Jul 10 00:47:43.942459 kernel: Linux version 5.15.186-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Wed Jul 9 23:09:45 -00 2025 Jul 10 00:47:43.942481 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=6cddad5f675165861f6062277cc28875548c735477e689762fc73abc16b63a3d Jul 10 00:47:43.942489 kernel: BIOS-provided physical RAM map: Jul 10 00:47:43.942495 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Jul 10 00:47:43.942508 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Jul 10 00:47:43.942514 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Jul 10 00:47:43.942521 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000009cfdbfff] usable Jul 10 00:47:43.942527 kernel: BIOS-e820: [mem 0x000000009cfdc000-0x000000009cffffff] reserved Jul 10 00:47:43.942534 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Jul 10 00:47:43.942539 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved Jul 10 00:47:43.942545 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Jul 10 00:47:43.942550 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Jul 10 00:47:43.942556 kernel: BIOS-e820: [mem 0x000000fd00000000-0x000000ffffffffff] reserved Jul 10 00:47:43.942561 kernel: NX (Execute Disable) protection: active Jul 10 00:47:43.942570 kernel: SMBIOS 2.8 present. Jul 10 00:47:43.942576 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 Jul 10 00:47:43.942582 kernel: Hypervisor detected: KVM Jul 10 00:47:43.942588 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Jul 10 00:47:43.942597 kernel: kvm-clock: cpu 0, msr 7919a001, primary cpu clock Jul 10 00:47:43.942603 kernel: kvm-clock: using sched offset of 3675565447 cycles Jul 10 00:47:43.942610 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Jul 10 00:47:43.942616 kernel: tsc: Detected 2794.748 MHz processor Jul 10 00:47:43.942622 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Jul 10 00:47:43.942630 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Jul 10 00:47:43.942636 kernel: last_pfn = 0x9cfdc max_arch_pfn = 0x400000000 Jul 10 00:47:43.942643 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Jul 10 00:47:43.942649 kernel: Using GB pages for direct mapping Jul 10 00:47:43.942655 kernel: ACPI: Early table checksum verification disabled Jul 10 00:47:43.942661 kernel: ACPI: RSDP 0x00000000000F59D0 000014 (v00 BOCHS ) Jul 10 00:47:43.942667 kernel: ACPI: RSDT 0x000000009CFE241A 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 10 00:47:43.942673 kernel: ACPI: FACP 0x000000009CFE21FA 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Jul 10 00:47:43.942679 kernel: ACPI: DSDT 0x000000009CFE0040 0021BA (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 10 00:47:43.942687 kernel: ACPI: FACS 0x000000009CFE0000 000040 Jul 10 00:47:43.942693 kernel: ACPI: APIC 0x000000009CFE22EE 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 10 00:47:43.942699 kernel: ACPI: HPET 0x000000009CFE237E 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 10 00:47:43.942705 kernel: ACPI: MCFG 0x000000009CFE23B6 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 10 00:47:43.942711 kernel: ACPI: WAET 0x000000009CFE23F2 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 10 00:47:43.942717 kernel: ACPI: Reserving FACP table memory at [mem 0x9cfe21fa-0x9cfe22ed] Jul 10 00:47:43.942723 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cfe0040-0x9cfe21f9] Jul 10 00:47:43.942729 kernel: ACPI: Reserving FACS table memory at [mem 0x9cfe0000-0x9cfe003f] Jul 10 00:47:43.942739 kernel: ACPI: Reserving APIC table memory at [mem 0x9cfe22ee-0x9cfe237d] Jul 10 00:47:43.942746 kernel: ACPI: Reserving HPET table memory at [mem 0x9cfe237e-0x9cfe23b5] Jul 10 00:47:43.942752 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cfe23b6-0x9cfe23f1] Jul 10 00:47:43.942759 kernel: ACPI: Reserving WAET table memory at [mem 0x9cfe23f2-0x9cfe2419] Jul 10 00:47:43.942766 kernel: No NUMA configuration found Jul 10 00:47:43.942772 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cfdbfff] Jul 10 00:47:43.942780 kernel: NODE_DATA(0) allocated [mem 0x9cfd6000-0x9cfdbfff] Jul 10 00:47:43.942786 kernel: Zone ranges: Jul 10 00:47:43.942793 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Jul 10 00:47:43.942799 kernel: DMA32 [mem 0x0000000001000000-0x000000009cfdbfff] Jul 10 00:47:43.942806 kernel: Normal empty Jul 10 00:47:43.942812 kernel: Movable zone start for each node Jul 10 00:47:43.942819 kernel: Early memory node ranges Jul 10 00:47:43.942825 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Jul 10 00:47:43.942832 kernel: node 0: [mem 0x0000000000100000-0x000000009cfdbfff] Jul 10 00:47:43.942838 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cfdbfff] Jul 10 00:47:43.942849 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Jul 10 00:47:43.942855 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Jul 10 00:47:43.942862 kernel: On node 0, zone DMA32: 12324 pages in unavailable ranges Jul 10 00:47:43.942868 kernel: ACPI: PM-Timer IO Port: 0x608 Jul 10 00:47:43.942875 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Jul 10 00:47:43.942881 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Jul 10 00:47:43.942888 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Jul 10 00:47:43.942894 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Jul 10 00:47:43.942901 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Jul 10 00:47:43.942911 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Jul 10 00:47:43.942918 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Jul 10 00:47:43.942925 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Jul 10 00:47:43.942931 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Jul 10 00:47:43.942938 kernel: TSC deadline timer available Jul 10 00:47:43.942944 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Jul 10 00:47:43.942951 kernel: kvm-guest: KVM setup pv remote TLB flush Jul 10 00:47:43.942957 kernel: kvm-guest: setup PV sched yield Jul 10 00:47:43.942964 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices Jul 10 00:47:43.942971 kernel: Booting paravirtualized kernel on KVM Jul 10 00:47:43.942978 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Jul 10 00:47:43.942985 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Jul 10 00:47:43.942992 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 Jul 10 00:47:43.942998 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 Jul 10 00:47:43.943004 kernel: pcpu-alloc: [0] 0 1 2 3 Jul 10 00:47:43.943011 kernel: kvm-guest: setup async PF for cpu 0 Jul 10 00:47:43.943017 kernel: kvm-guest: stealtime: cpu 0, msr 9a41c0c0 Jul 10 00:47:43.943024 kernel: kvm-guest: PV spinlocks enabled Jul 10 00:47:43.943032 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Jul 10 00:47:43.943038 kernel: Built 1 zonelists, mobility grouping on. Total pages: 632732 Jul 10 00:47:43.943045 kernel: Policy zone: DMA32 Jul 10 00:47:43.943052 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=6cddad5f675165861f6062277cc28875548c735477e689762fc73abc16b63a3d Jul 10 00:47:43.943059 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Jul 10 00:47:43.943066 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Jul 10 00:47:43.943072 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jul 10 00:47:43.943079 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jul 10 00:47:43.943087 kernel: Memory: 2436696K/2571752K available (12295K kernel code, 2275K rwdata, 13724K rodata, 47472K init, 4108K bss, 134796K reserved, 0K cma-reserved) Jul 10 00:47:43.943094 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Jul 10 00:47:43.943100 kernel: ftrace: allocating 34602 entries in 136 pages Jul 10 00:47:43.943107 kernel: ftrace: allocated 136 pages with 2 groups Jul 10 00:47:43.943113 kernel: rcu: Hierarchical RCU implementation. Jul 10 00:47:43.943120 kernel: rcu: RCU event tracing is enabled. Jul 10 00:47:43.943127 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Jul 10 00:47:43.943134 kernel: Rude variant of Tasks RCU enabled. Jul 10 00:47:43.943140 kernel: Tracing variant of Tasks RCU enabled. Jul 10 00:47:43.943149 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jul 10 00:47:43.943155 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Jul 10 00:47:43.943162 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Jul 10 00:47:43.943168 kernel: random: crng init done Jul 10 00:47:43.943174 kernel: Console: colour VGA+ 80x25 Jul 10 00:47:43.943181 kernel: printk: console [ttyS0] enabled Jul 10 00:47:43.943188 kernel: ACPI: Core revision 20210730 Jul 10 00:47:43.943194 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Jul 10 00:47:43.943201 kernel: APIC: Switch to symmetric I/O mode setup Jul 10 00:47:43.943209 kernel: x2apic enabled Jul 10 00:47:43.943215 kernel: Switched APIC routing to physical x2apic. Jul 10 00:47:43.943224 kernel: kvm-guest: setup PV IPIs Jul 10 00:47:43.943231 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Jul 10 00:47:43.943237 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Jul 10 00:47:43.943246 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) Jul 10 00:47:43.943253 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Jul 10 00:47:43.943259 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Jul 10 00:47:43.943266 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Jul 10 00:47:43.943279 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Jul 10 00:47:43.943286 kernel: Spectre V2 : Mitigation: Retpolines Jul 10 00:47:43.943293 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Jul 10 00:47:43.943301 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Jul 10 00:47:43.943308 kernel: RETBleed: Mitigation: untrained return thunk Jul 10 00:47:43.943315 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Jul 10 00:47:43.943322 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Jul 10 00:47:43.943329 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Jul 10 00:47:43.943336 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Jul 10 00:47:43.943344 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Jul 10 00:47:43.943351 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Jul 10 00:47:43.943358 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Jul 10 00:47:43.943365 kernel: Freeing SMP alternatives memory: 32K Jul 10 00:47:43.943372 kernel: pid_max: default: 32768 minimum: 301 Jul 10 00:47:43.943378 kernel: LSM: Security Framework initializing Jul 10 00:47:43.943385 kernel: SELinux: Initializing. Jul 10 00:47:43.943408 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jul 10 00:47:43.943417 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jul 10 00:47:43.943424 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) Jul 10 00:47:43.943431 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Jul 10 00:47:43.943437 kernel: ... version: 0 Jul 10 00:47:43.943444 kernel: ... bit width: 48 Jul 10 00:47:43.943451 kernel: ... generic registers: 6 Jul 10 00:47:43.943458 kernel: ... value mask: 0000ffffffffffff Jul 10 00:47:43.943465 kernel: ... max period: 00007fffffffffff Jul 10 00:47:43.943471 kernel: ... fixed-purpose events: 0 Jul 10 00:47:43.943479 kernel: ... event mask: 000000000000003f Jul 10 00:47:43.943486 kernel: signal: max sigframe size: 1776 Jul 10 00:47:43.943493 kernel: rcu: Hierarchical SRCU implementation. Jul 10 00:47:43.943506 kernel: smp: Bringing up secondary CPUs ... Jul 10 00:47:43.943513 kernel: x86: Booting SMP configuration: Jul 10 00:47:43.943520 kernel: .... node #0, CPUs: #1 Jul 10 00:47:43.943527 kernel: kvm-clock: cpu 1, msr 7919a041, secondary cpu clock Jul 10 00:47:43.943534 kernel: kvm-guest: setup async PF for cpu 1 Jul 10 00:47:43.943541 kernel: kvm-guest: stealtime: cpu 1, msr 9a49c0c0 Jul 10 00:47:43.943549 kernel: #2 Jul 10 00:47:43.943556 kernel: kvm-clock: cpu 2, msr 7919a081, secondary cpu clock Jul 10 00:47:43.943562 kernel: kvm-guest: setup async PF for cpu 2 Jul 10 00:47:43.943569 kernel: kvm-guest: stealtime: cpu 2, msr 9a51c0c0 Jul 10 00:47:43.943576 kernel: #3 Jul 10 00:47:43.943586 kernel: kvm-clock: cpu 3, msr 7919a0c1, secondary cpu clock Jul 10 00:47:43.943593 kernel: kvm-guest: setup async PF for cpu 3 Jul 10 00:47:43.943600 kernel: kvm-guest: stealtime: cpu 3, msr 9a59c0c0 Jul 10 00:47:43.943614 kernel: smp: Brought up 1 node, 4 CPUs Jul 10 00:47:43.943655 kernel: smpboot: Max logical packages: 1 Jul 10 00:47:43.943675 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) Jul 10 00:47:43.943683 kernel: devtmpfs: initialized Jul 10 00:47:43.943689 kernel: x86/mm: Memory block size: 128MB Jul 10 00:47:43.943697 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jul 10 00:47:43.943704 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Jul 10 00:47:43.943711 kernel: pinctrl core: initialized pinctrl subsystem Jul 10 00:47:43.943717 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jul 10 00:47:43.943724 kernel: audit: initializing netlink subsys (disabled) Jul 10 00:47:43.943733 kernel: audit: type=2000 audit(1752108463.356:1): state=initialized audit_enabled=0 res=1 Jul 10 00:47:43.943740 kernel: thermal_sys: Registered thermal governor 'step_wise' Jul 10 00:47:43.943747 kernel: thermal_sys: Registered thermal governor 'user_space' Jul 10 00:47:43.943754 kernel: cpuidle: using governor menu Jul 10 00:47:43.943761 kernel: ACPI: bus type PCI registered Jul 10 00:47:43.943768 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jul 10 00:47:43.943774 kernel: dca service started, version 1.12.1 Jul 10 00:47:43.943782 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Jul 10 00:47:43.943788 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Jul 10 00:47:43.943797 kernel: PCI: Using configuration type 1 for base access Jul 10 00:47:43.943804 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Jul 10 00:47:43.943810 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Jul 10 00:47:43.943817 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Jul 10 00:47:43.943824 kernel: ACPI: Added _OSI(Module Device) Jul 10 00:47:43.943831 kernel: ACPI: Added _OSI(Processor Device) Jul 10 00:47:43.943847 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jul 10 00:47:43.943861 kernel: ACPI: Added _OSI(Linux-Dell-Video) Jul 10 00:47:43.943878 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Jul 10 00:47:43.943888 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Jul 10 00:47:43.943895 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Jul 10 00:47:43.943901 kernel: ACPI: Interpreter enabled Jul 10 00:47:43.943908 kernel: ACPI: PM: (supports S0 S3 S5) Jul 10 00:47:43.943915 kernel: ACPI: Using IOAPIC for interrupt routing Jul 10 00:47:43.943922 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Jul 10 00:47:43.943929 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Jul 10 00:47:43.943936 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Jul 10 00:47:43.944107 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Jul 10 00:47:43.944189 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] Jul 10 00:47:43.944262 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] Jul 10 00:47:43.944271 kernel: PCI host bridge to bus 0000:00 Jul 10 00:47:43.944362 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Jul 10 00:47:43.944473 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Jul 10 00:47:43.944552 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Jul 10 00:47:43.944621 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] Jul 10 00:47:43.944686 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Jul 10 00:47:43.944750 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x8ffffffff window] Jul 10 00:47:43.944813 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Jul 10 00:47:43.944910 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Jul 10 00:47:43.945001 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 Jul 10 00:47:43.945077 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfd000000-0xfdffffff pref] Jul 10 00:47:43.945153 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xfebd0000-0xfebd0fff] Jul 10 00:47:43.945226 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfebc0000-0xfebcffff pref] Jul 10 00:47:43.945299 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Jul 10 00:47:43.945404 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 Jul 10 00:47:43.945487 kernel: pci 0000:00:02.0: reg 0x10: [io 0xc0c0-0xc0df] Jul 10 00:47:43.945576 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xfebd1000-0xfebd1fff] Jul 10 00:47:43.945652 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfe000000-0xfe003fff 64bit pref] Jul 10 00:47:43.945738 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 Jul 10 00:47:43.945813 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc000-0xc07f] Jul 10 00:47:43.945885 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebd2000-0xfebd2fff] Jul 10 00:47:43.945957 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe004000-0xfe007fff 64bit pref] Jul 10 00:47:43.946105 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Jul 10 00:47:43.946187 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc0e0-0xc0ff] Jul 10 00:47:43.946265 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebd3000-0xfebd3fff] Jul 10 00:47:43.946370 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe008000-0xfe00bfff 64bit pref] Jul 10 00:47:43.946461 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfeb80000-0xfebbffff