:16.343000 audit: BPF prog-id=111 op=UNLOAD Jul 15 11:34:16.343000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.343000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.343000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.343000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.343000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.343000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.343000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.343000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.343000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.343000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:16.343000 audit: BPF prog-id=113 op=LOAD Jul 15 11:34:16.343000 audit[2563]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003a8d78 items=0 ppid=2380 pid=2563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:16.343000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138323430643037333061316234643937306430653731373636613362 Jul 15 11:34:16.356037 env[1203]: time="2025-07-15T11:34:16.355995916Z" level=info msg="StartContainer for \"a8240d0730a1b4d970d0e71766a3b808c70ea8f9c2ab52c01d96dc9624699642\" returns successfully" Jul 15 11:34:16.387029 kubelet[1445]: I0715 11:34:16.387002 1445 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Jul 15 11:34:16.387029 kubelet[1445]: I0715 11:34:16.387029 1445 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Jul 15 11:34:16.491318 kubelet[1445]: E0715 11:34:16.491259 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:17.491583 kubelet[1445]: E0715 11:34:17.491547 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:17.576853 systemd-networkd[1029]: calie16cf7fc1bb: Gained IPv6LL Jul 15 11:34:18.492220 kubelet[1445]: E0715 11:34:18.492175 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:19.493146 kubelet[1445]: E0715 11:34:19.493070 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:19.663457 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount865254516.mount: Deactivated successfully. Jul 15 11:34:20.494222 kubelet[1445]: E0715 11:34:20.494187 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:21.494586 kubelet[1445]: E0715 11:34:21.494533 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:21.603953 env[1203]: time="2025-07-15T11:34:21.603879977Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:34:21.605628 env[1203]: time="2025-07-15T11:34:21.605605397Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f6422896ca84c9af48d5417d6b7a573bf6b38f81edc15538907d987fc658d909,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:34:21.607350 env[1203]: time="2025-07-15T11:34:21.607314401Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:34:21.609173 env[1203]: time="2025-07-15T11:34:21.609121316Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:30bb68e656e0665bce700e67d2756f68bdca3345fa1099a32bfdb8febcf621cd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:34:21.609774 env[1203]: time="2025-07-15T11:34:21.609740749Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:f6422896ca84c9af48d5417d6b7a573bf6b38f81edc15538907d987fc658d909\"" Jul 15 11:34:21.611705 env[1203]: time="2025-07-15T11:34:21.611671884Z" level=info msg="CreateContainer within sandbox \"17af47a95d3cf268670f2bb3723e6c32512a22fb95e2f37f9f7bd89dec9933f4\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Jul 15 11:34:21.624148 env[1203]: time="2025-07-15T11:34:21.624107506Z" level=info msg="CreateContainer within sandbox \"17af47a95d3cf268670f2bb3723e6c32512a22fb95e2f37f9f7bd89dec9933f4\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"704412d8e127c820bd40046e89d8d33d2dcf4395e60ec831c8a34c33d824ed4e\"" Jul 15 11:34:21.624611 env[1203]: time="2025-07-15T11:34:21.624574398Z" level=info msg="StartContainer for \"704412d8e127c820bd40046e89d8d33d2dcf4395e60ec831c8a34c33d824ed4e\"" Jul 15 11:34:21.642217 systemd[1]: Started cri-containerd-704412d8e127c820bd40046e89d8d33d2dcf4395e60ec831c8a34c33d824ed4e.scope. Jul 15 11:34:21.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:21.655066 kernel: kauditd_printk_skb: 136 callbacks suppressed Jul 15 11:34:21.655122 kernel: audit: type=1400 audit(1752579261.653:694): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:21.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:21.660530 kernel: audit: type=1400 audit(1752579261.653:695): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:21.660584 kernel: audit: type=1400 audit(1752579261.653:696): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:21.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:21.663291 kernel: audit: type=1400 audit(1752579261.653:697): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:21.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:21.666104 kernel: audit: type=1400 audit(1752579261.653:698): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:21.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:21.668836 kernel: audit: type=1400 audit(1752579261.653:699): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:21.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:21.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:21.674380 kernel: audit: type=1400 audit(1752579261.653:700): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:21.674429 kernel: audit: type=1400 audit(1752579261.653:701): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:21.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:21.677139 kernel: audit: type=1400 audit(1752579261.653:702): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:21.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:21.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:21.682584 kernel: audit: type=1400 audit(1752579261.657:703): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:21.657000 audit: BPF prog-id=114 op=LOAD Jul 15 11:34:21.657000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:21.657000 audit[2607]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2520 pid=2607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:21.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730343431326438653132376338323062643430303436653839643864 Jul 15 11:34:21.657000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:21.657000 audit[2607]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2520 pid=2607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:21.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730343431326438653132376338323062643430303436653839643864 Jul 15 11:34:21.657000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:21.657000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:21.657000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:21.657000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:21.657000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:21.657000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:21.657000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:21.657000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:21.657000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:21.657000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:21.657000 audit: BPF prog-id=115 op=LOAD Jul 15 11:34:21.657000 audit[2607]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001bac90 items=0 ppid=2520 pid=2607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:21.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730343431326438653132376338323062643430303436653839643864 Jul 15 11:34:21.659000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:21.659000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:21.659000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:21.659000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:21.659000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:21.659000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:21.659000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:21.659000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:21.659000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:21.659000 audit: BPF prog-id=116 op=LOAD Jul 15 11:34:21.659000 audit[2607]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001bacd8 items=0 ppid=2520 pid=2607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:21.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730343431326438653132376338323062643430303436653839643864 Jul 15 11:34:21.668000 audit: BPF prog-id=116 op=UNLOAD Jul 15 11:34:21.668000 audit: BPF prog-id=115 op=UNLOAD Jul 15 11:34:21.668000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:21.668000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:21.668000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:21.668000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:21.668000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:21.668000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:21.668000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:21.668000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:21.668000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:21.668000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:21.668000 audit: BPF prog-id=117 op=LOAD Jul 15 11:34:21.668000 audit[2607]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001bb0e8 items=0 ppid=2520 pid=2607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:21.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730343431326438653132376338323062643430303436653839643864 Jul 15 11:34:21.693000 env[1203]: time="2025-07-15T11:34:21.692951571Z" level=info msg="StartContainer for \"704412d8e127c820bd40046e89d8d33d2dcf4395e60ec831c8a34c33d824ed4e\" returns successfully" Jul 15 11:34:22.316965 kubelet[1445]: I0715 11:34:22.316902 1445 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-8hg42" podStartSLOduration=33.806247179 podStartE2EDuration="37.316884527s" podCreationTimestamp="2025-07-15 11:33:45 +0000 UTC" firstStartedPulling="2025-07-15 11:34:12.785950336 +0000 UTC m=+28.702265451" lastFinishedPulling="2025-07-15 11:34:16.296587684 +0000 UTC m=+32.212902799" observedRunningTime="2025-07-15 11:34:17.341084926 +0000 UTC m=+33.257400051" watchObservedRunningTime="2025-07-15 11:34:22.316884527 +0000 UTC m=+38.233199642" Jul 15 11:34:22.317167 kubelet[1445]: I0715 11:34:22.317027 1445 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-7fcdb87857-wxx57" podStartSLOduration=14.777803659 podStartE2EDuration="20.317023385s" podCreationTimestamp="2025-07-15 11:34:02 +0000 UTC" firstStartedPulling="2025-07-15 11:34:16.071455138 +0000 UTC m=+31.987770253" lastFinishedPulling="2025-07-15 11:34:21.610674864 +0000 UTC m=+37.526989979" observedRunningTime="2025-07-15 11:34:22.316855725 +0000 UTC m=+38.233170840" watchObservedRunningTime="2025-07-15 11:34:22.317023385 +0000 UTC m=+38.233338500" Jul 15 11:34:22.495008 kubelet[1445]: E0715 11:34:22.494990 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:23.103374 update_engine[1192]: I0715 11:34:23.103319 1192 update_attempter.cc:509] Updating boot flags... Jul 15 11:34:23.495539 kubelet[1445]: E0715 11:34:23.495514 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:24.471610 kubelet[1445]: E0715 11:34:24.471554 1445 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:24.496158 kubelet[1445]: E0715 11:34:24.496120 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:25.345000 audit[2680]: NETFILTER_CFG table=filter:87 family=2 entries=22 op=nft_register_rule pid=2680 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:34:25.345000 audit[2680]: SYSCALL arch=c000003e syscall=46 success=yes exit=12688 a0=3 a1=7ffe89b737c0 a2=0 a3=7ffe89b737ac items=0 ppid=1660 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:25.345000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:34:25.350000 audit[2680]: NETFILTER_CFG table=nat:88 family=2 entries=24 op=nft_register_rule pid=2680 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:34:25.350000 audit[2680]: SYSCALL arch=c000003e syscall=46 success=yes exit=7308 a0=3 a1=7ffe89b737c0 a2=0 a3=0 items=0 ppid=1660 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:25.350000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:34:25.367000 audit[2682]: NETFILTER_CFG table=filter:89 family=2 entries=34 op=nft_register_rule pid=2682 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:34:25.367000 audit[2682]: SYSCALL arch=c000003e syscall=46 success=yes exit=12688 a0=3 a1=7fff3c314a60 a2=0 a3=7fff3c314a4c items=0 ppid=1660 pid=2682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:25.367000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:34:25.376000 audit[2682]: NETFILTER_CFG table=nat:90 family=2 entries=24 op=nft_register_rule pid=2682 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:34:25.376000 audit[2682]: SYSCALL arch=c000003e syscall=46 success=yes exit=7308 a0=3 a1=7fff3c314a60 a2=0 a3=0 items=0 ppid=1660 pid=2682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:25.376000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:34:25.394111 systemd[1]: Created slice kubepods-besteffort-podee040711_cf92_4934_9c8b_7f21fb306b13.slice. Jul 15 11:34:25.448893 kubelet[1445]: I0715 11:34:25.448839 1445 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/ee040711-cf92-4934-9c8b-7f21fb306b13-data\") pod \"nfs-server-provisioner-0\" (UID: \"ee040711-cf92-4934-9c8b-7f21fb306b13\") " pod="default/nfs-server-provisioner-0" Jul 15 11:34:25.448893 kubelet[1445]: I0715 11:34:25.448887 1445 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jx8lf\" (UniqueName: \"kubernetes.io/projected/ee040711-cf92-4934-9c8b-7f21fb306b13-kube-api-access-jx8lf\") pod \"nfs-server-provisioner-0\" (UID: \"ee040711-cf92-4934-9c8b-7f21fb306b13\") " pod="default/nfs-server-provisioner-0" Jul 