pref] Jul 10 00:47:43.946564 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Jul 10 00:47:43.946638 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Jul 10 00:47:43.946727 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Jul 10 00:47:43.946802 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc100-0xc11f] Jul 10 00:47:43.946878 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfebd4000-0xfebd4fff] Jul 10 00:47:43.946967 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Jul 10 00:47:43.947041 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] Jul 10 00:47:43.947050 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Jul 10 00:47:43.947058 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Jul 10 00:47:43.947065 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Jul 10 00:47:43.947072 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Jul 10 00:47:43.947079 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 Jul 10 00:47:43.947088 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 Jul 10 00:47:43.947095 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Jul 10 00:47:43.947102 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Jul 10 00:47:43.947108 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 Jul 10 00:47:43.947115 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 Jul 10 00:47:43.947122 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 Jul 10 00:47:43.947129 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 Jul 10 00:47:43.947136 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 Jul 10 00:47:43.947143 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 Jul 10 00:47:43.947151 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 Jul 10 00:47:43.947157 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 Jul 10 00:47:43.947164 kernel: iommu: Default domain type: Translated Jul 10 00:47:43.947171 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Jul 10 00:47:43.947245 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Jul 10 00:47:43.947318 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Jul 10 00:47:43.947389 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Jul 10 00:47:43.947411 kernel: vgaarb: loaded Jul 10 00:47:43.947418 kernel: pps_core: LinuxPPS API ver. 1 registered Jul 10 00:47:43.947427 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Jul 10 00:47:43.947434 kernel: PTP clock support registered Jul 10 00:47:43.947441 kernel: PCI: Using ACPI for IRQ routing Jul 10 00:47:43.947448 kernel: PCI: pci_cache_line_size set to 64 bytes Jul 10 00:47:43.947455 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Jul 10 00:47:43.947462 kernel: e820: reserve RAM buffer [mem 0x9cfdc000-0x9fffffff] Jul 10 00:47:43.947469 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Jul 10 00:47:43.947476 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Jul 10 00:47:43.947483 kernel: clocksource: Switched to clocksource kvm-clock Jul 10 00:47:43.947491 kernel: VFS: Disk quotas dquot_6.6.0 Jul 10 00:47:43.947498 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jul 10 00:47:43.947512 kernel: pnp: PnP ACPI init Jul 10 00:47:43.947607 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved Jul 10 00:47:43.947618 kernel: pnp: PnP ACPI: found 6 devices Jul 10 00:47:43.947625 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Jul 10 00:47:43.947632 kernel: NET: Registered PF_INET protocol family Jul 10 00:47:43.947639 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Jul 10 00:47:43.947649 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Jul 10 00:47:43.947656 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jul 10 00:47:43.947663 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Jul 10 00:47:43.947670 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Jul 10 00:47:43.947677 kernel: TCP: Hash tables configured (established 32768 bind 32768) Jul 10 00:47:43.947686 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Jul 10 00:47:43.947695 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Jul 10 00:47:43.947704 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jul 10 00:47:43.947715 kernel: NET: Registered PF_XDP protocol family Jul 10 00:47:43.947789 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Jul 10 00:47:43.947854 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Jul 10 00:47:43.947919 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Jul 10 00:47:43.947985 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] Jul 10 00:47:43.948050 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Jul 10 00:47:43.948115 kernel: pci_bus 0000:00: resource 9 [mem 0x100000000-0x8ffffffff window] Jul 10 00:47:43.948124 kernel: PCI: CLS 0 bytes, default 64 Jul 10 00:47:43.948131 kernel: Initialise system trusted keyrings Jul 10 00:47:43.948141 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Jul 10 00:47:43.948167 kernel: Key type asymmetric registered Jul 10 00:47:43.948180 kernel: Asymmetric key parser 'x509' registered Jul 10 00:47:43.948187 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Jul 10 00:47:43.948194 kernel: io scheduler mq-deadline registered Jul 10 00:47:43.948201 kernel: io scheduler kyber registered Jul 10 00:47:43.948208 kernel: io scheduler bfq registered Jul 10 00:47:43.948215 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Jul 10 00:47:43.948222 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 Jul 10 00:47:43.948231 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 Jul 10 00:47:43.948238 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 Jul 10 00:47:43.948245 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jul 10 00:47:43.948252 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Jul 10 00:47:43.948259 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Jul 10 00:47:43.948266 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Jul 10 00:47:43.948273 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Jul 10 00:47:43.948381 kernel: rtc_cmos 00:04: RTC can wake from S4 Jul 10 00:47:43.948408 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Jul 10 00:47:43.948480 kernel: rtc_cmos 00:04: registered as rtc0 Jul 10 00:47:43.948562 kernel: rtc_cmos 00:04: setting system clock to 2025-07-10T00:47:43 UTC (1752108463) Jul 10 00:47:43.948629 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Jul 10 00:47:43.948638 kernel: NET: Registered PF_INET6 protocol family Jul 10 00:47:43.948645 kernel: Segment Routing with IPv6 Jul 10 00:47:43.948652 kernel: In-situ OAM (IOAM) with IPv6 Jul 10 00:47:43.948659 kernel: NET: Registered PF_PACKET protocol family Jul 10 00:47:43.948665 kernel: Key type dns_resolver registered Jul 10 00:47:43.948675 kernel: IPI shorthand broadcast: enabled Jul 10 00:47:43.948682 kernel: sched_clock: Marking stable (404002811, 97133050)->(568426553, -67290692) Jul 10 00:47:43.948688 kernel: registered taskstats version 1 Jul 10 00:47:43.948695 kernel: Loading compiled-in X.509 certificates Jul 10 00:47:43.948703 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.186-flatcar: 6ebecdd7757c0df63fc51731f0b99957f4e4af16' Jul 10 00:47:43.948709 kernel: Key type .fscrypt registered Jul 10 00:47:43.948716 kernel: Key type fscrypt-provisioning registered Jul 10 00:47:43.948723 kernel: ima: No TPM chip found, activating TPM-bypass! Jul 10 00:47:43.948732 kernel: ima: Allocated hash algorithm: sha1 Jul 10 00:47:43.948738 kernel: ima: No architecture policies found Jul 10 00:47:43.948745 kernel: clk: Disabling unused clocks Jul 10 00:47:43.948752 kernel: Freeing unused kernel image (initmem) memory: 47472K Jul 10 00:47:43.948759 kernel: Write protecting the kernel read-only data: 28672k Jul 10 00:47:43.948766 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Jul 10 00:47:43.948773 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K Jul 10 00:47:43.948780 kernel: Run /init as init process Jul 10 00:47:43.948787 kernel: with arguments: Jul 10 00:47:43.948794 kernel: /init Jul 10 00:47:43.948802 kernel: with environment: Jul 10 00:47:43.948808 kernel: HOME=/ Jul 10 00:47:43.948815 kernel: TERM=linux Jul 10 00:47:43.948822 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Jul 10 00:47:43.948831 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 10 00:47:43.948840 systemd[1]: Detected virtualization kvm. Jul 10 00:47:43.948848 systemd[1]: Detected architecture x86-64. Jul 10 00:47:43.948855 systemd[1]: Running in initrd. Jul 10 00:47:43.948864 systemd[1]: No hostname configured, using default hostname. Jul 10 00:47:43.948871 systemd[1]: Hostname set to . Jul 10 00:47:43.948879 systemd[1]: Initializing machine ID from VM UUID. Jul 10 00:47:43.948886 systemd[1]: Queued start job for default target initrd.target. Jul 10 00:47:43.948893 systemd[1]: Started systemd-ask-password-console.path. Jul 10 00:47:43.948901 systemd[1]: Reached target cryptsetup.target. Jul 10 00:47:43.948908 systemd[1]: Reached target paths.target. Jul 10 00:47:43.948915 systemd[1]: Reached target slices.target. Jul 10 00:47:43.948924 systemd[1]: Reached target swap.target. Jul 10 00:47:43.948938 systemd[1]: Reached target timers.target. Jul 10 00:47:43.948947 systemd[1]: Listening on iscsid.socket. Jul 10 00:47:43.948955 systemd[1]: Listening on iscsiuio.socket. Jul 10 00:47:43.948963 systemd[1]: Listening on systemd-journald-audit.socket. Jul 10 00:47:43.948972 systemd[1]: Listening on systemd-journald-dev-log.socket. Jul 10 00:47:43.948979 systemd[1]: Listening on systemd-journald.socket. Jul 10 00:47:43.948987 systemd[1]: Listening on systemd-networkd.socket. Jul 10 00:47:43.948994 systemd[1]: Listening on systemd-udevd-control.socket. Jul 10 00:47:43.949002 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 10 00:47:43.949009 systemd[1]: Reached target sockets.target. Jul 10 00:47:43.949017 systemd[1]: Starting kmod-static-nodes.service... Jul 10 00:47:43.949024 systemd[1]: Finished network-cleanup.service. Jul 10 00:47:43.949032 systemd[1]: Starting systemd-fsck-usr.service... Jul 10 00:47:43.949041 systemd[1]: Starting systemd-journald.service... Jul 10 00:47:43.949048 systemd[1]: Starting systemd-modules-load.service... Jul 10 00:47:43.949056 systemd[1]: Starting systemd-resolved.service... Jul 10 00:47:43.949064 systemd[1]: Starting systemd-vconsole-setup.service... Jul 10 00:47:43.949071 systemd[1]: Finished kmod-static-nodes.service. Jul 10 00:47:43.949079 kernel: audit: type=1130 audit(1752108463.941:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:43.949087 systemd[1]: Finished systemd-fsck-usr.service. Jul 10 00:47:43.949101 systemd-journald[197]: Journal started Jul 10 00:47:43.949141 systemd-journald[197]: Runtime Journal (/run/log/journal/c8155e084d87424082edb90a9872f842) is 6.0M, max 48.5M, 42.5M free. Jul 10 00:47:43.941000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:43.943893 systemd-modules-load[198]: Inserted module 'overlay' Jul 10 00:47:43.985190 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Jul 10 00:47:43.985214 kernel: Bridge firewalling registered Jul 10 00:47:43.985224 kernel: audit: type=1130 audit(1752108463.981:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:43.985240 systemd[1]: Started systemd-journald.service. Jul 10 00:47:43.981000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:43.968084 systemd-resolved[199]: Positive Trust Anchors: Jul 10 00:47:43.968092 systemd-resolved[199]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 10 00:47:43.988000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:43.968118 systemd-resolved[199]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 10 00:47:43.997127 kernel: audit: type=1130 audit(1752108463.988:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:43.997146 kernel: audit: type=1130 audit(1752108463.997:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:43.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:43.970345 systemd-resolved[199]: Defaulting to hostname 'linux'. Jul 10 00:47:43.981559 systemd-modules-load[198]: Inserted module 'br_netfilter' Jul 10 00:47:43.988826 systemd[1]: Started systemd-resolved.service. Jul 10 00:47:44.003621 kernel: SCSI subsystem initialized Jul 10 00:47:44.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:44.001520 systemd[1]: Finished systemd-vconsole-setup.service. Jul 10 00:47:44.003783 systemd[1]: Reached target nss-lookup.target. Jul 10 00:47:44.008660 kernel: audit: type=1130 audit(1752108464.003:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:44.009255 systemd[1]: Starting dracut-cmdline-ask.service... Jul 10 00:47:44.011305 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 10 00:47:44.015529 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jul 10 00:47:44.015555 kernel: device-mapper: uevent: version 1.0.3 Jul 10 00:47:44.016844 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Jul 10 00:47:44.017254 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 10 00:47:44.020751 kernel: audit: type=1130 audit(1752108464.016:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:44.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:44.021823 systemd-modules-load[198]: Inserted module 'dm_multipath' Jul 10 00:47:44.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:44.022414 systemd[1]: Finished systemd-modules-load.service. Jul 10 00:47:44.026599 kernel: audit: type=1130 audit(1752108464.021:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:44.023310 systemd[1]: Starting systemd-sysctl.service... Jul 10 00:47:44.033075 systemd[1]: Finished systemd-sysctl.service. Jul 10 00:47:44.036612 kernel: audit: type=1130 audit(1752108464.032:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:44.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:44.037480 systemd[1]: Finished dracut-cmdline-ask.service. Jul 10 00:47:44.041716 kernel: audit: type=1130 audit(1752108464.037:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:44.037000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:44.041768 systemd[1]: Starting dracut-cmdline.service... Jul 10 00:47:44.051061 dracut-cmdline[221]: dracut-dracut-053 Jul 10 00:47:44.052869 dracut-cmdline[221]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=6cddad5f675165861f6062277cc28875548c735477e689762fc73abc16b63a3d Jul 10 00:47:44.108418 kernel: Loading iSCSI transport class v2.0-870. Jul 10 00:47:44.124426 kernel: iscsi: registered transport (tcp) Jul 10 00:47:44.145557 kernel: iscsi: registered transport (qla4xxx) Jul 10 00:47:44.145573 kernel: QLogic iSCSI HBA Driver Jul 10 00:47:44.170336 systemd[1]: Finished dracut-cmdline.service. Jul 10 00:47:44.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:44.171242 systemd[1]: Starting dracut-pre-udev.service... Jul 10 00:47:44.218422 kernel: raid6: avx2x4 gen() 30596 MB/s Jul 10 00:47:44.235420 kernel: raid6: avx2x4 xor() 7989 MB/s Jul 10 00:47:44.252415 kernel: raid6: avx2x2 gen() 32176 MB/s Jul 10 00:47:44.269415 kernel: raid6: avx2x2 xor() 19157 MB/s Jul 10 00:47:44.286416 kernel: raid6: avx2x1 gen() 26518 MB/s Jul 10 00:47:44.303416 kernel: raid6: avx2x1 xor() 15267 MB/s Jul 10 00:47:44.320415 kernel: raid6: sse2x4 gen() 14811 MB/s Jul 10 00:47:44.337416 kernel: raid6: sse2x4 xor() 7416 MB/s Jul 10 00:47:44.354417 kernel: raid6: sse2x2 gen() 16095 MB/s Jul 10 00:47:44.371416 kernel: raid6: sse2x2 xor() 9817 MB/s Jul 10 00:47:44.388417 kernel: raid6: sse2x1 gen() 12366 MB/s Jul 10 00:47:44.405748 kernel: raid6: sse2x1 xor() 7684 MB/s Jul 10 00:47:44.405759 kernel: raid6: using algorithm avx2x2 gen() 32176 MB/s Jul 10 00:47:44.405772 kernel: raid6: .... xor() 19157 MB/s, rmw enabled Jul 10 00:47:44.406426 kernel: raid6: using avx2x2 recovery algorithm Jul 10 00:47:44.418419 kernel: xor: automatically using best checksumming function avx Jul 10 00:47:44.510437 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Jul 10 00:47:44.519450 systemd[1]: Finished dracut-pre-udev.service. Jul 10 00:47:44.519000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:44.520000 audit: BPF prog-id=7 op=LOAD Jul 10 00:47:44.520000 audit: BPF prog-id=8 op=LOAD Jul 10 00:47:44.521524 systemd[1]: Starting systemd-udevd.service... Jul 10 00:47:44.533771 systemd-udevd[400]: Using default interface naming scheme 'v252'. Jul 10 00:47:44.537698 systemd[1]: Started systemd-udevd.service. Jul 10 00:47:44.538469 systemd[1]: Starting dracut-pre-trigger.service... Jul 10 00:47:44.537000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:44.548259 dracut-pre-trigger[404]: rd.md=0: removing MD RAID activation Jul 10 00:47:44.572607 systemd[1]: Finished dracut-pre-trigger.service. Jul 10 00:47:44.573000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:44.574918 systemd[1]: Starting systemd-udev-trigger.service... Jul 10 00:47:44.609259 systemd[1]: Finished systemd-udev-trigger.service. Jul 10 00:47:44.