15 11:34:25.496287 kubelet[1445]: E0715 11:34:25.496219 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:25.696871 env[1203]: time="2025-07-15T11:34:25.696691642Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:ee040711-cf92-4934-9c8b-7f21fb306b13,Namespace:default,Attempt:0,}" Jul 15 11:34:26.360584 systemd-networkd[1029]: cali60e51b789ff: Link UP Jul 15 11:34:26.365753 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 15 11:34:26.365832 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Jul 15 11:34:26.366044 systemd-networkd[1029]: cali60e51b789ff: Gained carrier Jul 15 11:34:26.374904 env[1203]: 2025-07-15 11:34:26.310 [INFO][2688] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.97-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default ee040711-cf92-4934-9c8b-7f21fb306b13 1287 0 2025-07-15 11:34:25 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.0.0.97 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="70bffef8e5a0d50a14007bff6b621e73b1f3828bf2b5b832498eb12204f40d8c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.97-k8s-nfs--server--provisioner--0-" Jul 15 11:34:26.374904 env[1203]: 2025-07-15 11:34:26.310 [INFO][2688] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="70bffef8e5a0d50a14007bff6b621e73b1f3828bf2b5b832498eb12204f40d8c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.97-k8s-nfs--server--provisioner--0-eth0" Jul 15 11:34:26.374904 env[1203]: 2025-07-15 11:34:26.330 [INFO][2701] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="70bffef8e5a0d50a14007bff6b621e73b1f3828bf2b5b832498eb12204f40d8c" HandleID="k8s-pod-network.70bffef8e5a0d50a14007bff6b621e73b1f3828bf2b5b832498eb12204f40d8c" Workload="10.0.0.97-k8s-nfs--server--provisioner--0-eth0" Jul 15 11:34:26.374904 env[1203]: 2025-07-15 11:34:26.330 [INFO][2701] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="70bffef8e5a0d50a14007bff6b621e73b1f3828bf2b5b832498eb12204f40d8c" HandleID="k8s-pod-network.70bffef8e5a0d50a14007bff6b621e73b1f3828bf2b5b832498eb12204f40d8c" Workload="10.0.0.97-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004f750), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.97", "pod":"nfs-server-provisioner-0", "timestamp":"2025-07-15 11:34:26.33061699 +0000 UTC"}, Hostname:"10.0.0.97", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 15 11:34:26.374904 env[1203]: 2025-07-15 11:34:26.330 [INFO][2701] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 15 11:34:26.374904 env[1203]: 2025-07-15 11:34:26.330 [INFO][2701] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 15 11:34:26.374904 env[1203]: 2025-07-15 11:34:26.330 [INFO][2701] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.97' Jul 15 11:34:26.374904 env[1203]: 2025-07-15 11:34:26.336 [INFO][2701] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.70bffef8e5a0d50a14007bff6b621e73b1f3828bf2b5b832498eb12204f40d8c" host="10.0.0.97" Jul 15 11:34:26.374904 env[1203]: 2025-07-15 11:34:26.340 [INFO][2701] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.97" Jul 15 11:34:26.374904 env[1203]: 2025-07-15 11:34:26.343 [INFO][2701] ipam/ipam.go 511: Trying affinity for 192.168.107.192/26 host="10.0.0.97" Jul 15 11:34:26.374904 env[1203]: 2025-07-15 11:34:26.345 [INFO][2701] ipam/ipam.go 158: Attempting to load block cidr=192.168.107.192/26 host="10.0.0.97" Jul 15 11:34:26.374904 env[1203]: 2025-07-15 11:34:26.346 [INFO][2701] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.107.192/26 host="10.0.0.97" Jul 15 11:34:26.374904 env[1203]: 2025-07-15 11:34:26.347 [INFO][2701] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.107.192/26 handle="k8s-pod-network.70bffef8e5a0d50a14007bff6b621e73b1f3828bf2b5b832498eb12204f40d8c" host="10.0.0.97" Jul 15 11:34:26.374904 env[1203]: 2025-07-15 11:34:26.348 [INFO][2701] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.70bffef8e5a0d50a14007bff6b621e73b1f3828bf2b5b832498eb12204f40d8c Jul 15 11:34:26.374904 env[1203]: 2025-07-15 11:34:26.351 [INFO][2701] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.107.192/26 handle="k8s-pod-network.70bffef8e5a0d50a14007bff6b621e73b1f3828bf2b5b832498eb12204f40d8c" host="10.0.0.97" Jul 15 11:34:26.374904 env[1203]: 2025-07-15 11:34:26.356 [INFO][2701] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.107.195/26] block=192.168.107.192/26 handle="k8s-pod-network.70bffef8e5a0d50a14007bff6b621e73b1f3828bf2b5b832498eb12204f40d8c" host="10.0.0.97" Jul 15 11:34:26.374904 env[1203]: 2025-07-15 11:34:26.356 [INFO][2701] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.107.195/26] handle="k8s-pod-network.70bffef8e5a0d50a14007bff6b621e73b1f3828bf2b5b832498eb12204f40d8c" host="10.0.0.97" Jul 15 11:34:26.374904 env[1203]: 2025-07-15 11:34:26.356 [INFO][2701] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 15 11:34:26.374904 env[1203]: 2025-07-15 11:34:26.356 [INFO][2701] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.107.195/26] IPv6=[] ContainerID="70bffef8e5a0d50a14007bff6b621e73b1f3828bf2b5b832498eb12204f40d8c" HandleID="k8s-pod-network.70bffef8e5a0d50a14007bff6b621e73b1f3828bf2b5b832498eb12204f40d8c" Workload="10.0.0.97-k8s-nfs--server--provisioner--0-eth0" Jul 15 11:34:26.375645 env[1203]: 2025-07-15 11:34:26.358 [INFO][2688] cni-plugin/k8s.go 418: Populated endpoint ContainerID="70bffef8e5a0d50a14007bff6b621e73b1f3828bf2b5b832498eb12204f40d8c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.97-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.97-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"ee040711-cf92-4934-9c8b-7f21fb306b13", ResourceVersion:"1287", Generation:0, CreationTimestamp:time.Date(2025, time.July, 15, 11, 34, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.97", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.107.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 15 11:34:26.375645 env[1203]: 2025-07-15 11:34:26.358 [INFO][2688] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.107.195/32] ContainerID="70bffef8e5a0d50a14007bff6b621e73b1f3828bf2b5b832498eb12204f40d8c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.97-k8s-nfs--server--provisioner--0-eth0" Jul 15 11:34:26.375645 env[1203]: 2025-07-15 11:34:26.358 [INFO][2688] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="70bffef8e5a0d50a14007bff6b621e73b1f3828bf2b5b832498eb12204f40d8c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.97-k8s-nfs--server--provisioner--0-eth0" Jul 15 11:34:26.375645 env[1203]: 2025-07-15 11:34:26.366 [INFO][2688] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="70bffef8e5a0d50a14007bff6b621e73b1f3828bf2b5b832498eb12204f40d8c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.97-k8s-nfs--server--provisioner--0-eth0" Jul 15 11:34:26.375898 env[1203]: 2025-07-15 11:34:26.366 [INFO][2688] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="70bffef8e5a0d50a14007bff6b621e73b1f3828bf2b5b832498eb12204f40d8c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.97-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.97-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"ee040711-cf92-4934-9c8b-7f21fb306b13", ResourceVersion:"1287", Generation:0, CreationTimestamp:time.Date(2025, time.July, 15, 11, 34, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.97", ContainerID:"70bffef8e5a0d50a14007bff6b621e73b1f3828bf2b5b832498eb12204f40d8c", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.107.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"92:29:fe:c9:a3:7a", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 15 11:34:26.375898 env[1203]: 2025-07-15 11:34:26.373 [INFO][2688] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="70bffef8e5a0d50a14007bff6b621e73b1f3828bf2b5b832498eb12204f40d8c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.97-k8s-nfs--server--provisioner--0-eth0" Jul 15 11:34:26.385266 env[1203]: time="2025-07-15T11:34:26.385203092Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 15 11:34:26.385455 env[1203]: time="2025-07-15T11:34:26.385245953Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 15 11:34:26.385567 env[1203]: time="2025-07-15T11:34:26.385443137Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 15 11:34:26.385821 env[1203]: time="2025-07-15T11:34:26.385782039Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/70bffef8e5a0d50a14007bff6b621e73b1f3828bf2b5b832498eb12204f40d8c pid=2728 runtime=io.containerd.runc.v2 Jul 15 11:34:26.384000 audit[2734]: NETFILTER_CFG table=filter:91 family=2 entries=40 op=nft_register_chain pid=2734 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 15 11:34:26.384000 audit[2734]: SYSCALL arch=c000003e syscall=46 success=yes exit=20756 a0=3 a1=7ffefcc26ba0 a2=0 a3=7ffefcc26b8c items=0 ppid=2135 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:26.384000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 15 11:34:26.399396 systemd[1]: Started cri-containerd-70bffef8e5a0d50a14007bff6b621e73b1f3828bf2b5b832498eb12204f40d8c.scope. Jul 15 11:34:26.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:26.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:26.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:26.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:26.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:26.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:26.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:26.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:26.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:26.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:26.405000 audit: BPF prog-id=118 op=LOAD Jul 15 11:34:26.406000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:26.406000 audit[2739]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2728 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:26.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730626666656638653561306435306131343030376266663662363231 Jul 15 11:34:26.406000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:26.406000 audit[2739]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2728 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:26.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730626666656638653561306435306131343030376266663662363231 Jul 15 11:34:26.406000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:26.406000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:26.406000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:26.406000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:26.406000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:26.406000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:26.406000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:26.406000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:26.406000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:26.406000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:26.406000 audit: BPF prog-id=119 op=LOAD Jul 15 11:34:26.406000 audit[2739]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001a16e0 items=0 ppid=2728 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:26.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730626666656638653561306435306131343030376266663662363231 Jul 15 11:34:26.406000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:26.406000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:26.406000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:26.406000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:26.406000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:26.406000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:26.406000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:26.406000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:26.406000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:26.406000 audit: BPF prog-id=120 op=LOAD Jul 15 11:34:26.406000 audit[2739]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001a1728 items=0 ppid=2728 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:26.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730626666656638653561306435306131343030376266663662363231 Jul 15 11:34:26.406000 audit: BPF prog-id=120 op=UNLOAD Jul 15 11:34:26.406000 audit: BPF prog-id=119 op=UNLOAD Jul 15 11:34:26.406000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:26.406000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:26.406000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:26.406000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:26.406000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:26.406000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:26.406000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:26.406000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:26.406000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:26.406000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:26.406000 audit: BPF prog-id=121 op=LOAD Jul 15 11:34:26.406000 audit[2739]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0001a1b38 items=0 ppid=2728 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:26.