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:44.643422 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Jul 10 00:47:44.649439 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Jul 10 00:47:44.649456 kernel: GPT:9289727 != 19775487 Jul 10 00:47:44.649465 kernel: GPT:Alternate GPT header not at the end of the disk. Jul 10 00:47:44.649474 kernel: GPT:9289727 != 19775487 Jul 10 00:47:44.649490 kernel: GPT: Use GNU Parted to correct GPT errors. Jul 10 00:47:44.649498 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 10 00:47:44.649509 kernel: cryptd: max_cpu_qlen set to 1000 Jul 10 00:47:44.656421 kernel: libata version 3.00 loaded. Jul 10 00:47:44.662104 kernel: AVX2 version of gcm_enc/dec engaged. Jul 10 00:47:44.662127 kernel: AES CTR mode by8 optimization enabled Jul 10 00:47:44.665844 kernel: ahci 0000:00:1f.2: version 3.0 Jul 10 00:47:44.680520 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 Jul 10 00:47:44.680533 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Jul 10 00:47:44.680647 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Jul 10 00:47:44.683041 kernel: scsi host0: ahci Jul 10 00:47:44.683152 kernel: scsi host1: ahci Jul 10 00:47:44.683257 kernel: scsi host2: ahci Jul 10 00:47:44.683342 kernel: scsi host3: ahci Jul 10 00:47:44.683444 kernel: scsi host4: ahci Jul 10 00:47:44.683542 kernel: scsi host5: ahci Jul 10 00:47:44.683628 kernel: ata1: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4100 irq 34 Jul 10 00:47:44.683641 kernel: ata2: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4180 irq 34 Jul 10 00:47:44.683649 kernel: ata3: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4200 irq 34 Jul 10 00:47:44.683658 kernel: ata4: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4280 irq 34 Jul 10 00:47:44.683668 kernel: ata5: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4300 irq 34 Jul 10 00:47:44.683676 kernel: ata6: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4380 irq 34 Jul 10 00:47:44.776450 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/vda6 scanned by (udev-worker) (443) Jul 10 00:47:44.777752 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Jul 10 00:47:44.782051 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Jul 10 00:47:44.784071 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Jul 10 00:47:44.792084 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Jul 10 00:47:44.797127 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 10 00:47:44.799764 systemd[1]: Starting disk-uuid.service... Jul 10 00:47:44.809865 disk-uuid[533]: Primary Header is updated. Jul 10 00:47:44.809865 disk-uuid[533]: Secondary Entries is updated. Jul 10 00:47:44.809865 disk-uuid[533]: Secondary Header is updated. Jul 10 00:47:44.813745 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 10 00:47:44.816419 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 10 00:47:44.820433 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 10 00:47:44.988429 kernel: ata2: SATA link down (SStatus 0 SControl 300) Jul 10 00:47:44.988497 kernel: ata1: SATA link down (SStatus 0 SControl 300) Jul 10 00:47:44.995419 kernel: ata5: SATA link down (SStatus 0 SControl 300) Jul 10 00:47:44.995453 kernel: ata4: SATA link down (SStatus 0 SControl 300) Jul 10 00:47:44.996423 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) Jul 10 00:47:44.997537 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Jul 10 00:47:44.997551 kernel: ata3.00: applying bridge limits Jul 10 00:47:44.998838 kernel: ata3.00: configured for UDMA/100 Jul 10 00:47:44.999422 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Jul 10 00:47:45.076765 kernel: ata6: SATA link down (SStatus 0 SControl 300) Jul 10 00:47:45.104430 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Jul 10 00:47:45.121005 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Jul 10 00:47:45.121018 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Jul 10 00:47:45.819420 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 10 00:47:45.819818 disk-uuid[534]: The operation has completed successfully. Jul 10 00:47:45.846829 systemd[1]: disk-uuid.service: Deactivated successfully. Jul 10 00:47:45.847000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:45.847000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:45.846914 systemd[1]: Finished disk-uuid.service. Jul 10 00:47:45.848510 systemd[1]: Starting verity-setup.service... Jul 10 00:47:45.864438 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" Jul 10 00:47:45.884607 systemd[1]: Found device dev-mapper-usr.device. Jul 10 00:47:45.887487 systemd[1]: Mounting sysusr-usr.mount... Jul 10 00:47:45.889581 systemd[1]: Finished verity-setup.service. Jul 10 00:47:45.891000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:45.951420 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 10 00:47:45.951638 systemd[1]: Mounted sysusr-usr.mount. Jul 10 00:47:45.951860 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Jul 10 00:47:45.953159 systemd[1]: Starting ignition-setup.service... Jul 10 00:47:45.955218 systemd[1]: Starting parse-ip-for-networkd.service... Jul 10 00:47:45.967978 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Jul 10 00:47:45.968003 kernel: BTRFS info (device vda6): using free space tree Jul 10 00:47:45.968013 kernel: BTRFS info (device vda6): has skinny extents Jul 10 00:47:45.977214 systemd[1]: mnt-oem.mount: Deactivated successfully. Jul 10 00:47:45.986378 systemd[1]: Finished ignition-setup.service. Jul 10 00:47:45.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:45.988628 systemd[1]: Starting ignition-fetch-offline.service... Jul 10 00:47:46.028207 systemd[1]: Finished parse-ip-for-networkd.service. Jul 10 00:47:46.027000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:46.029000 audit: BPF prog-id=9 op=LOAD Jul 10 00:47:46.030655 systemd[1]: Starting systemd-networkd.service... Jul 10 00:47:46.045203 ignition[652]: Ignition 2.14.0 Jul 10 00:47:46.045482 ignition[652]: Stage: fetch-offline Jul 10 00:47:46.045550 ignition[652]: no configs at "/usr/lib/ignition/base.d" Jul 10 00:47:46.045559 ignition[652]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 10 00:47:46.045888 ignition[652]: parsed url from cmdline: "" Jul 10 00:47:46.045892 ignition[652]: no config URL provided Jul 10 00:47:46.045898 ignition[652]: reading system config file "/usr/lib/ignition/user.ign" Jul 10 00:47:46.045906 ignition[652]: no config at "/usr/lib/ignition/user.ign" Jul 10 00:47:46.045924 ignition[652]: op(1): [started] loading QEMU firmware config module Jul 10 00:47:46.045929 ignition[652]: op(1): executing: "modprobe" "qemu_fw_cfg" Jul 10 00:47:46.101766 ignition[652]: op(1): [finished] loading QEMU firmware config module Jul 10 00:47:46.103516 ignition[652]: parsing config with SHA512: 6e2f912612137e7eefc92186305c07d075eb857f3e0c2efc09212255b77f1c419530275b39e2aef518b130ff845b4775f41abf87a19c15c8f763cf58c54a191f Jul 10 00:47:46.110097 unknown[652]: fetched base config from "system" Jul 10 00:47:46.110109 unknown[652]: fetched user config from "qemu" Jul 10 00:47:46.111198 ignition[652]: fetch-offline: fetch-offline passed Jul 10 00:47:46.111280 ignition[652]: Ignition finished successfully Jul 10 00:47:46.114640 systemd[1]: Finished ignition-fetch-offline.service. Jul 10 00:47:46.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:46.135626 systemd-networkd[716]: lo: Link UP Jul 10 00:47:46.135636 systemd-networkd[716]: lo: Gained carrier Jul 10 00:47:46.137000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:46.136134 systemd-networkd[716]: Enumeration completed Jul 10 00:47:46.136286 systemd[1]: Started systemd-networkd.service. Jul 10 00:47:46.136347 systemd-networkd[716]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 10 00:47:46.137814 systemd-networkd[716]: eth0: Link UP Jul 10 00:47:46.137817 systemd-networkd[716]: eth0: Gained carrier Jul 10 00:47:46.138121 systemd[1]: Reached target network.target. Jul 10 00:47:46.139498 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Jul 10 00:47:46.140592 systemd[1]: Starting ignition-kargs.service... Jul 10 00:47:46.143078 systemd[1]: Starting iscsiuio.service... Jul 10 00:47:46.151139 systemd-networkd[716]: eth0: DHCPv4 address 10.0.0.143/16, gateway 10.0.0.1 acquired from 10.0.0.1 Jul 10 00:47:46.152379 ignition[719]: Ignition 2.14.0 Jul 10 00:47:46.152386 ignition[719]: Stage: kargs Jul 10 00:47:46.152509 ignition[719]: no configs at "/usr/lib/ignition/base.d" Jul 10 00:47:46.152518 ignition[719]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 10 00:47:46.153246 ignition[719]: kargs: kargs passed Jul 10 00:47:46.156111 systemd[1]: Finished ignition-kargs.service. Jul 10 00:47:46.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:46.153289 ignition[719]: Ignition finished successfully Jul 10 00:47:46.158312 systemd[1]: Starting ignition-disks.service... Jul 10 00:47:46.166129 ignition[728]: Ignition 2.14.0 Jul 10 00:47:46.166142 ignition[728]: Stage: disks Jul 10 00:47:46.166267 ignition[728]: no configs at "/usr/lib/ignition/base.d" Jul 10 00:47:46.166277 ignition[728]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 10 00:47:46.170960 ignition[728]: disks: disks passed Jul 10 00:47:46.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:46.171063 systemd[1]: Started iscsiuio.service. Jul 10 00:47:46.171961 systemd[1]: Starting iscsid.service... Jul 10 00:47:46.174772 ignition[728]: Ignition finished successfully Jul 10 00:47:46.175848 systemd[1]: Finished ignition-disks.service. Jul 10 00:47:46.177382 iscsid[735]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Jul 10 00:47:46.177382 iscsid[735]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Jul 10 00:47:46.177382 iscsid[735]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Jul 10 00:47:46.177382 iscsid[735]: If using hardware iscsi like qla4xxx this message can be ignored. Jul 10 00:47:46.177382 iscsid[735]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Jul 10 00:47:46.177382 iscsid[735]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Jul 10 00:47:46.176000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:46.177504 systemd[1]: Reached target initrd-root-device.target. Jul 10 00:47:46.179614 systemd[1]: Reached target local-fs-pre.target. Jul 10 00:47:46.190516 systemd[1]: Reached target local-fs.target. Jul 10 00:47:46.192176 systemd[1]: Reached target sysinit.target. Jul 10 00:47:46.193719 systemd[1]: Reached target basic.target. Jul 10 00:47:46.195309 systemd[1]: Started iscsid.service. Jul 10 00:47:46.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:46.197806 systemd[1]: Starting dracut-initqueue.service... Jul 10 00:47:46.208453 systemd[1]: Finished dracut-initqueue.service. Jul 10 00:47:46.209000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:46.210076 systemd[1]: Reached target remote-fs-pre.target. Jul 10 00:47:46.211675 systemd[1]: Reached target remote-cryptsetup.target. Jul 10 00:47:46.213325 systemd[1]: Reached target remote-fs.target. Jul 10 00:47:46.215500 systemd[1]: Starting dracut-pre-mount.service... Jul 10 00:47:46.222882 systemd[1]: Finished dracut-pre-mount.service. Jul 10 00:47:46.224000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:46.225218 systemd[1]: Starting systemd-fsck-root.service... Jul 10 00:47:46.238170 systemd-fsck[751]: ROOT: clean, 619/553520 files, 56023/553472 blocks Jul 10 00:47:46.243193 systemd[1]: Finished systemd-fsck-root.service. Jul 10 00:47:46.242000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:46.245194 systemd[1]: Mounting sysroot.mount... Jul 10 00:47:46.255347 systemd[1]: Mounted sysroot.mount. Jul 10 00:47:46.256748 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Jul 10 00:47:46.256811 systemd[1]: Reached target initrd-root-fs.target. Jul 10 00:47:46.259405 systemd[1]: Mounting sysroot-usr.mount... Jul 10 00:47:46.261030 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Jul 10 00:47:46.261066 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Jul 10 00:47:46.261086 systemd[1]: Reached target ignition-diskful.target. Jul 10 00:47:46.266204 systemd[1]: Mounted sysroot-usr.mount. Jul 10 00:47:46.268233 systemd[1]: Starting initrd-setup-root.service... Jul 10 00:47:46.272702 initrd-setup-root[761]: cut: /sysroot/etc/passwd: No such file or directory Jul 10 00:47:46.276817 initrd-setup-root[769]: cut: /sysroot/etc/group: No such file or directory Jul 10 00:47:46.279684 initrd-setup-root[777]: cut: /sysroot/etc/shadow: No such file or directory Jul 10 00:47:46.283230 initrd-setup-root[785]: cut: /sysroot/etc/gshadow: No such file or directory Jul 10 00:47:46.312701 systemd[1]: Finished initrd-setup-root.service. Jul 10 00:47:46.313000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:46.315104 systemd[1]: Starting ignition-mount.service... Jul 10 00:47:46.317103 systemd[1]: Starting sysroot-boot.service... Jul 10 00:47:46.320162 bash[802]: umount: /sysroot/usr/share/oem: not mounted. Jul 10 00:47:46.334979 systemd[1]: Finished sysroot-boot.service. Jul 10 00:47:46.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:46.336518 ignition[803]: INFO : Ignition 2.14.0 Jul 10 00:47:46.336518 ignition[803]: INFO : Stage: mount Jul 10 00:47:46.336518 ignition[803]: INFO : no configs at "/usr/lib/ignition/base.d" Jul 10 00:47:46.336518 ignition[803]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 10 00:47:46.336518 ignition[803]: INFO : mount: mount passed Jul 10 00:47:46.336518 ignition[803]: INFO : Ignition finished successfully Jul 10 00:47:46.340289 systemd[1]: Finished ignition-mount.service. Jul 10 00:47:46.341000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:46.897418 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 10 00:47:46.907328 kernel: BTRFS: device label OEM devid 1 transid 10 /dev/vda6 scanned by mount (812) Jul 10 00:47:46.907357 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Jul 10 00:47:46.907367 kernel: BTRFS info (device vda6): using free space tree Jul 10 00:47:46.908091 kernel: BTRFS info (device vda6): has skinny extents Jul 10 00:47:46.912217 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 10 00:47:46.913721 systemd[1]: Starting ignition-files.service... Jul 10 00:47:46.927671 ignition[832]: INFO : Ignition 2.14.0 Jul 10 00:47:46.927671 ignition[832]: INFO : Stage: files Jul 10 00:47:46.929362 ignition[832]: INFO : no configs at "/usr/lib/ignition/base.d" Jul 10 00:47:46.929362 ignition[832]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 10 00:47:46.929362 ignition[832]: DEBUG : files: compiled without relabeling support, skipping Jul 10 00:47:46.932985 ignition[832]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Jul 10 00:47:46.932985 ignition[832]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Jul 10 00:47:46.932985 ignition[832]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Jul 10 00:47:46.932985 ignition[832]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Jul 10 00:47:46.932985 ignition[832]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Jul 10 00:47:46.932910 unknown[832]: wrote ssh authorized keys file for user: core Jul 10 00:47:46.940893 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Jul 10 00:47:46.940893 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Jul 10 00:47:46.940893 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Jul 10 00:47:46.940893 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Jul 10 00:47:46.940893 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" Jul 10 00:47:46.940893 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" Jul 10 00:47:46.940893 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" Jul 10 00:47:46.940893 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://extensions.flatcar.org/extensions/kubernetes-v1.31.8-x86-64.raw: attempt #1 Jul 10 00:47:47.588609 systemd-networkd[716]: eth0: Gained IPv6LL Jul 10 00:47:47.740834 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Jul 10 00:47:48.734504 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" Jul 10 00:47:48.737234 ignition[832]: INFO : files: op(7): [started] processing unit "coreos-metadata.service" Jul 10 00:47:48.737234 ignition[832]: INFO : files: op(7): op(8): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Jul 10 00:47:48.737234 ignition[832]: INFO : files: op(7): op(8): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Jul 10 00:47:48.737234 ignition[832]: INFO : files: op(7): [finished] processing unit "coreos-metadata.service" Jul 10 00:47:48.737234 ignition[832]: INFO : files: op(9): [started] setting preset to disabled for "coreos-metadata.service" Jul 10 00:47:48.737234 ignition[832]: INFO : files: op(9): op(a): [started] removing enablement symlink(s) for "coreos-metadata.service" Jul 10 00:47:48.928817 ignition[832]: INFO : files: op(9): op(a): [finished] removing enablement symlink(s) for "coreos-metadata.service" Jul 10 00:47:48.930391 ignition[832]: INFO : files: op(9): [finished] setting preset to disabled for "coreos-metadata.service" Jul 10 00:47:48.930391 ignition[832]: INFO : files: createResultFile: createFiles: op(b): [started] writing file "/sysroot/etc/.ignition-result.json" Jul 10 00:47:48.930391 ignition[832]: INFO : files: createResultFile: createFiles: op(b): [finished] writing file "/sysroot/etc/.ignition-result.json" Jul 10 00:47:48.930391 ignition[832]: INFO : files: files passed Jul 10 00:47:48.930391 ignition[832]: INFO : Ignition finished successfully Jul 10 00:47:48.947342 kernel: kauditd_printk_skb: 25 callbacks suppressed Jul 10 00:47:48.947388 kernel: audit: type=1130 audit(1752108468.932:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:48.947418 kernel: audit: type=1130 audit(1752108468.942:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:48.947432 kernel: audit: type=1130 audit(1752108468.946:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:48.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:48.