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730626666656638653561306435306131343030376266663662363231 Jul 15 11:34:26.408837 systemd-resolved[1149]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 15 11:34:26.428691 env[1203]: time="2025-07-15T11:34:26.428640299Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:ee040711-cf92-4934-9c8b-7f21fb306b13,Namespace:default,Attempt:0,} returns sandbox id \"70bffef8e5a0d50a14007bff6b621e73b1f3828bf2b5b832498eb12204f40d8c\"" Jul 15 11:34:26.430426 env[1203]: time="2025-07-15T11:34:26.430391451Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Jul 15 11:34:26.496944 kubelet[1445]: E0715 11:34:26.496910 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:26.886000 audit[2761]: NETFILTER_CFG table=filter:92 family=2 entries=34 op=nft_register_rule pid=2761 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:34:26.889250 kernel: kauditd_printk_skb: 119 callbacks suppressed Jul 15 11:34:26.889296 kernel: audit: type=1325 audit(1752579266.886:735): table=filter:92 family=2 entries=34 op=nft_register_rule pid=2761 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:34:26.886000 audit[2761]: SYSCALL arch=c000003e syscall=46 success=yes exit=12688 a0=3 a1=7ffd4bf50c30 a2=0 a3=7ffd4bf50c1c items=0 ppid=1660 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:26.896743 kernel: audit: type=1300 audit(1752579266.886:735): arch=c000003e syscall=46 success=yes exit=12688 a0=3 a1=7ffd4bf50c30 a2=0 a3=7ffd4bf50c1c items=0 ppid=1660 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:26.896791 kernel: audit: type=1327 audit(1752579266.886:735): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:34:26.886000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:34:26.901000 audit[2761]: NETFILTER_CFG table=nat:93 family=2 entries=36 op=nft_register_chain pid=2761 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:34:26.901000 audit[2761]: SYSCALL arch=c000003e syscall=46 success=yes exit=12004 a0=3 a1=7ffd4bf50c30 a2=0 a3=7ffd4bf50c1c items=0 ppid=1660 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:26.916162 kernel: audit: type=1325 audit(1752579266.901:736): table=nat:93 family=2 entries=36 op=nft_register_chain pid=2761 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:34:26.916237 kernel: audit: type=1300 audit(1752579266.901:736): arch=c000003e syscall=46 success=yes exit=12004 a0=3 a1=7ffd4bf50c30 a2=0 a3=7ffd4bf50c1c items=0 ppid=1660 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:26.916270 kernel: audit: type=1327 audit(1752579266.901:736): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:34:26.901000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:34:27.432990 systemd-networkd[1029]: cali60e51b789ff: Gained IPv6LL Jul 15 11:34:27.497299 kubelet[1445]: E0715 11:34:27.497259 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:28.497520 kubelet[1445]: E0715 11:34:28.497480 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:28.747358 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1363431272.mount: Deactivated successfully. Jul 15 11:34:29.498660 kubelet[1445]: E0715 11:34:29.498599 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:30.499464 kubelet[1445]: E0715 11:34:30.499407 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:31.081675 env[1203]: time="2025-07-15T11:34:31.081617776Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:34:31.083450 env[1203]: time="2025-07-15T11:34:31.083402366Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:34:31.085009 env[1203]: time="2025-07-15T11:34:31.084985150Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:34:31.086599 env[1203]: time="2025-07-15T11:34:31.086567484Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:34:31.087265 env[1203]: time="2025-07-15T11:34:31.087228854Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Jul 15 11:34:31.089176 env[1203]: time="2025-07-15T11:34:31.089151367Z" level=info msg="CreateContainer within sandbox \"70bffef8e5a0d50a14007bff6b621e73b1f3828bf2b5b832498eb12204f40d8c\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Jul 15 11:34:31.100209 env[1203]: time="2025-07-15T11:34:31.100176589Z" level=info msg="CreateContainer within sandbox \"70bffef8e5a0d50a14007bff6b621e73b1f3828bf2b5b832498eb12204f40d8c\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"8198f51002059296ebc01b9adf7ff8c8ac03ff9d844572dacb3052c810fa447a\"" Jul 15 11:34:31.100570 env[1203]: time="2025-07-15T11:34:31.100543634Z" level=info msg="StartContainer for \"8198f51002059296ebc01b9adf7ff8c8ac03ff9d844572dacb3052c810fa447a\"" Jul 15 11:34:31.118680 systemd[1]: Started cri-containerd-8198f51002059296ebc01b9adf7ff8c8ac03ff9d844572dacb3052c810fa447a.scope. Jul 15 11:34:31.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:31.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:31.133565 kernel: audit: type=1400 audit(1752579271.125:737): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:31.133630 kernel: audit: type=1400 audit(1752579271.125:738): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:31.133666 kernel: audit: type=1400 audit(1752579271.125:739): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:31.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:31.136653 kernel: audit: type=1400 audit(1752579271.125:740): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:31.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:31.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:31.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:31.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:31.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:31.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:31.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:31.128000 audit: BPF prog-id=122 op=LOAD Jul 15 11:34:31.129000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:31.129000 audit[2769]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2728 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:31.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831393866353130303230353932393665626330316239616466376666 Jul 15 11:34:31.129000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:31.129000 audit[2769]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2728 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:31.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831393866353130303230353932393665626330316239616466376666 Jul 15 11:34:31.129000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:31.129000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:31.129000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:31.129000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:31.129000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:31.129000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:31.129000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:31.129000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:31.129000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:31.129000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:31.129000 audit: BPF prog-id=123 op=LOAD Jul 15 11:34:31.129000 audit[2769]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003922e0 items=0 ppid=2728 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:31.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831393866353130303230353932393665626330316239616466376666 Jul 15 11:34:31.131000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:31.131000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:31.131000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:31.131000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:31.131000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:31.131000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:31.131000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:31.131000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:31.131000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:31.131000 audit: BPF prog-id=124 op=LOAD Jul 15 11:34:31.131000 audit[2769]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000392328 items=0 ppid=2728 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:31.131000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831393866353130303230353932393665626330316239616466376666 Jul 15 11:34:31.134000 audit: BPF prog-id=124 op=UNLOAD Jul 15 11:34:31.134000 audit: BPF prog-id=123 op=UNLOAD Jul 15 11:34:31.134000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:31.134000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:31.134000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:31.134000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:31.134000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:31.134000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:31.134000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:31.134000 audit[2769]: AVC avc: denied { perfmon } for pid=2769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:31.134000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:31.134000 audit[2769]: AVC avc: denied { bpf } for pid=2769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:31.134000 audit: BPF prog-id=125 op=LOAD Jul 15 11:34:31.134000 audit[2769]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000392738 items=0 ppid=2728 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:31.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831393866353130303230353932393665626330316239616466376666 Jul 15 11:34:31.155757 env[1203]: time="2025-07-15T11:34:31.153480752Z" level=info msg="StartContainer for \"8198f51002059296ebc01b9adf7ff8c8ac03ff9d844572dacb3052c810fa447a\" returns successfully" Jul 15 11:34:31.185000 audit[2797]: AVC avc: denied { search } for pid=2797 comm="rpcbind" name="crypto" dev="proc" ino=21434 scontext=system_u:system_r:svirt_lxc_net_t:s0:c652,c746 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 15 11:34:31.185000 audit[2797]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f4d80f9f0c0 a2=0 a3=0 items=0 ppid=2780 pid=2797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c652,c746 key=(null) Jul 15 11:34:31.185000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Jul 15 11:34:31.216000 audit[2802]: AVC avc: denied { search } for pid=2802 comm="dbus-daemon" name="crypto" dev="proc" ino=21434 scontext=system_u:system_r:svirt_lxc_net_t:s0:c652,c746 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 15 11:34:31.216000 audit[2802]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f663dbdc0c0 a2=0 a3=0 items=0 ppid=2780 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c652,c746 key=(null) Jul 15 11:34:31.216000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Jul 15 11:34:31.219000 audit[2803]: AVC avc: denied { watch } for pid=2803 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537649 scontext=system_u:system_r:svirt_lxc_net_t:s0:c652,c746 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c652,c746 tclass=dir permissive=0 Jul 15 11:34:31.219000 audit[2803]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=5577e3d86480 a2=2c8 a3=7ffc62c9e8fc items=0 ppid=2780 pid=2803 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c652,c746 key=(null) Jul 15 11:34:31.219000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Jul 15 11:34:31.221000 audit[2804]: AVC avc: denied { read } for pid=2804 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=22490 scontext=system_u:system_r:svirt_lxc_net_t:s0:c652,c746 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Jul 15 11:34:31.221000 audit[2804]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7fb7cad94320 a1=80000 a2=d a3=7ffc968b9490 items=0 ppid=2780 pid=2804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c652,c746 key=(null) Jul 15 11:34:31.221000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Jul 15 11:34:31.223000 audit[2804]: AVC avc: denied { search } for pid=2804 comm="ganesha.nfsd" name="crypto" dev="proc" ino=21434 scontext=system_u:system_r:svirt_lxc_net_t:s0:c652,c746 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 15 11:34:31.223000 audit[2804]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fb7ca2e80c0 a2=0 a3=0 items=0 ppid=2780 pid=2804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c652,c746 key=(null) Jul 15 11:34:31.223000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Jul 15 11:34:31.333298 kubelet[1445]: I0715 11:34:31.333181 1445 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.674957764 podStartE2EDuration="6.333164845s" podCreationTimestamp="2025-07-15 11:34:25 +0000 UTC" firstStartedPulling="2025-07-15 11:34:26.429921854 +0000 UTC m=+42.346236969" lastFinishedPulling="2025-07-15 11:34:31.088128935 +0000 UTC m=+47.004444050" observedRunningTime="2025-07-15 11:34:31.332878146 +0000 UTC m=+47.249193261" watchObservedRunningTime="2025-07-15 11:34:31.333164845 +0000 UTC m=+47.249479960" Jul 15 11:34:31.342000 audit[2823]: NETFILTER_CFG table=filter:94 family=2 entries=22 op=nft_register_rule pid=2823 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:34:31.342000 audit[2823]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffcb574f7c0 a2=0 a3=7ffcb574f7ac items=0 ppid=1660 pid=2823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:31.342000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:34:31.347000 audit[2823]: NETFILTER_CFG table=nat:95 family=2 entries=108 op=nft_register_chain pid=2823 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:34:31.347000 audit[2823]: SYSCALL arch=c000003e syscall=46 success=yes exit=50220 a0=3 a1=7ffcb574f7c0 a2=0 a3=7ffcb574f7ac items=0 ppid=1660 pid=2823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:31.347000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:34:31.500402 kubelet[1445]: E0715 11:34:31.500350 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:32.501341 kubelet[1445]: E0715 11:34:32.501297 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:33.501662 kubelet[1445]: E0715 11:34:33.501619 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:34.502225 kubelet[1445]: E0715 11:34:34.502157 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:35.502787 kubelet[1445]: E0715 11:34:35.502753 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:36.503389 kubelet[1445]: E0715 11:34:36.503343 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:37.504268 