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:48.946000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:48.930989 systemd[1]: Finished ignition-files.service. Jul 10 00:47:48.955087 kernel: audit: type=1131 audit(1752108468.946:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:48.946000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:48.933721 systemd[1]: Starting initrd-setup-root-after-ignition.service... Jul 10 00:47:48.938801 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Jul 10 00:47:48.958134 initrd-setup-root-after-ignition[855]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Jul 10 00:47:48.939794 systemd[1]: Starting ignition-quench.service... Jul 10 00:47:48.960611 initrd-setup-root-after-ignition[859]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Jul 10 00:47:48.941238 systemd[1]: Finished initrd-setup-root-after-ignition.service. Jul 10 00:47:48.943015 systemd[1]: ignition-quench.service: Deactivated successfully. Jul 10 00:47:48.943081 systemd[1]: Finished ignition-quench.service. Jul 10 00:47:48.947465 systemd[1]: Reached target ignition-complete.target. Jul 10 00:47:48.954346 systemd[1]: Starting initrd-parse-etc.service... Jul 10 00:47:48.966070 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jul 10 00:47:48.974561 kernel: audit: type=1130 audit(1752108468.967:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:48.974577 kernel: audit: type=1131 audit(1752108468.967:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:48.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:48.967000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:48.966147 systemd[1]: Finished initrd-parse-etc.service. Jul 10 00:47:48.967596 systemd[1]: Reached target initrd-fs.target. Jul 10 00:47:48.974568 systemd[1]: Reached target initrd.target. Jul 10 00:47:48.975339 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Jul 10 00:47:48.976094 systemd[1]: Starting dracut-pre-pivot.service... Jul 10 00:47:48.985796 systemd[1]: Finished dracut-pre-pivot.service. Jul 10 00:47:48.990617 kernel: audit: type=1130 audit(1752108468.985:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:48.985000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:48.986503 systemd[1]: Starting initrd-cleanup.service... Jul 10 00:47:48.993843 systemd[1]: Stopped target nss-lookup.target. Jul 10 00:47:49.029691 kernel: audit: type=1131 audit(1752108468.994:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:49.029705 kernel: audit: type=1131 audit(1752108468.999:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:49.029716 kernel: audit: type=1131 audit(1752108469.002:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:48.994000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:48.999000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:49.002000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:49.005000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:49.010000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:49.010000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:49.013000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:49.013000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:49.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:49.018000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:49.021000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:49.022000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:49.022000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:49.022000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:48.993980 systemd[1]: Stopped target remote-cryptsetup.target. Jul 10 00:47:48.994162 systemd[1]: Stopped target timers.target. Jul 10 00:47:49.031839 ignition[873]: INFO : Ignition 2.14.0 Jul 10 00:47:49.031839 ignition[873]: INFO : Stage: umount Jul 10 00:47:49.031839 ignition[873]: INFO : no configs at "/usr/lib/ignition/base.d" Jul 10 00:47:49.031839 ignition[873]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 10 00:47:49.031839 ignition[873]: INFO : umount: umount passed Jul 10 00:47:49.031839 ignition[873]: INFO : Ignition finished successfully Jul 10 00:47:49.033000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:48.994308 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jul 10 00:47:48.994441 systemd[1]: Stopped dracut-pre-pivot.service. Jul 10 00:47:49.039000 audit: BPF prog-id=6 op=UNLOAD Jul 10 00:47:48.994721 systemd[1]: Stopped target initrd.target. Jul 10 00:47:48.997801 systemd[1]: Stopped target basic.target. Jul 10 00:47:48.997951 systemd[1]: Stopped target ignition-complete.target. Jul 10 00:47:48.998114 systemd[1]: Stopped target ignition-diskful.target. Jul 10 00:47:48.998275 systemd[1]: Stopped target initrd-root-device.target. Jul 10 00:47:48.998460 systemd[1]: Stopped target remote-fs.target. Jul 10 00:47:48.998605 systemd[1]: Stopped target remote-fs-pre.target. Jul 10 00:47:48.998770 systemd[1]: Stopped target sysinit.target. Jul 10 00:47:48.998928 systemd[1]: Stopped target local-fs.target. Jul 10 00:47:48.999087 systemd[1]: Stopped target local-fs-pre.target. Jul 10 00:47:48.999258 systemd[1]: Stopped target swap.target. Jul 10 00:47:48.999387 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jul 10 00:47:48.999489 systemd[1]: Stopped dracut-pre-mount.service. Jul 10 00:47:48.999632 systemd[1]: Stopped target cryptsetup.target. Jul 10 00:47:49.002705 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jul 10 00:47:49.002794 systemd[1]: Stopped dracut-initqueue.service. Jul 10 00:47:49.002913 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Jul 10 00:47:49.003001 systemd[1]: Stopped ignition-fetch-offline.service. Jul 10 00:47:49.006081 systemd[1]: Stopped target paths.target. Jul 10 00:47:49.006152 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jul 10 00:47:49.009438 systemd[1]: Stopped systemd-ask-password-console.path. Jul 10 00:47:49.009686 systemd[1]: Stopped target slices.target. Jul 10 00:47:49.009830 systemd[1]: Stopped target sockets.target. Jul 10 00:47:49.009982 systemd[1]: iscsid.socket: Deactivated successfully. Jul 10 00:47:49.010046 systemd[1]: Closed iscsid.socket. Jul 10 00:47:49.010159 systemd[1]: iscsiuio.socket: Deactivated successfully. Jul 10 00:47:49.010233 systemd[1]: Closed iscsiuio.socket. Jul 10 00:47:49.010656 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Jul 10 00:47:49.010740 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Jul 10 00:47:49.010983 systemd[1]: ignition-files.service: Deactivated successfully. Jul 10 00:47:49.011066 systemd[1]: Stopped ignition-files.service. Jul 10 00:47:49.011983 systemd[1]: Stopping ignition-mount.service... Jul 10 00:47:49.013154 systemd[1]: Stopping sysroot-boot.service... Jul 10 00:47:49.013656 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jul 10 00:47:49.013797 systemd[1]: Stopped systemd-udev-trigger.service. Jul 10 00:47:49.014110 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jul 10 00:47:49.014240 systemd[1]: Stopped dracut-pre-trigger.service. Jul 10 00:47:49.018367 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jul 10 00:47:49.018467 systemd[1]: Finished initrd-cleanup.service. Jul 10 00:47:49.022153 systemd[1]: ignition-mount.service: Deactivated successfully. Jul 10 00:47:49.022224 systemd[1]: Stopped ignition-mount.service. Jul 10 00:47:49.022304 systemd[1]: Stopped target network.target. Jul 10 00:47:49.022663 systemd[1]: ignition-disks.service: Deactivated successfully. Jul 10 00:47:49.022697 systemd[1]: Stopped ignition-disks.service. Jul 10 00:47:49.022831 systemd[1]: ignition-kargs.service: Deactivated successfully. Jul 10 00:47:49.022859 systemd[1]: Stopped ignition-kargs.service. Jul 10 00:47:49.022999 systemd[1]: ignition-setup.service: Deactivated successfully. Jul 10 00:47:49.023031 systemd[1]: Stopped ignition-setup.service. Jul 10 00:47:49.023258 systemd[1]: Stopping systemd-networkd.service... Jul 10 00:47:49.023491 systemd[1]: Stopping systemd-resolved.service... Jul 10 00:47:49.028189 systemd[1]: sysroot-boot.mount: Deactivated successfully. Jul 10 00:47:49.031982 systemd[1]: systemd-resolved.service: Deactivated successfully. Jul 10 00:47:49.032080 systemd[1]: Stopped systemd-resolved.service. Jul 10 00:47:49.033504 systemd-networkd[716]: eth0: DHCPv6 lease lost Jul 10 00:47:49.040153 systemd[1]: systemd-networkd.service: Deactivated successfully. Jul 10 00:47:49.041532 systemd[1]: Stopped systemd-networkd.service. Jul 10 00:47:49.079000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:49.080299 systemd[1]: systemd-networkd.socket: Deactivated successfully. Jul 10 00:47:49.081000 audit: BPF prog-id=9 op=UNLOAD Jul 10 00:47:49.080332 systemd[1]: Closed systemd-networkd.socket. Jul 10 00:47:49.083501 systemd[1]: Stopping network-cleanup.service... Jul 10 00:47:49.085031 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Jul 10 00:47:49.085995 systemd[1]: Stopped parse-ip-for-networkd.service. Jul 10 00:47:49.087000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:49.087835 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jul 10 00:47:49.089000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:49.087873 systemd[1]: Stopped systemd-sysctl.service. Jul 10 00:47:49.089657 systemd[1]: systemd-modules-load.service: Deactivated successfully. Jul 10 00:47:49.090330 systemd[1]: Stopped systemd-modules-load.service. Jul 10 00:47:49.092000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:49.092853 systemd[1]: Stopping systemd-udevd.service... Jul 10 00:47:49.096087 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jul 10 00:47:49.097639 systemd[1]: sysroot-boot.service: Deactivated successfully. Jul 10 00:47:49.098553 systemd[1]: Stopped sysroot-boot.service. Jul 10 00:47:49.099000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:49.100671 systemd[1]: initrd-setup-root.service: Deactivated successfully. Jul 10 00:47:49.100720 systemd[1]: Stopped initrd-setup-root.service. Jul 10 00:47:49.102000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:49.103423 systemd[1]: systemd-udevd.service: Deactivated successfully. Jul 10 00:47:49.104364 systemd[1]: Stopped systemd-udevd.service. Jul 10 00:47:49.105000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:49.106308 systemd[1]: network-cleanup.service: Deactivated successfully. Jul 10 00:47:49.107236 systemd[1]: Stopped network-cleanup.service. Jul 10 00:47:49.108000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:49.108863 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jul 10 00:47:49.108900 systemd[1]: Closed systemd-udevd-control.socket. Jul 10 00:47:49.111349 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jul 10 00:47:49.111391 systemd[1]: Closed systemd-udevd-kernel.socket. Jul 10 00:47:49.113805 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jul 10 00:47:49.113845 systemd[1]: Stopped dracut-pre-udev.service. Jul 10 00:47:49.115000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:49.116182 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jul 10 00:47:49.116214 systemd[1]: Stopped dracut-cmdline.service. Jul 10 00:47:49.118000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:49.118491 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jul 10 00:47:49.118525 systemd[1]: Stopped dracut-cmdline-ask.service. Jul 10 00:47:49.120000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:49.121581 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Jul 10 00:47:49.123220 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Jul 10 00:47:49.123274 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Jul 10 00:47:49.125000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:49.126049 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jul 10 00:47:49.126089 systemd[1]: Stopped kmod-static-nodes.service. Jul 10 00:47:49.128000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:49.128536 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jul 10 00:47:49.128570 systemd[1]: Stopped systemd-vconsole-setup.service. Jul 10 00:47:49.130000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:49.131753 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Jul 10 00:47:49.133456 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jul 10 00:47:49.134491 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Jul 10 00:47:49.136000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:49.136000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:49.136260 systemd[1]: Reached target initrd-switch-root.target. Jul 10 00:47:49.138600 systemd[1]: Starting initrd-switch-root.service... Jul 10 00:47:49.154675 systemd[1]: Switching root. Jul 10 00:47:49.173249 iscsid[735]: iscsid shutting down. Jul 10 00:47:49.173943 systemd-journald[197]: Received SIGTERM from PID 1 (systemd). Jul 10 00:47:49.173974 systemd-journald[197]: Journal stopped Jul 10 00:47:52.861828 kernel: SELinux: Class mctp_socket not defined in policy. Jul 10 00:47:52.861892 kernel: SELinux: Class anon_inode not defined in policy. Jul 10 00:47:52.861904 kernel: SELinux: the above unknown classes and permissions will be allowed Jul 10 00:47:52.861913 kernel: SELinux: policy capability network_peer_controls=1 Jul 10 00:47:52.861923 kernel: SELinux: policy capability open_perms=1 Jul 10 00:47:52.861935 kernel: SELinux: policy capability extended_socket_class=1 Jul 10 00:47:52.861946 kernel: SELinux: policy capability always_check_network=0 Jul 10 00:47:52.861955 kernel: SELinux: policy capability cgroup_seclabel=1 Jul 10 00:47:52.861964 kernel: SELinux: policy capability nnp_nosuid_transition=1 Jul 10 00:47:52.861973 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Jul 10 00:47:52.862000 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Jul 10 00:47:52.862011 systemd[1]: Successfully loaded SELinux policy in 43.568ms. Jul 10 00:47:52.862029 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.700ms. Jul 10 00:47:52.862041 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 10 00:47:52.862053 systemd[1]: Detected virtualization kvm. Jul 10 00:47:52.862063 systemd[1]: Detected architecture x86-64. Jul 10 00:47:52.862076 systemd[1]: Detected first boot. Jul 10 00:47:52.862087 systemd[1]: Initializing machine ID from VM UUID. Jul 10 00:47:52.862097 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Jul 10 00:47:52.862106 systemd[1]: Populated /etc with preset unit settings. Jul 10 00:47:52.862118 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 10 00:47:52.862133 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 10 00:47:52.862145 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 10 00:47:52.862156 systemd[1]: iscsiuio.service: Deactivated successfully. Jul 10 00:47:52.862167 systemd[1]: Stopped iscsiuio.service. Jul 10 00:47:52.862177 systemd[1]: iscsid.service: Deactivated successfully. Jul 10 00:47:52.862187 systemd[1]: Stopped iscsid.service. Jul 10 00:47:52.862197 systemd[1]: initrd-switch-root.service: Deactivated successfully. Jul 10 00:47:52.862207 systemd[1]: Stopped initrd-switch-root.service. Jul 10 00:47:52.862217 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jul 10 00:47:52.862234 systemd[1]: Created slice system-addon\x2dconfig.slice. Jul 10 00:47:52.862252 systemd[1]: Created slice system-addon\x2drun.slice. Jul 10 00:47:52.862262 systemd[1]: Created slice system-getty.slice. Jul 10 00:47:52.862278 systemd[1]: Created slice system-modprobe.slice. Jul 10 00:47:52.862297 systemd[1]: Created slice system-serial\x2dgetty.slice. Jul 10 00:47:52.862308 systemd[1]: Created slice system-system\x2dcloudinit.slice. Jul 10 00:47:52.862319 systemd[1]: Created slice system-systemd\x2dfsck.slice. Jul 10 00:47:52.862329 systemd[1]: Created slice user.slice. Jul 10 00:47:52.862341 systemd[1]: Started systemd-ask-password-console.path. Jul 10 00:47:52.862351 systemd[1]: Started systemd-ask-password-wall.path. Jul 10 00:47:52.862362 systemd[1]: Set up automount boot.automount. Jul 10 00:47:52.862373 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Jul 10 00:47:52.862383 systemd[1]: Stopped target initrd-switch-root.target. Jul 10 00:47:52.862414 systemd[1]: Stopped target initrd-fs.target. Jul 10 00:47:52.862425 systemd[1]: Stopped target initrd-root-fs.target. Jul 10 00:47:52.862435 systemd[1]: Reached target integritysetup.target. Jul 10 00:47:52.862445 systemd[1]: Reached target remote-cryptsetup.target. Jul 10 00:47:52.862455 systemd[1]: Reached target remote-fs.target. Jul 10 00:47:52.862465 systemd[1]: Reached target slices.target. Jul 10 00:47:52.862475 systemd[1]: Reached target swap.target. Jul 10 00:47:52.862485 systemd[1]: Reached target torcx.target. Jul 10 00:47:52.862495 systemd[1]: Reached target veritysetup.target. Jul 10 00:47:52.862516 systemd[1]: Listening on systemd-coredump.socket. Jul 10 00:47:52.862526 systemd[1]: Listening on systemd-initctl.socket. Jul 10 00:47:52.862540 systemd[1]: Listening on systemd-networkd.socket. Jul 10 00:47:52.862550 systemd[1]: Listening on systemd-udevd-control.socket. Jul 10 00:47:52.862560 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 10 00:47:52.862570 systemd[1]: Listening on systemd-userdbd.socket. Jul 10 00:47:52.862581 systemd[1]: Mounting dev-hugepages.mount... Jul 10 00:47:52.862591 systemd[1]: Mounting dev-mqueue.mount... Jul 10 00:47:52.862601 systemd[1]: Mounting media.mount... Jul 10 00:47:52.862611 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 10 00:47:52.862623 systemd[1]: Mounting sys-kernel-debug.mount... Jul 10 00:47:52.862633 systemd[1]: Mounting sys-kernel-tracing.mount... Jul 10 00:47:52.862643 systemd[1]: Mounting tmp.mount... Jul 10 00:47:52.862653 systemd[1]: Starting flatcar-tmpfiles.service... Jul 10 00:47:52.862663 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 10 00:47:52.862673 systemd[1]: Starting kmod-static-nodes.service... Jul 10 00:47:52.862683 systemd[1]: Starting modprobe@configfs.service... Jul 10 00:47:52.862693 systemd[1]: Starting modprobe@dm_mod.service... Jul 10 00:47:52.862703 systemd[1]: Starting modprobe@drm.service... Jul 10 00:47:52.862715 systemd[1]: Starting modprobe@efi_pstore.service... Jul 10 00:47:52.862725 systemd[1]: Starting modprobe@fuse.service... Jul 10 00:47:52.862742 systemd[1]: Starting modprobe@loop.service... Jul 10 00:47:52.862753 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Jul 10 00:47:52.862763 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jul 10 00:47:52.862773 systemd[1]: Stopped systemd-fsck-root.service. Jul 10 00:47:52.862784 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Jul 10 00:47:52.862794 systemd[1]: Stopped systemd-fsck-usr.service. Jul 10 00:47:52.862806 kernel: fuse: init (API version 7.34) Jul 10 00:47:52.862816 kernel: loop: module loaded Jul 10 00:47:52.862826 systemd[1]: Stopped systemd-journald.service. Jul 10 00:47:52.862836 systemd[1]: Starting systemd-journald.service... Jul 10 00:47:52.862847 systemd[1]: Starting systemd-modules-load.service... Jul 10 00:47:52.862857 systemd[1]: Starting systemd-network-generator.service... Jul 10 00:47:52.862867 systemd[1]: Starting systemd-remount-fs.service... Jul 10 00:47:52.862878 systemd[1]: Starting systemd-udev-trigger.service... Jul 10 00:47:52.862888 systemd[1]: verity-setup.service: Deactivated successfully. Jul 10 00:47:52.862898 systemd[1]: Stopped verity-setup.service. Jul 10 00:47:52.862912 systemd-journald[995]: Journal started Jul 10 00:47:52.862949 systemd-journald[995]: Runtime Journal (/run/log/journal/c8155e084d87424082edb90a9872f842) is 6.0M, max 48.5M, 42.5M free. Jul 10 00:47:49.238000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Jul 10 00:47:49.