kubelet[1445]: E0715 11:34:37.504226 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:38.505138 kubelet[1445]: E0715 11:34:38.505098 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:39.506027 kubelet[1445]: E0715 11:34:39.505986 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:40.506740 kubelet[1445]: E0715 11:34:40.506707 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:40.622661 systemd[1]: Created slice kubepods-besteffort-pod445f7290_0ade_4802_b8c0_327fef6feda9.slice. Jul 15 11:34:40.728261 kubelet[1445]: I0715 11:34:40.728138 1445 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-4bd02d3e-d944-406a-aeec-8e50a6b6b19b\" (UniqueName: \"kubernetes.io/nfs/445f7290-0ade-4802-b8c0-327fef6feda9-pvc-4bd02d3e-d944-406a-aeec-8e50a6b6b19b\") pod \"test-pod-1\" (UID: \"445f7290-0ade-4802-b8c0-327fef6feda9\") " pod="default/test-pod-1" Jul 15 11:34:40.728434 kubelet[1445]: I0715 11:34:40.728318 1445 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-h6t7s\" (UniqueName: \"kubernetes.io/projected/445f7290-0ade-4802-b8c0-327fef6feda9-kube-api-access-h6t7s\") pod \"test-pod-1\" (UID: \"445f7290-0ade-4802-b8c0-327fef6feda9\") " pod="default/test-pod-1" Jul 15 11:34:40.840777 kernel: Failed to create system directory netfs Jul 15 11:34:40.840891 kernel: kauditd_printk_skb: 74 callbacks suppressed Jul 15 11:34:40.840912 kernel: audit: type=1400 audit(1752579280.837:762): avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.840935 kernel: Failed to create system directory netfs Jul 15 11:34:40.837000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.841108 kernel: audit: type=1400 audit(1752579280.837:762): avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.837000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.837000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.848929 kernel: Failed to create system directory netfs Jul 15 11:34:40.849045 kernel: audit: type=1400 audit(1752579280.837:762): avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.849073 kernel: Failed to create system directory netfs Jul 15 11:34:40.837000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.852747 kernel: audit: type=1400 audit(1752579280.837:762): avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.837000 audit[2863]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=559ede2945e0 a1=153bc a2=559ec1ab12b0 a3=5 items=0 ppid=9 pid=2863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:40.861024 kernel: audit: type=1300 audit(1752579280.837:762): arch=c000003e syscall=175 success=yes exit=0 a0=559ede2945e0 a1=153bc a2=559ec1ab12b0 a3=5 items=0 ppid=9 pid=2863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:40.861073 kernel: audit: type=1327 audit(1752579280.837:762): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 15 11:34:40.837000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 15 11:34:40.859000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.863366 kernel: Failed to create system directory fscache Jul 15 11:34:40.863412 kernel: audit: type=1400 audit(1752579280.859:763): avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.863437 kernel: Failed to create system directory fscache Jul 15 11:34:40.863457 kernel: Failed to create system directory fscache Jul 15 11:34:40.863477 kernel: Failed to create system directory fscache Jul 15 11:34:40.859000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.867240 kernel: audit: type=1400 audit(1752579280.859:763): avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.867280 kernel: Failed to create system directory fscache Jul 15 11:34:40.867994 kernel: audit: type=1400 audit(1752579280.859:763): avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.859000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.871768 kernel: Failed to create system directory fscache Jul 15 11:34:40.871804 kernel: audit: type=1400 audit(1752579280.859:763): avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.859000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.875591 kernel: Failed to create system directory fscache Jul 15 11:34:40.859000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.859000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.859000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.859000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.880827 kernel: Failed to create system directory fscache Jul 15 11:34:40.880863 kernel: Failed to create system directory fscache Jul 15 11:34:40.859000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.859000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.882223 kernel: Failed to create system directory fscache Jul 15 11:34:40.882258 kernel: Failed to create system directory fscache Jul 15 11:34:40.859000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.859000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.859000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.884324 kernel: Failed to create system directory fscache Jul 15 11:34:40.884357 kernel: Failed to create system directory fscache Jul 15 11:34:40.884379 kernel: Failed to create system directory fscache Jul 15 11:34:40.859000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.859000 audit[2863]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=559ede4a99c0 a1=4c0fc a2=559ec1ab12b0 a3=5 items=0 ppid=9 pid=2863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:40.859000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 15 11:34:40.886757 kernel: FS-Cache: Loaded Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.916398 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.916457 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.916475 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.916495 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.917093 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.917794 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.919180 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.919212 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.919873 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.921243 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.921271 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.921950 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.923321 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.923344 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.924029 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.925411 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.925442 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.926102 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.928173 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.928212 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.928235 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.930262 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.930300 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.930320 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.930951 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.932316 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.932346 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.933752 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.933778 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.935116 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.935139 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.935810 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.937167 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.937187 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.939232 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.939262 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.939276 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.939923 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.941289 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.941324 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.941978 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.943344 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.943365 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.944042 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.945417 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.945463 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.946113 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.946808 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.948166 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.948201 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.950225 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.950257 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.950284 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.950924 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.952284 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.952313 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.952980 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.954347 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.954390 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.955045 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.955754 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.957122 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.957150 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.959208 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.959259 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.959280 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.961279 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.961308 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.961342 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.963337 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.963374 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.963396 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.965400 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.965434 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.965460 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.966794 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.966838 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.968176 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.968210 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.970230 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.970257 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.970271 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.972298 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.972335 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.972360 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.974375 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.974422 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.974443 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.975801 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.975839 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.977178 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.977222 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.979245 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.979280 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.979297 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.981310 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.981388 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.981405 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.983384 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.983429 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.983445 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.984762 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.984790 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.986143 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.986180 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.988197 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.988232 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.988250 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.990262 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.990298 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.990318 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.992310 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.992337 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.992351 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.994374 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.994418 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.994435 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.995068 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.995758 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.997127 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.997178 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.997817 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.999178 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.999205 kernel: Failed to create system directory sunrpc Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:40.905000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.001234 kernel: Failed to create system directory sunrpc Jul 15 11:34:41.001260 kernel: Failed to create system directory sunrpc Jul 15 11:34:41.010325 kernel: RPC: Registered named UNIX socket transport module. Jul 15 11:34:41.010364 kernel: RPC: Registered udp transport module. Jul 15 11:34:41.010390 kernel: RPC: Registered tcp transport module. Jul 15 11:34:41.010982 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Jul 15 11:34:40.905000 audit[2863]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=559ede4f5ad0 a1=1a81bc a2=559ec1ab12b0 a3=5 items=6 ppid=9 pid=2863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:40.905000 audit: CWD cwd="/" Jul 15 11:34:40.905000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:34:40.905000 audit: PATH item=1 name=(null) inode=22939 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:34:40.905000 audit: PATH item=2 name=(null) inode=22939 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:34:40.905000 audit: PATH item=3 name=(null) inode=22940 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:34:40.905000 audit: PATH item=4 name=(null) inode=22939 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:34:40.905000 audit: PATH item=5 name=(null) inode=22941 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:34:40.905000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.046260 kernel: Failed to create system directory nfs Jul 15 11:34:41.046284 kernel: Failed to create system directory nfs Jul 15 11:34:41.046306 kernel: Failed to create system directory nfs Jul 15 11:34:41.046324 kernel: Failed to create system directory nfs Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.048268 kernel: Failed to create system directory nfs Jul 15 11:34:41.048295 kernel: Failed to create system directory nfs Jul 15 11:34:41.048311 kernel: Failed to create system directory nfs Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.050262 kernel: Failed to create system directory nfs Jul 15 11:34:41.050287 kernel: Failed to create system directory nfs Jul 15 11:34:41.050301 kernel: Failed to create system directory nfs Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.052246 kernel: Failed to create system directory nfs Jul 15 11:34:41.052270 kernel: Failed to create system directory nfs Jul 15 11:34:41.052284 kernel: Failed to create system directory nfs Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.054283 kernel: Failed to create system directory nfs Jul 15 11:34:41.054304 kernel: Failed to create system directory nfs Jul 15 11:34:41.054323 kernel: Failed to create system directory nfs Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.056296 kernel: Failed to create system directory nfs Jul 15 11:34:41.056321 kernel: Failed to create system directory nfs Jul 15 11:34:41.056336 kernel: Failed to create system directory nfs Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.058338 kernel: Failed to create system directory nfs Jul 15 11:34:41.058358 kernel: Failed to create system directory nfs Jul 15 11:34:41.058376 kernel: Failed to create system directory nfs Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.060333 kernel: Failed to create system directory nfs Jul 15 11:34:41.060350 kernel: Failed to create system directory nfs Jul 15 11:34:41.060364 kernel: Failed to create system directory nfs Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.062319 kernel: Failed to create system directory nfs Jul 15 11:34:41.062337 kernel: Failed to create system directory nfs Jul 15 11:34:41.062350 kernel: Failed to create system directory nfs Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.064315 kernel: Failed to create system directory nfs Jul 15 11:34:41.064348 kernel: Failed to create system directory nfs Jul 15 11:34:41.064362 kernel: Failed to create system directory nfs Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.066306 kernel: Failed to create system directory nfs Jul 15 11:34:41.066337 kernel: Failed to create system directory nfs Jul 15 11:34:41.066357 kernel: Failed to create system directory nfs Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.068308 kernel: Failed to create system directory nfs Jul 15 11:34:41.068328 kernel: Failed to create system directory nfs Jul 15 11:34:41.068349 kernel: Failed to create system directory nfs Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.069757 kernel: Failed to create system directory nfs Jul 15 11:34:41.069792 kernel: Failed to create system directory nfs Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.071070 kernel: Failed to create system directory nfs Jul 15 11:34:41.071091 kernel: Failed to create system directory nfs Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.073071 kernel: Failed to create system directory nfs Jul 15 11:34:41.073090 kernel: Failed to create system directory nfs Jul 15 11:34:41.073111 kernel: Failed to create system directory nfs Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.075126 kernel: Failed to create system directory nfs Jul 15 11:34:41.075148 kernel: Failed to create system directory nfs Jul 15 11:34:41.075167 kernel: Failed to create system directory nfs Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.077139 kernel: Failed to create system directory nfs Jul 15 11:34:41.077161 kernel: Failed to create system directory nfs Jul 15 11:34:41.077214 kernel: Failed to create system directory nfs Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.079134 kernel: Failed to create system directory nfs Jul 15 11:34:41.079153 kernel: Failed to create system directory nfs Jul 15 11:34:41.079167 kernel: Failed to create system directory nfs Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.081112 kernel: Failed to create system directory nfs Jul 15 11:34:41.081137 kernel: Failed to create system directory nfs Jul 15 11:34:41.081151 kernel: Failed to create system directory nfs Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.083125 kernel: Failed to create system directory nfs Jul 15 11:34:41.083151 kernel: Failed to create system directory nfs Jul 15 11:34:41.083166 kernel: Failed to create system directory nfs Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.037000 audit[2863]: AVC avc: denied { confidentiality } for pid=2863 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.084742 kernel: Failed to create system directory nfs Jul 15 11:34:41.104752 kernel: FS-Cache: Netfs 'nfs' registered for caching Jul 15 11:34:41.037000 audit[2863]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=559ede716af0 a1=16ed54 a2=559ec1ab12b0 a3=5 items=0 ppid=9 pid=2863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:41.037000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.141348 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.141387 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.141404 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.143367 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.143399 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.143419 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.145366 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.145393 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.145410 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.146763 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.146794 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.148110 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.148131 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.150137 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.150157 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.150170 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.152331 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.152376 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.152392 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.154381 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.154413 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.154434 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.155766 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.155806 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.157141 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.157183 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.159178 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.159220 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.159235 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.161223 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.161254 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.161274 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.163269 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.163300 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.163315 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.165325 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.165364 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.165378 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.166769 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.166801 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.168098 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.168124 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.170156 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.170183 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.170197 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.172225 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.172246 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.172266 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.174265 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.174298 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.174320 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.176357 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.176394 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.176409 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.177749 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.177770 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.179089 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.179107 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.181213 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.181241 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.181258 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.183229 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.183250 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.183270 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.185251 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.185279 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.185299 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.187310 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.187341 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.187361 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.189349 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.189390 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.189408 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.191350 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.191368 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.191382 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.193385 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.193412 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.193432 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.195377 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.195398 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.195412 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.196754 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.196783 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.198178 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.198198 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.200295 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.200319 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.200342 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.202338 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.202364 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.202382 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.130000 audit[2868]: AVC avc: denied { confidentiality } for pid=2868 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.204383 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.204410 kernel: Failed to create system directory nfs4 Jul 15 11:34:41.338259 kernel: NFS: Registering the id_resolver key type Jul 15 11:34:41.338354 kernel: Key type id_resolver registered Jul 15 11:34:41.338373 kernel: Key type id_legacy registered Jul 15 11:34:41.130000 audit[2868]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f117d6b4010 a1=2095ac a2=55ccbc4392b0 a3=5 items=0 ppid=9 pid=2868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:41.130000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Jul 15 11:34:41.346000 audit[2869]: AVC avc: denied { confidentiality } for pid=2869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.346000 audit[2869]: AVC avc: denied { confidentiality } for pid=2869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.346000 audit[2869]: AVC avc: denied { confidentiality } for pid=2869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.351217 kernel: Failed to create system directory rpcgss Jul 15 11:34:41.351250 kernel: Failed to create system directory rpcgss Jul 15 11:34:41.351264 kernel: Failed to create system directory rpcgss Jul 15 11:34:41.351278 kernel: Failed to create system directory rpcgss Jul 15 11:34:41.346000 audit[2869]: AVC avc: denied { confidentiality } for pid=2869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.351923 kernel: Failed to create system directory rpcgss Jul 15 11:34:41.346000 audit[2869]: AVC avc: denied { confidentiality } for pid=2869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.346000 audit[2869]: AVC avc: denied { confidentiality } for pid=2869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.353294 kernel: Failed to create system directory rpcgss Jul 15 11:34:41.353321 