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 10 00:47:49.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 10 00:47:49.434000 audit: BPF prog-id=10 op=LOAD Jul 10 00:47:49.434000 audit: BPF prog-id=10 op=UNLOAD Jul 10 00:47:49.434000 audit: BPF prog-id=11 op=LOAD Jul 10 00:47:49.434000 audit: BPF prog-id=11 op=UNLOAD Jul 10 00:47:49.473000 audit[906]: AVC avc: denied { associate } for pid=906 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Jul 10 00:47:49.473000 audit[906]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001858cc a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=889 pid=906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:47:49.473000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 10 00:47:49.474000 audit[906]: AVC avc: denied { associate } for pid=906 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Jul 10 00:47:49.474000 audit[906]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001859a5 a2=1ed a3=0 items=2 ppid=889 pid=906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:47:49.474000 audit: CWD cwd="/" Jul 10 00:47:49.474000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:49.474000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:49.474000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 10 00:47:52.732000 audit: BPF prog-id=12 op=LOAD Jul 10 00:47:52.733000 audit: BPF prog-id=3 op=UNLOAD Jul 10 00:47:52.733000 audit: BPF prog-id=13 op=LOAD Jul 10 00:47:52.733000 audit: BPF prog-id=14 op=LOAD Jul 10 00:47:52.733000 audit: BPF prog-id=4 op=UNLOAD Jul 10 00:47:52.733000 audit: BPF prog-id=5 op=UNLOAD Jul 10 00:47:52.734000 audit: BPF prog-id=15 op=LOAD Jul 10 00:47:52.734000 audit: BPF prog-id=12 op=UNLOAD Jul 10 00:47:52.734000 audit: BPF prog-id=16 op=LOAD Jul 10 00:47:52.734000 audit: BPF prog-id=17 op=LOAD Jul 10 00:47:52.734000 audit: BPF prog-id=13 op=UNLOAD Jul 10 00:47:52.734000 audit: BPF prog-id=14 op=UNLOAD Jul 10 00:47:52.735000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:52.738000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:52.741000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:52.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:52.744000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:52.746000 audit: BPF prog-id=15 op=UNLOAD Jul 10 00:47:52.839000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:52.843000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:52.844000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:52.844000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:52.845000 audit: BPF prog-id=18 op=LOAD Jul 10 00:47:52.845000 audit: BPF prog-id=19 op=LOAD Jul 10 00:47:52.845000 audit: BPF prog-id=20 op=LOAD Jul 10 00:47:52.845000 audit: BPF prog-id=16 op=UNLOAD Jul 10 00:47:52.845000 audit: BPF prog-id=17 op=UNLOAD Jul 10 00:47:52.860000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jul 10 00:47:52.860000 audit[995]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7fffabf8e6d0 a2=4000 a3=7fffabf8e76c items=0 ppid=1 pid=995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:47:52.860000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Jul 10 00:47:52.863000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:52.731724 systemd[1]: Queued start job for default target multi-user.target. Jul 10 00:47:49.470296 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-07-10T00:47:49Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Jul 10 00:47:52.731734 systemd[1]: Unnecessary job was removed for dev-vda6.device. Jul 10 00:47:49.470538 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-07-10T00:47:49Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 10 00:47:52.735870 systemd[1]: systemd-journald.service: Deactivated successfully. Jul 10 00:47:49.470555 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-07-10T00:47:49Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 10 00:47:49.470583 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-07-10T00:47:49Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Jul 10 00:47:49.470593 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-07-10T00:47:49Z" level=debug msg="skipped missing lower profile" missing profile=oem Jul 10 00:47:49.470625 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-07-10T00:47:49Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Jul 10 00:47:49.470637 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-07-10T00:47:49Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Jul 10 00:47:49.472648 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-07-10T00:47:49Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Jul 10 00:47:49.472690 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-07-10T00:47:49Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 10 00:47:49.472702 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-07-10T00:47:49Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 10 00:47:49.473306 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-07-10T00:47:49Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Jul 10 00:47:49.473341 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-07-10T00:47:49Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Jul 10 00:47:49.473357 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-07-10T00:47:49Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 Jul 10 00:47:49.473381 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-07-10T00:47:49Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Jul 10 00:47:49.473409 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-07-10T00:47:49Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 Jul 10 00:47:49.473422 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-07-10T00:47:49Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Jul 10 00:47:52.451458 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-07-10T00:47:52Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 10 00:47:52.451731 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-07-10T00:47:52Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 10 00:47:52.451843 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-07-10T00:47:52Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 10 00:47:52.452024 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-07-10T00:47:52Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 10 00:47:52.452070 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-07-10T00:47:52Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Jul 10 00:47:52.452139 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2025-07-10T00:47:52Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Jul 10 00:47:52.866433 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 10 00:47:52.868573 systemd[1]: Started systemd-journald.service. Jul 10 00:47:52.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:52.869416 systemd[1]: Mounted dev-hugepages.mount. Jul 10 00:47:52.870336 systemd[1]: Mounted dev-mqueue.mount. Jul 10 00:47:52.871190 systemd[1]: Mounted media.mount. Jul 10 00:47:52.871957 systemd[1]: Mounted sys-kernel-debug.mount. Jul 10 00:47:52.872841 systemd[1]: Mounted sys-kernel-tracing.mount. Jul 10 00:47:52.873734 systemd[1]: Mounted tmp.mount. Jul 10 00:47:52.874693 systemd[1]: Finished flatcar-tmpfiles.service. Jul 10 00:47:52.875000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:52.875808 systemd[1]: Finished kmod-static-nodes.service. Jul 10 00:47:52.876000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:52.876874 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jul 10 00:47:52.877053 systemd[1]: Finished modprobe@configfs.service. Jul 10 00:47:52.877000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:52.877000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:52.878204 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 10 00:47:52.878414 systemd[1]: Finished modprobe@dm_mod.service. Jul 10 00:47:52.878000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:52.878000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:52.879619 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 10 00:47:52.879796 systemd[1]: Finished modprobe@drm.service. Jul 10 00:47:52.880000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:52.880000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:52.880896 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 10 00:47:52.881077 systemd[1]: Finished modprobe@efi_pstore.service. Jul 10 00:47:52.881000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:52.881000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:52.882181 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jul 10 00:47:52.882349 systemd[1]: Finished modprobe@fuse.service. Jul 10 00:47:52.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:52.883000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:52.883430 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 10 00:47:52.883608 systemd[1]: Finished modprobe@loop.service. Jul 10 00:47:52.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:52.884000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:52.884650 systemd[1]: Finished systemd-modules-load.service. Jul 10 00:47:52.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:52.885831 systemd[1]: Finished systemd-network-generator.service. Jul 10 00:47:52.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:52.887147 systemd[1]: Finished systemd-remount-fs.service. Jul 10 00:47:52.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:52.888611 systemd[1]: Reached target network-pre.target. Jul 10 00:47:52.890737 systemd[1]: Mounting sys-fs-fuse-connections.mount... Jul 10 00:47:52.892770 systemd[1]: Mounting sys-kernel-config.mount... Jul 10 00:47:52.893798 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Jul 10 00:47:52.895385 systemd[1]: Starting systemd-hwdb-update.service... Jul 10 00:47:52.897335 systemd[1]: Starting systemd-journal-flush.service... Jul 10 00:47:52.898443 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 10 00:47:52.899713 systemd[1]: Starting systemd-random-seed.service... Jul 10 00:47:52.900659 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 10 00:47:52.901672 systemd-journald[995]: Time spent on flushing to /var/log/journal/c8155e084d87424082edb90a9872f842 is 21.400ms for 1082 entries. Jul 10 00:47:52.901672 systemd-journald[995]: System Journal (/var/log/journal/c8155e084d87424082edb90a9872f842) is 8.0M, max 195.6M, 187.6M free. Jul 10 00:47:52.943769 systemd-journald[995]: Received client request to flush runtime journal. Jul 10 00:47:52.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:52.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:52.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:52.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:52.941000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:52.903046 systemd[1]: Starting systemd-sysctl.service... Jul 10 00:47:52.906555 systemd[1]: Starting systemd-sysusers.service... Jul 10 00:47:52.908998 systemd[1]: Mounted sys-fs-fuse-connections.mount. Jul 10 00:47:52.944924 udevadm[1011]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Jul 10 00:47:52.910035 systemd[1]: Mounted sys-kernel-config.mount. Jul 10 00:47:52.911119 systemd[1]: Finished systemd-random-seed.service. Jul 10 00:47:52.912373 systemd[1]: Reached target first-boot-complete.target. Jul 10 00:47:52.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:52.918743 systemd[1]: Finished systemd-udev-trigger.service. Jul 10 00:47:52.921155 systemd[1]: Starting systemd-udev-settle.service... Jul 10 00:47:52.922207 systemd[1]: Finished systemd-sysusers.service. Jul 10 00:47:52.924246 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 10 00:47:52.925413 systemd[1]: Finished systemd-sysctl.service. Jul 10 00:47:52.941138 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 10 00:47:52.944452 systemd[1]: Finished systemd-journal-flush.service. Jul 10 00:47:53.654234 systemd[1]: Finished systemd-hwdb-update.service. Jul 10 00:47:53.654000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:53.655000 audit: BPF prog-id=21 op=LOAD Jul 10 00:47:53.655000 audit: BPF prog-id=22 op=LOAD Jul 10 00:47:53.655000 audit: BPF prog-id=7 op=UNLOAD Jul 10 00:47:53.655000 audit: BPF prog-id=8 op=UNLOAD Jul 10 00:47:53.657176 systemd[1]: Starting systemd-udevd.service... Jul 10 00:47:53.674574 systemd-udevd[1015]: Using default interface naming scheme 'v252'. Jul 10 00:47:53.687785 systemd[1]: Started systemd-udevd.service. Jul 10 00:47:53.688000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:53.691000 audit: BPF prog-id=23 op=LOAD Jul 10 00:47:53.692207 systemd[1]: Starting systemd-networkd.service... Jul 10 00:47:53.697000 audit: BPF prog-id=24 op=LOAD Jul 10 00:47:53.697000 audit: BPF prog-id=25 op=LOAD Jul 10 00:47:53.698000 audit: BPF prog-id=26 op=LOAD Jul 10 00:47:53.698911 systemd[1]: Starting systemd-userdbd.service... Jul 10 00:47:53.723196 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Jul 10 00:47:53.729623 systemd[1]: Started systemd-userdbd.service. Jul 10 00:47:53.730000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:53.751095 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 10 00:47:53.757419 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Jul 10 00:47:53.761424 kernel: ACPI: button: Power Button [PWRF] Jul 10 00:47:53.772701 systemd-networkd[1025]: lo: Link UP Jul 10 00:47:53.772989 systemd-networkd[1025]: lo: Gained carrier Jul 10 00:47:53.773482 systemd-networkd[1025]: Enumeration completed Jul 10 00:47:53.774000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:53.773651 systemd[1]: Started systemd-networkd.service. Jul 10 00:47:53.774612 systemd-networkd[1025]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 10 00:47:53.775706 systemd-networkd[1025]: eth0: Link UP Jul 10 00:47:53.775715 systemd-networkd[1025]: eth0: Gained carrier Jul 10 00:47:53.776000 audit[1019]: AVC avc: denied { confidentiality } for pid=1019 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Jul 10 00:47:53.776000 audit[1019]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=564ef3498a60 a1=338ac a2=7faefa864bc5 a3=5 items=110 ppid=1015 pid=1019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:47:53.776000 audit: CWD cwd="/" Jul 10 00:47:53.776000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=1 name=(null) inode=16463 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=2 name=(null) inode=16463 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=3 name=(null) inode=16464 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=4 name=(null) inode=16463 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=5 name=(null) inode=16465 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=6 name=(null) inode=16463 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=7 name=(null) inode=16466 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=8 name=(null) inode=16466 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=9 name=(null) inode=16467 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=10 name=(null) inode=16466 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=11 name=(null) inode=16468 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=12 name=(null) inode=16466 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=13 