kernel: Failed to create system directory rpcgss Jul 15 11:34:41.346000 audit[2869]: AVC avc: denied { confidentiality } for pid=2869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.353995 kernel: Failed to create system directory rpcgss Jul 15 11:34:41.346000 audit[2869]: AVC avc: denied { confidentiality } for pid=2869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.346000 audit[2869]: AVC avc: denied { confidentiality } for pid=2869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.355370 kernel: Failed to create system directory rpcgss Jul 15 11:34:41.355392 kernel: Failed to create system directory rpcgss Jul 15 11:34:41.346000 audit[2869]: AVC avc: denied { confidentiality } for pid=2869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.346000 audit[2869]: AVC avc: denied { confidentiality } for pid=2869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.357354 kernel: Failed to create system directory rpcgss Jul 15 11:34:41.346000 audit[2869]: AVC avc: denied { confidentiality } for pid=2869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.358599 kernel: Failed to create system directory rpcgss Jul 15 11:34:41.346000 audit[2869]: AVC avc: denied { confidentiality } for pid=2869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.359406 kernel: Failed to create system directory rpcgss Jul 15 11:34:41.359438 kernel: Failed to create system directory rpcgss Jul 15 11:34:41.346000 audit[2869]: AVC avc: denied { confidentiality } for pid=2869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.346000 audit[2869]: AVC avc: denied { confidentiality } for pid=2869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.360812 kernel: Failed to create system directory rpcgss Jul 15 11:34:41.360837 kernel: Failed to create system directory rpcgss Jul 15 11:34:41.346000 audit[2869]: AVC avc: denied { confidentiality } for pid=2869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.346000 audit[2869]: AVC avc: denied { confidentiality } for pid=2869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.362174 kernel: Failed to create system directory rpcgss Jul 15 11:34:41.362199 kernel: Failed to create system directory rpcgss Jul 15 11:34:41.346000 audit[2869]: AVC avc: denied { confidentiality } for pid=2869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.346000 audit[2869]: AVC avc: denied { confidentiality } for pid=2869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.346000 audit[2869]: AVC avc: denied { confidentiality } for pid=2869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.364262 kernel: Failed to create system directory rpcgss Jul 15 11:34:41.364292 kernel: Failed to create system directory rpcgss Jul 15 11:34:41.364307 kernel: Failed to create system directory rpcgss Jul 15 11:34:41.346000 audit[2869]: AVC avc: denied { confidentiality } for pid=2869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.346000 audit[2869]: AVC avc: denied { confidentiality } for pid=2869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.365758 kernel: Failed to create system directory rpcgss Jul 15 11:34:41.365780 kernel: Failed to create system directory rpcgss Jul 15 11:34:41.346000 audit[2869]: AVC avc: denied { confidentiality } for pid=2869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.346000 audit[2869]: AVC avc: denied { confidentiality } for pid=2869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.367174 kernel: Failed to create system directory rpcgss Jul 15 11:34:41.367197 kernel: Failed to create system directory rpcgss Jul 15 11:34:41.346000 audit[2869]: AVC avc: denied { confidentiality } for pid=2869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.367882 kernel: Failed to create system directory rpcgss Jul 15 11:34:41.346000 audit[2869]: AVC avc: denied { confidentiality } for pid=2869 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 15 11:34:41.346000 audit[2869]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f5e98d95010 a1=70bac a2=55d5d35c82b0 a3=5 items=0 ppid=9 pid=2869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:41.346000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Jul 15 11:34:41.380390 nfsidmap[2876]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Jul 15 11:34:41.383224 nfsidmap[2879]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Jul 15 11:34:41.390000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2651 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 15 11:34:41.390000 audit[1271]: AVC avc: denied { watch_reads } for pid=1271 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2651 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 15 11:34:41.390000 audit[1271]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55f5bbd89990 a2=10 a3=c9ef7d8a28d55dd1 items=0 ppid=1 pid=1271 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:41.390000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 15 11:34:41.390000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2651 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 15 11:34:41.390000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2651 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 15 11:34:41.390000 audit[1271]: AVC avc: denied { watch_reads } for pid=1271 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2651 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 15 11:34:41.390000 audit[1271]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55f5bbd89990 a2=10 a3=c9ef7d8a28d55dd1 items=0 ppid=1 pid=1271 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:41.390000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 15 11:34:41.390000 audit[1271]: AVC avc: denied { watch_reads } for pid=1271 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2651 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 15 11:34:41.390000 audit[1271]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55f5bbd89990 a2=10 a3=c9ef7d8a28d55dd1 items=0 ppid=1 pid=1271 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:41.390000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 15 11:34:41.507900 kubelet[1445]: E0715 11:34:41.507836 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:41.525704 env[1203]: time="2025-07-15T11:34:41.525667213Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:445f7290-0ade-4802-b8c0-327fef6feda9,Namespace:default,Attempt:0,}" Jul 15 11:34:41.758798 systemd-networkd[1029]: cali5ec59c6bf6e: Link UP Jul 15 11:34:41.761242 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 15 11:34:41.761293 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Jul 15 11:34:41.761133 systemd-networkd[1029]: cali5ec59c6bf6e: Gained carrier Jul 15 11:34:41.771284 env[1203]: 2025-07-15 11:34:41.700 [INFO][2883] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.97-k8s-test--pod--1-eth0 default 445f7290-0ade-4802-b8c0-327fef6feda9 1369 0 2025-07-15 11:34:25 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.97 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="0b37d899a3b1da49e5932e03b829951fec0809df5d968b63ab7bc9d73d6d2a8f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.97-k8s-test--pod--1-" Jul 15 11:34:41.771284 env[1203]: 2025-07-15 11:34:41.701 [INFO][2883] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="0b37d899a3b1da49e5932e03b829951fec0809df5d968b63ab7bc9d73d6d2a8f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.97-k8s-test--pod--1-eth0" Jul 15 11:34:41.771284 env[1203]: 2025-07-15 11:34:41.723 [INFO][2896] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0b37d899a3b1da49e5932e03b829951fec0809df5d968b63ab7bc9d73d6d2a8f" HandleID="k8s-pod-network.0b37d899a3b1da49e5932e03b829951fec0809df5d968b63ab7bc9d73d6d2a8f" Workload="10.0.0.97-k8s-test--pod--1-eth0" Jul 15 11:34:41.771284 env[1203]: 2025-07-15 11:34:41.723 [INFO][2896] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="0b37d899a3b1da49e5932e03b829951fec0809df5d968b63ab7bc9d73d6d2a8f" HandleID="k8s-pod-network.0b37d899a3b1da49e5932e03b829951fec0809df5d968b63ab7bc9d73d6d2a8f" Workload="10.0.0.97-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000138560), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.97", "pod":"test-pod-1", "timestamp":"2025-07-15 11:34:41.723214925 +0000 UTC"}, Hostname:"10.0.0.97", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 15 11:34:41.771284 env[1203]: 2025-07-15 11:34:41.723 [INFO][2896] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 15 11:34:41.771284 env[1203]: 2025-07-15 11:34:41.723 [INFO][2896] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 15 11:34:41.771284 env[1203]: 2025-07-15 11:34:41.723 [INFO][2896] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.97' Jul 15 11:34:41.771284 env[1203]: 2025-07-15 11:34:41.729 [INFO][2896] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.0b37d899a3b1da49e5932e03b829951fec0809df5d968b63ab7bc9d73d6d2a8f" host="10.0.0.97" Jul 15 11:34:41.771284 env[1203]: 2025-07-15 11:34:41.735 [INFO][2896] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.97" Jul 15 11:34:41.771284 env[1203]: 2025-07-15 11:34:41.739 [INFO][2896] ipam/ipam.go 511: Trying affinity for 192.168.107.192/26 host="10.0.0.97" Jul 15 11:34:41.771284 env[1203]: 2025-07-15 11:34:41.741 [INFO][2896] ipam/ipam.go 158: Attempting to load block cidr=192.168.107.192/26 host="10.0.0.97" Jul 15 11:34:41.771284 env[1203]: 2025-07-15 11:34:41.743 [INFO][2896] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.107.192/26 host="10.0.0.97" Jul 15 11:34:41.771284 env[1203]: 2025-07-15 11:34:41.743 [INFO][2896] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.107.192/26 handle="k8s-pod-network.0b37d899a3b1da49e5932e03b829951fec0809df5d968b63ab7bc9d73d6d2a8f" host="10.0.0.97" Jul 15 11:34:41.771284 env[1203]: 2025-07-15 11:34:41.744 [INFO][2896] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.0b37d899a3b1da49e5932e03b829951fec0809df5d968b63ab7bc9d73d6d2a8f Jul 15 11:34:41.771284 env[1203]: 2025-07-15 11:34:41.750 [INFO][2896] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.107.192/26 handle="k8s-pod-network.0b37d899a3b1da49e5932e03b829951fec0809df5d968b63ab7bc9d73d6d2a8f" host="10.0.0.97" Jul 15 11:34:41.771284 env[1203]: 2025-07-15 11:34:41.754 [INFO][2896] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.107.196/26] block=192.168.107.192/26 handle="k8s-pod-network.0b37d899a3b1da49e5932e03b829951fec0809df5d968b63ab7bc9d73d6d2a8f" host="10.0.0.97" Jul 15 11:34:41.771284 env[1203]: 2025-07-15 11:34:41.755 [INFO][2896] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.107.196/26] handle="k8s-pod-network.0b37d899a3b1da49e5932e03b829951fec0809df5d968b63ab7bc9d73d6d2a8f" host="10.0.0.97" Jul 15 11:34:41.771284 env[1203]: 2025-07-15 11:34:41.755 [INFO][2896] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 15 11:34:41.771284 env[1203]: 2025-07-15 11:34:41.755 [INFO][2896] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.107.196/26] IPv6=[] ContainerID="0b37d899a3b1da49e5932e03b829951fec0809df5d968b63ab7bc9d73d6d2a8f" HandleID="k8s-pod-network.0b37d899a3b1da49e5932e03b829951fec0809df5d968b63ab7bc9d73d6d2a8f" Workload="10.0.0.97-k8s-test--pod--1-eth0" Jul 15 11:34:41.771284 env[1203]: 2025-07-15 11:34:41.756 [INFO][2883] cni-plugin/k8s.go 418: Populated endpoint ContainerID="0b37d899a3b1da49e5932e03b829951fec0809df5d968b63ab7bc9d73d6d2a8f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.97-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.97-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"445f7290-0ade-4802-b8c0-327fef6feda9", ResourceVersion:"1369", Generation:0, CreationTimestamp:time.Date(2025, time.July, 15, 11, 34, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.97", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.107.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 15 11:34:41.771975 env[1203]: 2025-07-15 11:34:41.756 [INFO][2883] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.107.196/32] ContainerID="0b37d899a3b1da49e5932e03b829951fec0809df5d968b63ab7bc9d73d6d2a8f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.97-k8s-test--pod--1-eth0" Jul 15 11:34:41.771975 env[1203]: 2025-07-15 11:34:41.756 [INFO][2883] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="0b37d899a3b1da49e5932e03b829951fec0809df5d968b63ab7bc9d73d6d2a8f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.97-k8s-test--pod--1-eth0" Jul 15 11:34:41.771975 env[1203]: 2025-07-15 11:34:41.761 [INFO][2883] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0b37d899a3b1da49e5932e03b829951fec0809df5d968b63ab7bc9d73d6d2a8f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.97-k8s-test--pod--1-eth0" Jul 15 11:34:41.771975 env[1203]: 2025-07-15 11:34:41.763 [INFO][2883] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="0b37d899a3b1da49e5932e03b829951fec0809df5d968b63ab7bc9d73d6d2a8f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.97-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.97-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"445f7290-0ade-4802-b8c0-327fef6feda9", ResourceVersion:"1369", Generation:0, CreationTimestamp:time.Date(2025, time.July, 15, 11, 34, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.97", ContainerID:"0b37d899a3b1da49e5932e03b829951fec0809df5d968b63ab7bc9d73d6d2a8f", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.107.