name=(null) inode=16469 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=14 name=(null) inode=16466 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=15 name=(null) inode=16470 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=16 name=(null) inode=16466 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=17 name=(null) inode=16471 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=18 name=(null) inode=16463 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=19 name=(null) inode=16472 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=20 name=(null) inode=16472 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=21 name=(null) inode=16473 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=22 name=(null) inode=16472 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=23 name=(null) inode=16474 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=24 name=(null) inode=16472 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=25 name=(null) inode=16475 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=26 name=(null) inode=16472 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=27 name=(null) inode=16476 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=28 name=(null) inode=16472 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=29 name=(null) inode=16477 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=30 name=(null) inode=16463 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=31 name=(null) inode=16478 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=32 name=(null) inode=16478 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=33 name=(null) inode=16479 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=34 name=(null) inode=16478 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=35 name=(null) inode=16480 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=36 name=(null) inode=16478 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=37 name=(null) inode=16481 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=38 name=(null) inode=16478 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=39 name=(null) inode=16482 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=40 name=(null) inode=16478 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=41 name=(null) inode=16483 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=42 name=(null) inode=16463 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=43 name=(null) inode=16484 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=44 name=(null) inode=16484 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=45 name=(null) inode=16485 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=46 name=(null) inode=16484 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=47 name=(null) inode=16486 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=48 name=(null) inode=16484 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=49 name=(null) inode=16487 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=50 name=(null) inode=16484 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=51 name=(null) inode=16488 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=52 name=(null) inode=16484 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=53 name=(null) inode=16489 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=55 name=(null) inode=16490 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=56 name=(null) inode=16490 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=57 name=(null) inode=16491 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=58 name=(null) inode=16490 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=59 name=(null) inode=16492 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=60 name=(null) inode=16490 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=61 name=(null) inode=16493 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=62 name=(null) inode=16493 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=63 name=(null) inode=16494 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=64 name=(null) inode=16493 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=65 name=(null) inode=16495 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=66 name=(null) inode=16493 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=67 name=(null) inode=16496 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=68 name=(null) inode=16493 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=69 name=(null) inode=16497 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=70 name=(null) inode=16493 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=71 name=(null) inode=16498 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=72 name=(null) inode=16490 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=73 name=(null) inode=16499 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=74 name=(null) inode=16499 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=75 name=(null) inode=16500 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=76 name=(null) inode=16499 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=77 name=(null) inode=16501 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=78 name=(null) inode=16499 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=79 name=(null) inode=16502 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=80 name=(null) inode=16499 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=81 name=(null) inode=16503 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=82 name=(null) inode=16499 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=83 name=(null) inode=16504 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=84 name=(null) inode=16490 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=85 name=(null) inode=16505 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=86 name=(null) inode=16505 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=87 name=(null) inode=16506 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=88 name=(null) inode=16505 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=89 name=(null) inode=16507 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=90 name=(null) inode=16505 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=91 name=(null) inode=16508 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=92 name=(null) inode=16505 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=93 name=(null) inode=16509 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=94 name=(null) inode=16505 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=95 name=(null) inode=16510 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=96 name=(null) inode=16490 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=97 name=(null) inode=16511 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=98 name=(null) inode=16511 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=99 name=(null) inode=16512 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=100 name=(null) inode=16511 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=101 name=(null) inode=16513 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=102 name=(null) inode=16511 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=103 name=(null) inode=16514 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=104 name=(null) inode=16511 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=105 name=(null) inode=16515 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=106 name=(null) inode=16511 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=107 name=(null) inode=16516 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PATH item=109 name=(null) inode=16519 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:47:53.776000 audit: PROCTITLE proctitle="(udev-worker)" Jul 10 00:47:53.791272 systemd-networkd[1025]: eth0: DHCPv4 address 10.0.0.143/16, gateway 10.0.0.1 acquired from 10.0.0.1 Jul 10 00:47:53.791424 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Jul 10 00:47:53.807416 kernel: mousedev: PS/2 mouse device common for all mice Jul 10 00:47:53.821492 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Jul 10 00:47:53.821729 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Jul 10 00:47:53.821860 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Jul 10 00:47:53.860881 kernel: kvm: Nested Virtualization enabled Jul 10 00:47:53.860950 kernel: SVM: kvm: Nested Paging enabled Jul 10 00:47:53.860965 kernel: SVM: Virtual VMLOAD VMSAVE supported Jul 10 00:47:53.860978 kernel: SVM: Virtual GIF supported Jul 10 00:47:53.879416 kernel: EDAC MC: Ver: 3.0.0 Jul 10 00:47:53.904777 systemd[1]: Finished systemd-udev-settle.service. Jul 10 00:47:53.905000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:53.906835 systemd[1]: Starting lvm2-activation-early.service... Jul 10 00:47:53.915130 lvm[1045]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 10 00:47:53.944047 systemd[1]: Finished lvm2-activation-early.service. Jul 10 00:47:53.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:53.945016 systemd[1]: Reached target cryptsetup.target. Jul 10 00:47:53.945725 kernel: kauditd_printk_skb: 228 callbacks suppressed Jul 10 00:47:53.945769 kernel: audit: type=1130 audit(1752108473.944:152): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:53.950372 systemd[1]: Starting lvm2-activation.service... Jul 10 00:47:53.954346 lvm[1046]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 10 00:47:53.979005 systemd[1]: Finished lvm2-activation.service. Jul 10 00:47:53.979000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:53.979891 systemd[1]: Reached target local-fs-pre.target. Jul 10 00:47:53.983588 kernel: audit: type=1130 audit(1752108473.979:153): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:53.983607 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Jul 10 00:47:53.983625 systemd[1]: Reached target local-fs.target. Jul 10 00:47:53.984394 systemd[1]: Reached target machines.target. Jul 10 00:47:53.986104 systemd[1]: Starting ldconfig.service... Jul 10 00:47:53.987017 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 10 00:47:53.987084 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 10 00:47:53.988024 systemd[1]: Starting systemd-boot-update.service... Jul 10 00:47:53.989867 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Jul 10 00:47:53.992183 systemd[1]: Starting systemd-machine-id-commit.service... Jul 10 00:47:53.994001 systemd[1]: Starting systemd-sysext.service... Jul 10 00:47:53.996503 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1048 (bootctl) Jul 10 00:47:53.997734 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Jul 10 00:47:53.999073 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Jul 10 00:47:54.000000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:54.004431 kernel: audit: type=1130 audit(1752108474.000:154): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:54.005057 systemd[1]: Unmounting usr-share-oem.mount... Jul 10 00:47:54.008388 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 10 00:47:54.008589 systemd[1]: Unmounted usr-share-oem.mount. Jul 10 00:47:54.017421 kernel: loop0: detected capacity change from 0 to 221472 Jul 10 00:47:54.034420 systemd-fsck[1056]: fsck.fat 4.2 (2021-01-31) Jul 10 00:47:54.034420 systemd-fsck[1056]: /dev/vda1: 790 files, 120731/258078 clusters Jul 10 00:47:54.035692 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Jul 10 00:47:54.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:54.038385 systemd[1]: Mounting boot.mount... Jul 10 00:47:54.041438 kernel: audit: type=1130 audit(1752108474.036:155): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:54.047114 systemd[1]: Mounted boot.mount. Jul 10 00:47:54.236350 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Jul 10 00:47:54.236943 systemd[1]: Finished systemd-machine-id-commit.service. Jul 10 00:47:54.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:54.240442 systemd[1]: Finished systemd-boot-update.service. Jul 10 00:47:54.245123 kernel: audit: type=1130 audit(1752108474.237:156): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:54.245193 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Jul 10 00:47:54.245222 kernel: audit: type=1130 audit(1752108474.244:157): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:54.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:54.264427 kernel: loop1: detected capacity change from 0 to 221472 Jul 10 00:47:54.267926 (sd-sysext)[1061]: Using extensions 'kubernetes'. Jul 10 00:47:54.268270 (sd-sysext)[1061]: Merged extensions into '/usr'. Jul 10 00:47:54.283779 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 10 00:47:54.285153 systemd[1]: Mounting usr-share-oem.mount... Jul 10 00:47:54.286044 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 10 00:47:54.287183 systemd[1]: Starting modprobe@dm_mod.service... Jul 10 00:47:54.288967 systemd[1]: Starting modprobe@efi_pstore.service... Jul 10 00:47:54.290937 systemd[1]: Starting modprobe@loop.service... Jul 10 00:47:54.291871 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 10 00:47:54.291979 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 10 00:47:54.292084 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 10 00:47:54.294428 systemd[1]: Mounted usr-share-oem.mount. Jul 10 00:47:54.295666 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 10 00:47:54.295790 systemd[1]: Finished modprobe@dm_mod.service. Jul 10 00:47:54.296000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:54.297110 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 10 00:47:54.297220 systemd[1]: Finished modprobe@efi_pstore.service. Jul 10 00:47:54.296000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:54.300428 kernel: audit: type=1130 audit(1752108474.296:158): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:54.300464 kernel: audit: type=1131 audit(1752108474.296:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:54.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:54.304458 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 10 00:47:54.304559 systemd[1]: Finished modprobe@loop.service. Jul 10 00:47:54.303000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:54.310799 kernel: audit: type=1130 audit(1752108474.303:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:54.310853 kernel: audit: type=1131 audit(1752108474.303:161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:54.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:54.311000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:54.312142 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 10 00:47:54.312240 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 10 00:47:54.313142 systemd[1]: Finished systemd-sysext.service. Jul 10 00:47:54.313000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:54.315213 systemd[1]: Starting ensure-sysext.service... Jul 10 00:47:54.317167 systemd[1]: Starting systemd-tmpfiles-setup.service... Jul 10 00:47:54.321470 systemd[1]: Reloading. Jul 10 00:47:54.330503 ldconfig[1047]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Jul 10 00:47:54.330188 systemd-tmpfiles[1068]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Jul 10 00:47:54.331291 systemd-tmpfiles[1068]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Jul 10 00:47:54.332817 systemd-tmpfiles[1068]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Jul 10 00:47:54.383439 /usr/lib/systemd/system-generators/torcx-generator[1090]: time="2025-07-10T00:47:54Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Jul 10 00:47:54.383470 /usr/lib/systemd/system-generators/torcx-generator[1090]: time="2025-07-10T00:47:54Z" level=info msg="torcx already run" Jul 10 00:47:54.433381 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 10 00:47:54.433408 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 10 00:47:54.450691 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 10 00:47:54.501000 audit: BPF prog-id=27 op=LOAD Jul 10 00:47:54.501000 audit: BPF prog-id=24 op=UNLOAD Jul 10 00:47:54.501000 audit: BPF prog-id=28 op=LOAD Jul 10 00:47:54.501000 audit: BPF prog-id=29 op=LOAD Jul 10 00:47:54.501000 audit: BPF prog-id=25 op=UNLOAD Jul 10 00:47:54.501000 audit: BPF prog-id=26 op=UNLOAD Jul 10 00:47:54.504000 audit: BPF prog-id=30 op=LOAD Jul 10 00:47:54.504000 audit: BPF prog-id=31 op=LOAD Jul 10 00:47:54.504000 audit: BPF prog-id=21 op=UNLOAD Jul 10 00:47:54.504000 audit: BPF prog-id=22 op=UNLOAD Jul 10 00:47:54.505000 audit: BPF prog-id=32 op=LOAD Jul 10 00:47:54.505000 audit: BPF prog-id=18 op=UNLOAD Jul 10 00:47:54.505000 audit: BPF prog-id=33 op=LOAD Jul 10 00:47:54.505000 audit: BPF prog-id=34 op=LOAD Jul 10 00:47:54.505000 audit: BPF prog-id=19 op=UNLOAD Jul 10 00:47:54.505000 audit: BPF prog-id=20 op=UNLOAD Jul 10 00:47:54.505000 audit: BPF prog-id=35 op=LOAD Jul 10 00:47:54.506000 audit: BPF prog-id=23 op=UNLOAD Jul 10 00:47:54.508323 systemd[1]: Finished ldconfig.service. Jul 10 00:47:54.