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"16:a0:e4:81:3b:b4", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 15 11:34:41.771975 env[1203]: 2025-07-15 11:34:41.769 [INFO][2883] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="0b37d899a3b1da49e5932e03b829951fec0809df5d968b63ab7bc9d73d6d2a8f" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.97-k8s-test--pod--1-eth0" Jul 15 11:34:41.781000 audit[2920]: NETFILTER_CFG table=filter:96 family=2 entries=40 op=nft_register_chain pid=2920 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 15 11:34:41.781000 audit[2920]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffc6f31eca0 a2=0 a3=7ffc6f31ec8c items=0 ppid=2135 pid=2920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:41.781000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 15 11:34:41.783105 env[1203]: time="2025-07-15T11:34:41.783033423Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 15 11:34:41.783105 env[1203]: time="2025-07-15T11:34:41.783079144Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 15 11:34:41.783105 env[1203]: time="2025-07-15T11:34:41.783093242Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 15 11:34:41.783394 env[1203]: time="2025-07-15T11:34:41.783341528Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0b37d899a3b1da49e5932e03b829951fec0809df5d968b63ab7bc9d73d6d2a8f pid=2921 runtime=io.containerd.runc.v2 Jul 15 11:34:41.794443 systemd[1]: Started cri-containerd-0b37d899a3b1da49e5932e03b829951fec0809df5d968b63ab7bc9d73d6d2a8f.scope. Jul 15 11:34:41.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:41.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:41.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:41.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:41.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:41.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:41.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:41.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:41.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:41.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:41.803000 audit: BPF prog-id=126 op=LOAD Jul 15 11:34:41.804000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:41.804000 audit[2930]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2921 pid=2930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:41.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062333764383939613362316461343965353933326530336238323939 Jul 15 11:34:41.804000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:41.804000 audit[2930]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2921 pid=2930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:41.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062333764383939613362316461343965353933326530336238323939 Jul 15 11:34:41.804000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:41.804000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:41.804000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:41.804000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:41.804000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:41.804000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:41.804000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:41.804000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:41.804000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:41.804000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:41.804000 audit: BPF prog-id=127 op=LOAD Jul 15 11:34:41.804000 audit[2930]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000221390 items=0 ppid=2921 pid=2930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:41.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062333764383939613362316461343965353933326530336238323939 Jul 15 11:34:41.804000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:41.804000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:41.804000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:41.804000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:41.804000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:41.804000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:41.804000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:41.804000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:41.804000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:41.804000 audit: BPF prog-id=128 op=LOAD Jul 15 11:34:41.804000 audit[2930]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002213d8 items=0 ppid=2921 pid=2930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:41.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062333764383939613362316461343965353933326530336238323939 Jul 15 11:34:41.804000 audit: BPF prog-id=128 op=UNLOAD Jul 15 11:34:41.804000 audit: BPF prog-id=127 op=UNLOAD Jul 15 11:34:41.804000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:41.804000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:41.804000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:41.804000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:41.804000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:41.804000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:41.804000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:41.804000 audit[2930]: AVC avc: denied { perfmon } for pid=2930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:41.804000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:41.804000 audit[2930]: AVC avc: denied { bpf } for pid=2930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:41.804000 audit: BPF prog-id=129 op=LOAD Jul 15 11:34:41.804000 audit[2930]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002217e8 items=0 ppid=2921 pid=2930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:41.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062333764383939613362316461343965353933326530336238323939 Jul 15 11:34:41.805916 systemd-resolved[1149]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 15 11:34:41.827642 env[1203]: time="2025-07-15T11:34:41.827587278Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:445f7290-0ade-4802-b8c0-327fef6feda9,Namespace:default,Attempt:0,} returns sandbox id \"0b37d899a3b1da49e5932e03b829951fec0809df5d968b63ab7bc9d73d6d2a8f\"" Jul 15 11:34:41.828794 env[1203]: time="2025-07-15T11:34:41.828536826Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Jul 15 11:34:42.206533 env[1203]: time="2025-07-15T11:34:42.206405242Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:34:42.208454 env[1203]: time="2025-07-15T11:34:42.208418287Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:f6422896ca84c9af48d5417d6b7a573bf6b38f81edc15538907d987fc658d909,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:34:42.210130 env[1203]: time="2025-07-15T11:34:42.210097817Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:34:42.211793 env[1203]: time="2025-07-15T11:34:42.211773297Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:30bb68e656e0665bce700e67d2756f68bdca3345fa1099a32bfdb8febcf621cd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 15 11:34:42.212432 env[1203]: time="2025-07-15T11:34:42.212399376Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:f6422896ca84c9af48d5417d6b7a573bf6b38f81edc15538907d987fc658d909\"" Jul 15 11:34:42.214512 env[1203]: time="2025-07-15T11:34:42.214476979Z" level=info msg="CreateContainer within sandbox \"0b37d899a3b1da49e5932e03b829951fec0809df5d968b63ab7bc9d73d6d2a8f\" for container &ContainerMetadata{Name:test,Attempt:0,}" Jul 15 11:34:42.227745 env[1203]: time="2025-07-15T11:34:42.227688014Z" level=info msg="CreateContainer within sandbox \"0b37d899a3b1da49e5932e03b829951fec0809df5d968b63ab7bc9d73d6d2a8f\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"fba7dbdc500dc3b897515ebe7654fd061d2b1359ff950a5c21082a3647a812da\"" Jul 15 11:34:42.228046 env[1203]: time="2025-07-15T11:34:42.228014635Z" level=info msg="StartContainer for \"fba7dbdc500dc3b897515ebe7654fd061d2b1359ff950a5c21082a3647a812da\"" Jul 15 11:34:42.240627 systemd[1]: Started cri-containerd-fba7dbdc500dc3b897515ebe7654fd061d2b1359ff950a5c21082a3647a812da.scope. Jul 15 11:34:42.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:42.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:42.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:42.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:42.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:42.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:42.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:42.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:42.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:42.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:42.250000 audit: BPF prog-id=130 op=LOAD Jul 15 11:34:42.250000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:42.250000 audit[2963]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2921 pid=2963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:42.250000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662613764626463353030646333623839373531356562653736353466 Jul 15 11:34:42.250000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:42.250000 audit[2963]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2921 pid=2963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:42.250000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662613764626463353030646333623839373531356562653736353466 Jul 15 11:34:42.250000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:42.250000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:42.250000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:42.250000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:42.250000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:42.250000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:42.250000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:42.250000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:42.250000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:42.250000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:42.250000 audit: BPF prog-id=131 op=LOAD Jul 15 11:34:42.250000 audit[2963]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000255d10 items=0 ppid=2921 pid=2963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:42.250000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662613764626463353030646333623839373531356562653736353466 Jul 15 11:34:42.250000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:42.250000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:42.250000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:42.250000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:42.250000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:42.250000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:42.250000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:42.250000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:42.250000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:42.250000 audit: BPF prog-id=132 op=LOAD Jul 15 11:34:42.250000 audit[2963]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000255d58 items=0 ppid=2921 pid=2963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:42.250000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662613764626463353030646333623839373531356562653736353466 Jul 15 11:34:42.251000 audit: BPF prog-id=132 op=UNLOAD Jul 15 11:34:42.251000 audit: BPF prog-id=131 op=UNLOAD Jul 15 11:34:42.251000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:42.251000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:42.251000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:42.251000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:42.251000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:42.251000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:42.251000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:42.251000 audit[2963]: AVC avc: denied { perfmon } for pid=2963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:42.251000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:42.251000 audit[2963]: AVC avc: denied { bpf } for pid=2963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:34:42.251000 audit: BPF prog-id=133 op=LOAD Jul 15 11:34:42.251000 audit[2963]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003be168 items=0 ppid=2921 pid=2963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:42.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662613764626463353030646333623839373531356562653736353466 Jul 15 11:34:42.262970 env[1203]: time="2025-07-15T11:34:42.262909000Z" level=info msg="StartContainer for \"fba7dbdc500dc3b897515ebe7654fd061d2b1359ff950a5c21082a3647a812da\" returns successfully" Jul 15 11:34:42.282000 audit[3009]: NETFILTER_CFG table=filter:97 family=2 entries=9 op=nft_register_rule pid=3009 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:34:42.282000 audit[3009]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fffa73ea260 a2=0 a3=7fffa73ea24c items=0 ppid=1660 pid=3009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:42.282000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:34:42.289000 audit[3009]: NETFILTER_CFG table=nat:98 family=2 entries=55 op=nft_register_chain pid=3009 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 15 11:34:42.289000 audit[3009]: SYSCALL arch=c000003e syscall=46 success=yes exit=20100 a0=3 a1=7fffa73ea260 a2=0 a3=7fffa73ea24c items=0 ppid=1660 pid=3009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:34:42.289000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 15 11:34:42.351214 kubelet[1445]: I0715 11:34:42.351150 1445 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=16.966082231 podStartE2EDuration="17.351133242s" podCreationTimestamp="2025-07-15 11:34:25 +0000 UTC" firstStartedPulling="2025-07-15 11:34:41.82830871 +0000 UTC m=+57.744623825" lastFinishedPulling="2025-07-15 11:34:42.213359721 +0000 UTC m=+58.129674836" observedRunningTime="2025-07-15 11:34:42.351103674 +0000 UTC m=+58.267418789" watchObservedRunningTime="2025-07-15 11:34:42.351133242 +0000 UTC m=+58.267448357" Jul 15 11:34:42.508825 kubelet[1445]: E0715 11:34:42.508789 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:42.984923 systemd-networkd[1029]: cali5ec59c6bf6e: Gained IPv6LL Jul 15 11:34:43.509632 kubelet[1445]: E0715 11:34:43.509595 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:44.471239 kubelet[1445]: E0715 11:34:44.471209 1445 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:44.499953 env[1203]: time="2025-07-15T11:34:44.499919276Z" level=info msg="StopPodSandbox for \"8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c\"" Jul 15 11:34:44.510365 kubelet[1445]: E0715 11:34:44.510324 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:44.553579 env[1203]: 2025-07-15 11:34:44.528 [WARNING][3024] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.97-k8s-csi--node--driver--8hg42-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d9742bb2-a259-4759-a746-30d9f682ecb8", ResourceVersion:"1244", Generation:0, CreationTimestamp:time.Date(2025, time.July, 15, 11, 33, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"8967bcb6f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.97", ContainerID:"b31e143a54b4c6125b633735a19303ae87d6b741b82ef71b5a3157470850669d", Pod:"csi-node-driver-8hg42", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.107.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali166b9c3a681", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 15 11:34:44.553579 env[1203]: 2025-07-15 11:34:44.528 [INFO][3024] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c" Jul 15 11:34:44.553579 env[1203]: 2025-07-15 11:34:44.528 [INFO][3024] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c" iface="eth0" netns="" Jul 15 11:34:44.553579 env[1203]: 2025-07-15 11:34:44.528 [INFO][3024] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c" Jul 15 11:34:44.553579 env[1203]: 2025-07-15 11:34:44.528 [INFO][3024] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c" Jul 15 11:34:44.553579 env[1203]: 2025-07-15 11:34:44.544 [INFO][3033] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c" HandleID="k8s-pod-network.8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c" Workload="10.0.0.97-k8s-csi--node--driver--8hg42-eth0" Jul 15 11:34:44.553579 env[1203]: 2025-07-15 11:34:44.545 [INFO][3033] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 15 11:34:44.553579 env[1203]: 2025-07-15 11:34:44.545 [INFO][3033] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 15 11:34:44.553579 env[1203]: 2025-07-15 11:34:44.550 [WARNING][3033] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c" HandleID="k8s-pod-network.8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c" Workload="10.0.0.97-k8s-csi--node--driver--8hg42-eth0" Jul 15 11:34:44.553579 env[1203]: 2025-07-15 11:34:44.550 [INFO][3033] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c" HandleID="k8s-pod-network.8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c" Workload="10.0.0.97-k8s-csi--node--driver--8hg42-eth0" Jul 15 11:34:44.553579 env[1203]: 2025-07-15 11:34:44.551 [INFO][3033] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 15 11:34:44.553579 env[1203]: 2025-07-15 11:34:44.552 [INFO][3024] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c" Jul 15 11:34:44.554159 env[1203]: time="2025-07-15T11:34:44.553611465Z" level=info msg="TearDown network for sandbox \"8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c\" successfully" Jul 15 11:34:44.554159 env[1203]: time="2025-07-15T11:34:44.553648258Z" level=info msg="StopPodSandbox for \"8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c\" returns successfully" Jul 15 11:34:44.554209 env[1203]: time="2025-07-15T11:34:44.554156628Z" level=info msg="RemovePodSandbox for \"8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c\"" Jul 15 11:34:44.554209 env[1203]: time="2025-07-15T11:34:44.554180957Z" level=info msg="Forcibly stopping sandbox \"8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c\"" Jul 15 11:34:44.607717 env[1203]: 2025-07-15 11:34:44.581 [WARNING][3051] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.97-k8s-csi--node--driver--8hg42-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d9742bb2-a259-4759-a746-30d9f682ecb8", ResourceVersion:"1244", Generation:0, CreationTimestamp:time.Date(2025, time.July, 15, 11, 33, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"8967bcb6f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.97", ContainerID:"b31e143a54b4c6125b633735a19303ae87d6b741b82ef71b5a3157470850669d", Pod:"csi-node-driver-8hg42", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.107.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali166b9c3a681", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 15 11:34:44.607717 env[1203]: 2025-07-15 11:34:44.582 [INFO][3051] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c" Jul 15 11:34:44.607717 env[1203]: 2025-07-15 11:34:44.582 [INFO][3051] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c" iface="eth0" netns="" Jul 15 11:34:44.607717 env[1203]: 2025-07-15 11:34:44.582 [INFO][3051] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c" Jul 15 11:34:44.607717 env[1203]: 2025-07-15 11:34:44.582 [INFO][3051] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c" Jul 15 11:34:44.607717 env[1203]: 2025-07-15 11:34:44.599 [INFO][3059] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c" HandleID="k8s-pod-network.8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c" Workload="10.0.0.97-k8s-csi--node--driver--8hg42-eth0" Jul 15 11:34:44.607717 env[1203]: 2025-07-15 11:34:44.599 [INFO][3059] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 15 11:34:44.607717 env[1203]: 2025-07-15 11:34:44.599 [INFO][3059] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 15 11:34:44.607717 env[1203]: 2025-07-15 11:34:44.604 [WARNING][3059] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c" HandleID="k8s-pod-network.8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c" Workload="10.0.0.97-k8s-csi--node--driver--8hg42-eth0" Jul 15 11:34:44.607717 env[1203]: 2025-07-15 11:34:44.604 [INFO][3059] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c" HandleID="k8s-pod-network.8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c" Workload="10.0.0.97-k8s-csi--node--driver--8hg42-eth0" Jul 15 11:34:44.607717 env[1203]: 2025-07-15 11:34:44.605 [INFO][3059] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 15 11:34:44.607717 env[1203]: 2025-07-15 11:34:44.606 [INFO][3051] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c" Jul 15 11:34:44.608199 env[1203]: time="2025-07-15T11:34:44.607751694Z" level=info msg="TearDown network for sandbox \"8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c\" successfully" Jul 15 11:34:44.610903 env[1203]: time="2025-07-15T11:34:44.610852826Z" level=info msg="RemovePodSandbox \"8e8e466d2713c668f7d0c00912969db1d0da0293ca12dce23ba79e34045ffa4c\" returns successfully" Jul 15 11:34:44.611399 env[1203]: time="2025-07-15T11:34:44.611373762Z" level=info msg="StopPodSandbox for \"c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca\"" Jul 15 11:34:44.667085 env[1203]: 2025-07-15 11:34:44.639 [WARNING][3077] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.97-k8s-nginx--deployment--7fcdb87857--wxx57-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"4bb21fac-42ba-44fa-94e2-a7d2565b8791", ResourceVersion:"1260", Generation:0, CreationTimestamp:time.Date(2025, time.July, 15, 11, 34, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.97", ContainerID:"17af47a95d3cf268670f2bb3723e6c32512a22fb95e2f37f9f7bd89dec9933f4", Pod:"nginx-deployment-7fcdb87857-wxx57", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.107.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calie16cf7fc1bb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 15 11:34:44.667085 env[1203]: 2025-07-15 11:34:44.639 [INFO][3077] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca" Jul 15 11:34:44.667085 env[1203]: 2025-07-15 11:34:44.639 [INFO][3077] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca" iface="eth0" netns="" Jul 15 11:34:44.667085 env[1203]: 2025-07-15 11:34:44.639 [INFO][3077] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca" Jul 15 11:34:44.667085 env[1203]: 2025-07-15 11:34:44.639 [INFO][3077] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca" Jul 15 11:34:44.667085 env[1203]: 2025-07-15 11:34:44.656 [INFO][3085] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca" HandleID="k8s-pod-network.c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca" Workload="10.0.0.97-k8s-nginx--deployment--7fcdb87857--wxx57-eth0" Jul 15 11:34:44.667085 env[1203]: 2025-07-15 11:34:44.656 [INFO][3085] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 15 11:34:44.667085 env[1203]: 2025-07-15 11:34:44.656 [INFO][3085] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 15 11:34:44.667085 env[1203]: 2025-07-15 11:34:44.662 [WARNING][3085] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca" HandleID="k8s-pod-network.c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca" Workload="10.0.0.97-k8s-nginx--deployment--7fcdb87857--wxx57-eth0" Jul 15 11:34:44.667085 env[1203]: 2025-07-15 11:34:44.662 [INFO][3085] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca" HandleID="k8s-pod-network.c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca" Workload="10.0.0.97-k8s-nginx--deployment--7fcdb87857--wxx57-eth0" Jul 15 11:34:44.667085 env[1203]: 2025-07-15 11:34:44.664 [INFO][3085] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 15 11:34:44.667085 env[1203]: 2025-07-15 11:34:44.665 [INFO][3077] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca" Jul 15 11:34:44.667754 env[1203]: time="2025-07-15T11:34:44.667119941Z" level=info msg="TearDown network for sandbox \"c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca\" successfully" Jul 15 11:34:44.667754 env[1203]: time="2025-07-15T11:34:44.667160352Z" level=info msg="StopPodSandbox for \"c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca\" returns successfully" Jul 15 11:34:44.667754 env[1203]: time="2025-07-15T11:34:44.667714623Z" level=info msg="RemovePodSandbox for \"c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca\"" Jul 15 11:34:44.667854 env[1203]: time="2025-07-15T11:34:44.667758149Z" level=info msg="Forcibly stopping sandbox \"c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca\"" Jul 15 11:34:44.718917 env[1203]: 2025-07-15 11:34:44.696 [WARNING][3103] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.97-k8s-nginx--deployment--7fcdb87857--wxx57-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"4bb21fac-42ba-44fa-94e2-a7d2565b8791", ResourceVersion:"1260", Generation:0, CreationTimestamp:time.Date(2025, time.July, 15, 11, 34, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.97", ContainerID:"17af47a95d3cf268670f2bb3723e6c32512a22fb95e2f37f9f7bd89dec9933f4", Pod:"nginx-deployment-7fcdb87857-wxx57", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.107.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calie16cf7fc1bb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 15 11:34:44.718917 env[1203]: 2025-07-15 11:34:44.696 [INFO][3103] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca" Jul 15 11:34:44.718917 env[1203]: 2025-07-15 11:34:44.696 [INFO][3103] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca" iface="eth0" netns="" Jul 15 11:34:44.718917 env[1203]: 2025-07-15 11:34:44.696 [INFO][3103] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca" Jul 15 11:34:44.718917 env[1203]: 2025-07-15 11:34:44.696 [INFO][3103] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca" Jul 15 11:34:44.718917 env[1203]: 2025-07-15 11:34:44.710 [INFO][3111] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca" HandleID="k8s-pod-network.c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca" Workload="10.0.0.97-k8s-nginx--deployment--7fcdb87857--wxx57-eth0" Jul 15 11:34:44.718917 env[1203]: 2025-07-15 11:34:44.710 [INFO][3111] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 15 11:34:44.718917 env[1203]: 2025-07-15 11:34:44.711 [INFO][3111] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 15 11:34:44.718917 env[1203]: 2025-07-15 11:34:44.715 [WARNING][3111] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca" HandleID="k8s-pod-network.c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca" Workload="10.0.0.97-k8s-nginx--deployment--7fcdb87857--wxx57-eth0" Jul 15 11:34:44.718917 env[1203]: 2025-07-15 11:34:44.715 [INFO][3111] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca" HandleID="k8s-pod-network.c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca" Workload="10.0.0.97-k8s-nginx--deployment--7fcdb87857--wxx57-eth0" Jul 15 11:34:44.718917 env[1203]: 2025-07-15 11:34:44.717 [INFO][3111] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 15 11:34:44.718917 env[1203]: 2025-07-15 11:34:44.717 [INFO][3103] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca" Jul 15 11:34:44.719435 env[1203]: time="2025-07-15T11:34:44.718946153Z" level=info msg="TearDown network for sandbox \"c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca\" successfully" Jul 15 11:34:44.723100 env[1203]: time="2025-07-15T11:34:44.721652120Z" level=info msg="RemovePodSandbox \"c057c3beb07b8db7ebf2dd7d99b5791d9d544e6f98309e1f3841719fe5f84fca\" returns successfully" Jul 15 11:34:45.510793 kubelet[1445]: E0715 11:34:45.510741 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:46.511207 kubelet[1445]: E0715 11:34:46.511140 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:47.511647 kubelet[1445]: E0715 11:34:47.511588 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 15 11:34:48.511907 kubelet[1445]: E0715 11:34:48.511866 1445 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"