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:54.510292 systemd[1]: Finished systemd-tmpfiles-setup.service. Jul 10 00:47:54.510000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:54.514113 systemd[1]: Starting audit-rules.service... Jul 10 00:47:54.516105 systemd[1]: Starting clean-ca-certificates.service... Jul 10 00:47:54.518089 systemd[1]: Starting systemd-journal-catalog-update.service... Jul 10 00:47:54.519000 audit: BPF prog-id=36 op=LOAD Jul 10 00:47:54.521000 audit: BPF prog-id=37 op=LOAD Jul 10 00:47:54.520559 systemd[1]: Starting systemd-resolved.service... Jul 10 00:47:54.522674 systemd[1]: Starting systemd-timesyncd.service... Jul 10 00:47:54.524520 systemd[1]: Starting systemd-update-utmp.service... Jul 10 00:47:54.525000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:54.525785 systemd[1]: Finished clean-ca-certificates.service. Jul 10 00:47:54.528576 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 10 00:47:54.529000 audit[1141]: SYSTEM_BOOT pid=1141 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jul 10 00:47:54.532571 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 10 00:47:54.533898 systemd[1]: Starting modprobe@dm_mod.service... Jul 10 00:47:54.535864 systemd[1]: Starting modprobe@efi_pstore.service... Jul 10 00:47:54.537784 systemd[1]: Starting modprobe@loop.service... Jul 10 00:47:54.538539 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 10 00:47:54.538676 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 10 00:47:54.538815 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 10 00:47:54.540355 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 10 00:47:54.540532 systemd[1]: Finished modprobe@dm_mod.service. Jul 10 00:47:54.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:54.541000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:54.541850 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 10 00:47:54.541944 systemd[1]: Finished modprobe@efi_pstore.service. Jul 10 00:47:54.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:54.542000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:54.543291 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 10 00:47:54.543389 systemd[1]: Finished modprobe@loop.service. Jul 10 00:47:54.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:54.543000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:54.544628 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 10 00:47:54.544756 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 10 00:47:54.546190 systemd[1]: Finished systemd-update-utmp.service. Jul 10 00:47:54.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:54.549063 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 10 00:47:54.550364 systemd[1]: Starting modprobe@dm_mod.service... Jul 10 00:47:54.552325 systemd[1]: Starting modprobe@efi_pstore.service... Jul 10 00:47:54.554219 systemd[1]: Starting modprobe@loop.service... Jul 10 00:47:54.555033 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 10 00:47:54.555139 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 10 00:47:54.555255 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 10 00:47:54.555966 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 10 00:47:54.556072 systemd[1]: Finished modprobe@dm_mod.service. Jul 10 00:47:54.556000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:54.556000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:54.557216 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 10 00:47:54.557325 systemd[1]: Finished modprobe@efi_pstore.service. Jul 10 00:47:54.557000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:54.557000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:54.558496 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 10 00:47:54.558798 systemd[1]: Finished systemd-journal-catalog-update.service. Jul 10 00:47:54.559000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:54.561174 systemd[1]: Starting systemd-update-done.service... Jul 10 00:47:54.562270 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 10 00:47:54.562391 systemd[1]: Finished modprobe@loop.service. Jul 10 00:47:54.563000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:54.563000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:54.566002 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 10 00:47:54.567813 systemd[1]: Starting modprobe@dm_mod.service... Jul 10 00:47:54.570692 systemd[1]: Starting modprobe@drm.service... Jul 10 00:47:54.572602 systemd[1]: Starting modprobe@efi_pstore.service... Jul 10 00:47:54.574695 systemd[1]: Starting modprobe@loop.service... Jul 10 00:47:54.577000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jul 10 00:47:54.577000 audit[1157]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffec874df0 a2=420 a3=0 items=0 ppid=1130 pid=1157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:47:54.577000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Jul 10 00:47:54.578343 augenrules[1157]: No rules Jul 10 00:47:54.576569 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 10 00:47:54.576720 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 10 00:47:54.578014 systemd[1]: Starting systemd-networkd-wait-online.service... Jul 10 00:47:54.579238 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 10 00:47:54.580201 systemd-resolved[1135]: Positive Trust Anchors: Jul 10 00:47:54.580207 systemd-resolved[1135]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 10 00:47:54.580233 systemd-resolved[1135]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 10 00:47:54.580511 systemd[1]: Finished systemd-update-done.service. Jul 10 00:47:54.582008 systemd[1]: Started systemd-timesyncd.service. Jul 10 00:47:54.583367 systemd-timesyncd[1138]: Contacted time server 10.0.0.1:123 (10.0.0.1). Jul 10 00:47:54.583756 systemd-timesyncd[1138]: Initial clock synchronization to Thu 2025-07-10 00:47:54.907467 UTC. Jul 10 00:47:54.583828 systemd[1]: Finished audit-rules.service. Jul 10 00:47:54.585304 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 10 00:47:54.585497 systemd[1]: Finished modprobe@dm_mod.service. Jul 10 00:47:54.587111 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 10 00:47:54.587280 systemd[1]: Finished modprobe@drm.service. Jul 10 00:47:54.588716 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 10 00:47:54.588815 systemd[1]: Finished modprobe@efi_pstore.service. Jul 10 00:47:54.590198 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 10 00:47:54.590363 systemd[1]: Finished modprobe@loop.service. Jul 10 00:47:54.592191 systemd[1]: Reached target time-set.target. Jul 10 00:47:54.593509 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 10 00:47:54.593548 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 10 00:47:54.593685 systemd-resolved[1135]: Defaulting to hostname 'linux'. Jul 10 00:47:54.594557 systemd[1]: Finished ensure-sysext.service. Jul 10 00:47:54.595545 systemd[1]: Started systemd-resolved.service. Jul 10 00:47:54.596506 systemd[1]: Reached target network.target. Jul 10 00:47:54.597325 systemd[1]: Reached target nss-lookup.target. Jul 10 00:47:54.598346 systemd[1]: Reached target sysinit.target. Jul 10 00:47:54.599322 systemd[1]: Started motdgen.path. Jul 10 00:47:54.600134 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Jul 10 00:47:54.601426 systemd[1]: Started logrotate.timer. Jul 10 00:47:54.602249 systemd[1]: Started mdadm.timer. Jul 10 00:47:54.603059 systemd[1]: Started systemd-tmpfiles-clean.timer. Jul 10 00:47:54.603956 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 10 00:47:54.603982 systemd[1]: Reached target paths.target. Jul 10 00:47:54.604877 systemd[1]: Reached target timers.target. Jul 10 00:47:54.605943 systemd[1]: Listening on dbus.socket. Jul 10 00:47:54.607772 systemd[1]: Starting docker.socket... Jul 10 00:47:54.610753 systemd[1]: Listening on sshd.socket. Jul 10 00:47:54.611732 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 10 00:47:54.612069 systemd[1]: Listening on docker.socket. Jul 10 00:47:54.612993 systemd[1]: Reached target sockets.target. Jul 10 00:47:54.613878 systemd[1]: Reached target basic.target. Jul 10 00:47:54.614798 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 10 00:47:54.614833 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 10 00:47:54.615779 systemd[1]: Starting containerd.service... Jul 10 00:47:54.617639 systemd[1]: Starting dbus.service... Jul 10 00:47:54.620135 systemd[1]: Starting enable-oem-cloudinit.service... Jul 10 00:47:54.622114 systemd[1]: Starting extend-filesystems.service... Jul 10 00:47:54.623206 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Jul 10 00:47:54.624253 systemd[1]: Starting motdgen.service... Jul 10 00:47:54.625210 jq[1173]: false Jul 10 00:47:54.625916 systemd[1]: Starting ssh-key-proc-cmdline.service... Jul 10 00:47:54.627859 systemd[1]: Starting sshd-keygen.service... Jul 10 00:47:54.631599 systemd[1]: Starting systemd-logind.service... Jul 10 00:47:54.632572 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 10 00:47:54.632638 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Jul 10 00:47:54.633029 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Jul 10 00:47:54.633667 systemd[1]: Starting update-engine.service... Jul 10 00:47:54.638352 systemd[1]: Starting update-ssh-keys-after-ignition.service... Jul 10 00:47:54.640901 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 10 00:47:54.641069 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Jul 10 00:47:54.641570 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 10 00:47:54.641699 systemd[1]: Finished ssh-key-proc-cmdline.service. Jul 10 00:47:54.642898 dbus-daemon[1172]: [system] SELinux support is enabled Jul 10 00:47:54.643016 systemd[1]: motdgen.service: Deactivated successfully. Jul 10 00:47:54.643146 systemd[1]: Finished motdgen.service. Jul 10 00:47:54.644074 systemd[1]: Started dbus.service. Jul 10 00:47:54.751311 extend-filesystems[1174]: Found loop1 Jul 10 00:47:54.751311 extend-filesystems[1174]: Found sr0 Jul 10 00:47:54.751311 extend-filesystems[1174]: Found vda Jul 10 00:47:54.751311 extend-filesystems[1174]: Found vda1 Jul 10 00:47:54.751311 extend-filesystems[1174]: Found vda2 Jul 10 00:47:54.751311 extend-filesystems[1174]: Found vda3 Jul 10 00:47:54.751311 extend-filesystems[1174]: Found usr Jul 10 00:47:54.751311 extend-filesystems[1174]: Found vda4 Jul 10 00:47:54.751311 extend-filesystems[1174]: Found vda6 Jul 10 00:47:54.751311 extend-filesystems[1174]: Found vda7 Jul 10 00:47:54.751311 extend-filesystems[1174]: Found vda9 Jul 10 00:47:54.751311 extend-filesystems[1174]: Checking size of /dev/vda9 Jul 10 00:47:54.767024 jq[1190]: true Jul 10 00:47:54.767212 extend-filesystems[1174]: Resized partition /dev/vda9 Jul 10 00:47:54.762313 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Jul 10 00:47:54.769921 extend-filesystems[1198]: resize2fs 1.46.5 (30-Dec-2021) Jul 10 00:47:54.762385 systemd[1]: Reached target system-config.target. Jul 10 00:47:54.766946 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Jul 10 00:47:54.766987 systemd[1]: Reached target user-config.target. Jul 10 00:47:54.774612 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Jul 10 00:47:54.776412 jq[1197]: true Jul 10 00:47:54.785965 update_engine[1184]: I0710 00:47:54.785550 1184 main.cc:92] Flatcar Update Engine starting Jul 10 00:47:54.788071 systemd[1]: Started update-engine.service. Jul 10 00:47:54.788313 update_engine[1184]: I0710 00:47:54.788141 1184 update_check_scheduler.cc:74] Next update check in 4m5s Jul 10 00:47:54.791559 systemd[1]: Started locksmithd.service. Jul 10 00:47:54.793583 systemd-logind[1182]: Watching system buttons on /dev/input/event1 (Power Button) Jul 10 00:47:54.793608 systemd-logind[1182]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Jul 10 00:47:54.794167 systemd-logind[1182]: New seat seat0. Jul 10 00:47:54.798212 systemd[1]: Started systemd-logind.service. Jul 10 00:47:54.806423 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Jul 10 00:47:54.832661 extend-filesystems[1198]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Jul 10 00:47:54.832661 extend-filesystems[1198]: old_desc_blocks = 1, new_desc_blocks = 1 Jul 10 00:47:54.832661 extend-filesystems[1198]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Jul 10 00:47:54.837582 extend-filesystems[1174]: Resized filesystem in /dev/vda9 Jul 10 00:47:54.838685 env[1199]: time="2025-07-10T00:47:54.836565026Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Jul 10 00:47:54.833506 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 10 00:47:54.976667 bash[1219]: Updated "/home/core/.ssh/authorized_keys" Jul 10 00:47:54.833676 systemd[1]: Finished extend-filesystems.service. Jul 10 00:47:54.841955 systemd[1]: Finished update-ssh-keys-after-ignition.service. Jul 10 00:47:54.997863 env[1199]: time="2025-07-10T00:47:54.997807663Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Jul 10 00:47:54.998005 env[1199]: time="2025-07-10T00:47:54.997983934Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Jul 10 00:47:54.999453 locksmithd[1215]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Jul 10 00:47:54.999661 env[1199]: time="2025-07-10T00:47:54.999599123Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.186-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Jul 10 00:47:54.999661 env[1199]: time="2025-07-10T00:47:54.999644999Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Jul 10 00:47:54.999947 env[1199]: time="2025-07-10T00:47:54.999912240Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 10 00:47:54.999947 env[1199]: time="2025-07-10T00:47:54.999935153Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Jul 10 00:47:55.000011 env[1199]: time="2025-07-10T00:47:54.999952185Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Jul 10 00:47:55.000011 env[1199]: time="2025-07-10T00:47:54.999964558Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Jul 10 00:47:55.000054 env[1199]: time="2025-07-10T00:47:55.000035040Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Jul 10 00:47:55.000323 env[1199]: time="2025-07-10T00:47:55.000295819Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Jul 10 00:47:55.000455 env[1199]: time="2025-07-10T00:47:55.000435331Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 10 00:47:55.000455 env[1199]: time="2025-07-10T00:47:55.000453846Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Jul 10 00:47:55.000516 env[1199]: time="2025-07-10T00:47:55.000500652Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Jul 10 00:47:55.000553 env[1199]: time="2025-07-10T00:47:55.000520429Z" level=info msg="metadata content store policy set" policy=shared Jul 10 00:47:55.006150 env[1199]: time="2025-07-10T00:47:55.006117899Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Jul 10 00:47:55.006150 env[1199]: time="2025-07-10T00:47:55.006150967Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Jul 10 00:47:55.006220 env[1199]: time="2025-07-10T00:47:55.006168521Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Jul 10 00:47:55.006242 env[1199]: time="2025-07-10T00:47:55.006228391Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Jul 10 00:47:55.006264 env[1199]: time="2025-07-10T00:47:55.006245623Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Jul 10 00:47:55.006297 env[1199]: time="2025-07-10T00:47:55.006262042Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Jul 10 00:47:55.006297 env[1199]: time="2025-07-10T00:47:55.006274208Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Jul 10 00:47:55.006297 env[1199]: time="2025-07-10T00:47:55.006290346Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Jul 10 00:47:55.006370 env[1199]: time="2025-07-10T00:47:55.006302293Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Jul 10 00:47:55.006370 env[1199]: time="2025-07-10T00:47:55.006317940Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Jul 10 00:47:55.006370 env[1199]: time="2025-07-10T00:47:55.006334505Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Jul 10 00:47:55.006370 env[1199]: time="2025-07-10T00:47:55.006349173Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Jul 10 00:47:55.006492 env[1199]: time="2025-07-10T00:47:55.006464836Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Jul 10 00:47:55.006585 env[1199]: time="2025-07-10T00:47:55.006566779Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Jul 10 00:47:55.006860 env[1199]: time="2025-07-10T00:47:55.006834529Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Jul 10 00:47:55.006898 env[1199]: time="2025-07-10T00:47:55.006876321Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Jul 10 00:47:55.006898 env[1199]: time="2025-07-10T00:47:55.006892074Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Jul 10 00:47:55.006979 env[1199]: time="2025-07-10T00:47:55.006966193Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Jul 10 00:47:55.007004 env[1199]: time="2025-07-10T00:47:55.006982362Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Jul 10 00:47:55.007004 env[1199]: time="2025-07-10T00:47:55.007000084Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Jul 10 00:47:55.007047 env[1199]: time="2025-07-10T00:47:55.007013710Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Jul 10 00:47:55.007047 env[1199]: time="2025-07-10T00:47:55.007027033Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Jul 10 00:47:55.007047 env[1199]: time="2025-07-10T00:47:55.007040032Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Jul 10 00:47:55.007114 env[1199]: time="2025-07-10T00:47:55.007052970Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Jul 10 00:47:55.007114 env[1199]: time="2025-07-10T00:47:55.007064186Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Jul 10 00:47:55.007114 env[1199]: time="2025-07-10T00:47:55.007076498Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Jul 10 00:47:55.007187 env[1199]: time="2025-07-10T00:47:55.007179275Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Jul 10 00:47:55.007212 env[1199]: time="2025-07-10T00:47:55.007194016Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Jul 10 00:47:55.007212 env[1199]: time="2025-07-10T00:47:55.007206067Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Jul 10 00:47:55.007256 env[1199]: time="2025-07-10T00:47:55.007217690Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Jul 10 00:47:55.007256 env[1199]: time="2025-07-10T00:47:55.007232973Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Jul 10 00:47:55.007256 env[1199]: time="2025-07-10T00:47:55.007243586Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Jul 10 00:47:55.007325 env[1199]: time="2025-07-10T00:47:55.007267531Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Jul 10 00:47:55.007325 env[1199]: time="2025-07-10T00:47:55.007313025Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Jul 10 00:47:55.009466 systemd[1]: Started containerd.service. Jul 10 00:47:55.010869 env[1199]: time="2025-07-10T00:47:55.007579680Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Jul 10 00:47:55.010869 env[1199]: time="2025-07-10T00:47:55.007681405Z" level=info msg="Connect containerd service" Jul 10 00:47:55.010869 env[1199]: time="2025-07-10T00:47:55.007730766Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Jul 10 00:47:55.010869 env[1199]: time="2025-07-10T00:47:55.008300750Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 10 00:47:55.010869 env[1199]: time="2025-07-10T00:47:55.008451503Z" level=info msg="Start subscribing containerd event" Jul 10 00:47:55.010869 env[1199]: time="2025-07-10T00:47:55.008522746Z" level=info msg="Start recovering state" Jul 10 00:47:55.010869 env[1199]: time="2025-07-10T00:47:55.008622198Z" level=info msg="Start event monitor" Jul 10 00:47:55.010869 env[1199]: time="2025-07-10T00:47:55.008663855Z" level=info msg="Start snapshots syncer" Jul 10 00:47:55.010869 env[1199]: time="2025-07-10T00:47:55.008681306Z" level=info msg="Start cni network conf syncer for default" Jul 10 00:47:55.010869 env[1199]: time="2025-07-10T00:47:55.008690303Z" level=info msg="Start streaming server" Jul 10 00:47:55.010869 env[1199]: time="2025-07-10T00:47:55.008694817Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Jul 10 00:47:55.010869 env[1199]: time="2025-07-10T00:47:55.008871652Z" level=info msg=serving... address=/run/containerd/containerd.sock Jul 10 00:47:55.010869 env[1199]: time="2025-07-10T00:47:55.008942885Z" level=info msg="containerd successfully booted in 0.173915s" Jul 10 00:47:55.010552 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 10 00:47:55.010612 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 10 00:47:55.076585 systemd-networkd[1025]: eth0: Gained IPv6LL Jul 10 00:47:55.078552 systemd[1]: Finished systemd-networkd-wait-online.service. Jul 10 00:47:55.079884 systemd[1]: Reached target network-online.target. Jul 10 00:47:55.083977 systemd[1]: Starting kubelet.service... Jul 10 00:47:55.543419 sshd_keygen[1191]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Jul 10 00:47:55.563782 systemd[1]: Finished sshd-keygen.service. Jul 10 00:47:55.566460 systemd[1]: Starting issuegen.service... Jul 10 00:47:55.592112 systemd[1]: issuegen.service: Deactivated successfully. Jul 10 00:47:55.592338 systemd[1]: Finished issuegen.service. Jul 10 00:47:55.594972 systemd[1]: Starting systemd-user-sessions.service... Jul 10 00:47:55.600544 systemd[1]: Finished systemd-user-sessions.service. Jul 10 00:47:55.603136 systemd[1]: Started getty@tty1.service. Jul 10 00:47:55.605453 systemd[1]: Started serial-getty@ttyS0.service. Jul 10 00:47:55.606764 systemd[1]: Reached target getty.target. Jul 10 00:47:56.476063 systemd[1]: Created slice system-sshd.slice. Jul 10 00:47:56.478741 systemd[1]: Started sshd@0-10.0.0.143:22-10.0.0.1:42116.service. Jul 10 00:47:56.500960 systemd[1]: Started kubelet.service. Jul 10 00:47:56.502875 systemd[1]: Reached target multi-user.target. Jul 10 00:47:56.507049 systemd[1]: Starting systemd-update-utmp-runlevel.service... Jul 10 00:47:56.515931 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 10 00:47:56.516089 systemd[1]: Finished systemd-update-utmp-runlevel.service. Jul 10 00:47:56.517449 systemd[1]: Startup finished in 696ms (kernel) + 5.394s (initrd) + 7.324s (userspace) = 13.415s. Jul 10 00:47:56.525095 sshd[1248]: Accepted publickey for core from 10.0.0.1 port 42116 ssh2: RSA SHA256:suUhWV759MqU0C+Dl6JG8TPW8PqnqlsB4qushdi9Ejw Jul 10 00:47:56.527651 sshd[1248]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:47:56.538585 systemd-logind[1182]: New session 1 of user core. Jul 10 00:47:56.539859 systemd[1]: Created slice user-500.slice. Jul 10 00:47:56.541382 systemd[1]: Starting user-runtime-dir@500.service... Jul 10 00:47:56.554837 systemd[1]: Finished user-runtime-dir@500.service. Jul 10 00:47:56.556411 systemd[1]: Starting user@500.service... Jul 10 00:47:56.560403 (systemd)[1255]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:47:56.773362 systemd[1255]: Queued start job for default target default.target. Jul 10 00:47:56.773835 systemd[1255]: Reached target paths.target. Jul 10 00:47:56.773855 systemd[1255]: Reached target sockets.target. Jul 10 00:47:56.773868 systemd[1255]: Reached target timers.target. Jul 10 00:47:56.773879 systemd[1255]: Reached target basic.target. Jul 10 00:47:56.774002 systemd[1]: Started user@500.service. Jul 10 00:47:56.774616 systemd[1255]: Reached target default.target. Jul 10 00:47:56.774689 systemd[1255]: Startup finished in 207ms. Jul 10 00:47:56.775040 systemd[1]: Started session-1.scope. Jul 10 00:47:56.828960 systemd[1]: Started sshd@1-10.0.0.143:22-10.0.0.1:42132.service. Jul 10 00:47:56.865102 sshd[1269]: Accepted publickey for core from 10.0.0.1 port 42132 ssh2: RSA SHA256:suUhWV759MqU0C+Dl6JG8TPW8PqnqlsB4qushdi9Ejw Jul 10 00:47:56.866441 sshd[1269]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:47:56.870685 systemd-logind[1182]: New session 2 of user core. Jul 10 00:47:56.871540 systemd[1]: Started session-2.scope. Jul 10 00:47:56.928831 sshd[1269]: pam_unix(sshd:session): session closed for user core Jul 10 00:47:56.931802 systemd[1]: sshd@1-10.0.0.143:22-10.0.0.1:42132.service: Deactivated successfully. Jul 10 00:47:56.932336 systemd[1]: session-2.scope: Deactivated successfully. Jul 10 00:47:56.932848 systemd-logind[1182]: Session 2 logged out. Waiting for processes to exit. Jul 10 00:47:56.934113 systemd[1]: Started sshd@2-10.0.0.143:22-10.0.0.1:42146.service. Jul 10 00:47:56.935028 systemd-logind[1182]: Removed session 2. Jul 10 00:47:57.002592 sshd[1275]: Accepted publickey for core from 10.0.0.1 port 42146 ssh2: RSA SHA256:suUhWV759MqU0C+Dl6JG8TPW8PqnqlsB4qushdi9Ejw Jul 10 00:47:57.004308 sshd[1275]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:47:57.008514 systemd-logind[1182]: New session 3 of user core. Jul 10 00:47:57.008957 systemd[1]: Started session-3.scope. Jul 10 00:47:57.061390 sshd[1275]: pam_unix(sshd:session): session closed for user core Jul 10 00:47:57.064757 systemd[1]: sshd@2-10.0.0.143:22-10.0.0.1:42146.service: Deactivated successfully. Jul 10 00:47:57.065281 systemd[1]: session-3.scope: Deactivated successfully. Jul 10 00:47:57.065874 systemd-logind[1182]: Session 3 logged out. Waiting for processes to exit. Jul 10 00:47:57.067041 systemd[1]: Started sshd@3-10.0.0.143:22-10.0.0.1:42152.service. Jul 10 00:47:57.067966 systemd-logind[1182]: Removed session 3. Jul 10 00:47:57.103583 sshd[1283]: Accepted publickey for core from 10.0.0.1 port 42152 ssh2: RSA SHA256:suUhWV759MqU0C+Dl6JG8TPW8PqnqlsB4qushdi9Ejw Jul 10 00:47:57.105216 sshd[1283]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:47:57.108785 systemd-logind[1182]: New session 4 of user core. Jul 10 00:47:57.109571 systemd[1]: Started session-4.scope. Jul 10 00:47:57.167595 sshd[1283]: pam_unix(sshd:session): session closed for user core Jul 10 00:47:57.170801 systemd[1]: sshd@3-10.0.0.143:22-10.0.0.1:42152.service: Deactivated successfully. Jul 10 00:47:57.171325 systemd[1]: session-4.scope: Deactivated successfully. Jul 10 00:47:57.171841 systemd-logind[1182]: Session 4 logged out. Waiting for processes to exit. Jul 10 00:47:57.172956 systemd[1]: Started sshd@4-10.0.0.143:22-10.0.0.1:42154.service. Jul 10 00:47:57.174151 systemd-logind[1182]: Removed session 4. Jul 10 00:47:57.200359 kubelet[1252]: E0710 00:47:57.200281 1252 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 10 00:47:57.201985 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 10 00:47:57.202096 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 10 00:47:57.202292 systemd[1]: kubelet.service: Consumed 1.928s CPU time. Jul 10 00:47:57.208109 sshd[1289]: Accepted publickey for core from 10.0.0.1 port 42154 ssh2: RSA SHA256:suUhWV759MqU0C+Dl6JG8TPW8PqnqlsB4qushdi9Ejw Jul 10 00:47:57.209421 sshd[1289]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:47:57.212710 systemd-logind[1182]: New session 5 of user core. Jul 10 00:47:57.213466 systemd[1]: Started session-5.scope. Jul 10 00:47:57.270855 sudo[1292]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Jul 10 00:47:57.271058 sudo[1292]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 10 00:47:57.277645 dbus-daemon[1172]: \xd0\xcd\u000f \u0008V: received setenforce notice (enforcing=1924486912) Jul 10 00:47:57.279612 sudo[1292]: pam_unix(sudo:session): session closed for user root Jul 10 00:47:57.281311 sshd[1289]: pam_unix(sshd:session): session closed for user core Jul 10 00:47:57.284462 systemd[1]: sshd@4-10.0.0.143:22-10.0.0.1:42154.service: Deactivated successfully. Jul 10 00:47:57.285013 systemd[1]: session-5.scope: Deactivated successfully. Jul 10 00:47:57.285577 systemd-logind[1182]: Session 5 logged out. Waiting for processes to exit. Jul 10 00:47:57.286699 systemd[1]: Started sshd@5-10.0.0.143:22-10.0.0.1:42170.service. Jul 10 00:47:57.287389 systemd-logind[1182]: Removed session 5. Jul 10 00:47:57.322156 sshd[1296]: Accepted publickey for core from 10.0.0.1 port 42170 ssh2: RSA SHA256:suUhWV759MqU0C+Dl6JG8TPW8PqnqlsB4qushdi9Ejw Jul 10 00:47:57.323458 sshd[1296]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:47:57.326810 systemd-logind[1182]: New session 6 of user core. Jul 10 00:47:57.327667 systemd[1]: Started session-6.scope. Jul 10 00:47:57.381580 sudo[1301]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Jul 10 00:47:57.381787 sudo[1301]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 10 00:47:57.384633 sudo[1301]: pam_unix(sudo:session): session closed for user root Jul 10 00:47:57.389932 sudo[1300]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Jul 10 00:47:57.390180 sudo[1300]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 10 00:47:57.398861 systemd[1]: Stopping audit-rules.service... Jul 10 00:47:57.399000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 10 00:47:57.399000 audit[1304]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc462b3af0 a2=420 a3=0 items=0 ppid=1 pid=1304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:47:57.399000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Jul 10 00:47:57.400464 auditctl[1304]: No rules Jul 10 00:47:57.400605 systemd[1]: audit-rules.service: Deactivated successfully. Jul 10 00:47:57.400735 systemd[1]: Stopped audit-rules.service. Jul 10 00:47:57.400000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:57.402103 systemd[1]: Starting audit-rules.service... Jul 10 00:47:57.418457 augenrules[1321]: No rules Jul 10 00:47:57.418995 systemd[1]: Finished audit-rules.service. Jul 10 00:47:57.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:57.419771 sudo[1300]: pam_unix(sudo:session): session closed for user root Jul 10 00:47:57.418000 audit[1300]: USER_END pid=1300 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:47:57.418000 audit[1300]: CRED_DISP pid=1300 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:47:57.421066 sshd[1296]: pam_unix(sshd:session): session closed for user core Jul 10 00:47:57.420000 audit[1296]: USER_END pid=1296 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:47:57.420000 audit[1296]: CRED_DISP pid=1296 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:47:57.424376 systemd[1]: Started sshd@6-10.0.0.143:22-10.0.0.1:42182.service. Jul 10 00:47:57.423000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.143:22-10.0.0.1:42182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:57.424937 systemd[1]: sshd@5-10.0.0.143:22-10.0.0.1:42170.service: Deactivated successfully. Jul 10 00:47:57.423000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.143:22-10.0.0.1:42170 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:57.425511 systemd[1]: session-6.scope: Deactivated successfully. Jul 10 00:47:57.426040 systemd-logind[1182]: Session 6 logged out. Waiting for processes to exit. Jul 10 00:47:57.426995 systemd-logind[1182]: Removed session 6. Jul 10 00:47:57.457000 audit[1326]: USER_ACCT pid=1326 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:47:57.459385 sshd[1326]: Accepted publickey for core from 10.0.0.1 port 42182 ssh2: RSA SHA256:suUhWV759MqU0C+Dl6JG8TPW8PqnqlsB4qushdi9Ejw Jul 10 00:47:57.460000 audit[1326]: CRED_ACQ pid=1326 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:47:57.460000 audit[1326]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8b22e010 a2=3 a3=0 items=0 ppid=1 pid=1326 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:47:57.460000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 10 00:47:57.460766 sshd[1326]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 10 00:47:57.464294 systemd-logind[1182]: New session 7 of user core. Jul 10 00:47:57.465126 systemd[1]: Started session-7.scope. Jul 10 00:47:57.468000 audit[1326]: USER_START pid=1326 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:47:57.469000 audit[1329]: CRED_ACQ pid=1329 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:47:57.516000 audit[1330]: USER_ACCT pid=1330 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:47:57.518378 sudo[1330]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Jul 10 00:47:57.517000 audit[1330]: CRED_REFR pid=1330 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:47:57.518608 sudo[1330]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 10 00:47:57.518000 audit[1330]: USER_START pid=1330 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:47:57.534023 systemd[1]: Starting coreos-metadata.service... Jul 10 00:47:57.542552 systemd[1]: coreos-metadata.service: Deactivated successfully. Jul 10 00:47:57.542743 systemd[1]: Finished coreos-metadata.service. Jul 10 00:47:57.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:57.541000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:58.404377 systemd[1]: Stopped kubelet.service. Jul 10 00:47:58.404556 systemd[1]: kubelet.service: Consumed 1.928s CPU time. Jul 10 00:47:58.403000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:58.403000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:58.406620 systemd[1]: Starting kubelet.service... Jul 10 00:47:58.430708 systemd[1]: Reloading. Jul 10 00:47:58.498353 /usr/lib/systemd/system-generators/torcx-generator[1388]: time="2025-07-10T00:47:58Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Jul 10 00:47:58.498384 /usr/lib/systemd/system-generators/torcx-generator[1388]: time="2025-07-10T00:47:58Z" level=info msg="torcx already run" Jul 10 00:47:58.726194 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 10 00:47:58.726212 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 10 00:47:58.743983 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 10 00:47:58.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.802000 audit: BPF prog-id=43 op=LOAD Jul 10 00:47:58.802000 audit: BPF prog-id=37 op=UNLOAD Jul 10 00:47:58.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.803000 audit: BPF prog-id=44 op=LOAD Jul 10 00:47:58.803000 audit: BPF prog-id=27 op=UNLOAD Jul 10 00:47:58.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.803000 audit: BPF prog-id=45 op=LOAD Jul 10 00:47:58.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.803000 audit: BPF prog-id=46 op=LOAD Jul 10 00:47:58.803000 audit: BPF prog-id=28 op=UNLOAD Jul 10 00:47:58.803000 audit: BPF prog-id=29 op=UNLOAD Jul 10 00:47:58.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.804000 audit: BPF prog-id=47 op=LOAD Jul 10 00:47:58.804000 audit: BPF prog-id=41 op=UNLOAD Jul 10 00:47:58.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.808000 audit: BPF prog-id=48 op=LOAD Jul 10 00:47:58.808000 audit: BPF prog-id=36 op=UNLOAD Jul 10 00:47:58.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.809000 audit: BPF prog-id=49 op=LOAD Jul 10 00:47:58.809000 audit: BPF prog-id=38 op=UNLOAD Jul 10 00:47:58.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.809000 audit: BPF prog-id=50 op=LOAD Jul 10 00:47:58.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.809000 audit: BPF prog-id=51 op=LOAD Jul 10 00:47:58.809000 audit: BPF prog-id=39 op=UNLOAD Jul 10 00:47:58.809000 audit: BPF prog-id=40 op=UNLOAD Jul 10 00:47:58.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.809000 audit: BPF prog-id=52 op=LOAD Jul 10 00:47:58.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.810000 audit: BPF prog-id=53 op=LOAD Jul 10 00:47:58.810000 audit: BPF prog-id=30 op=UNLOAD Jul 10 00:47:58.810000 audit: BPF prog-id=31 op=UNLOAD Jul 10 00:47:58.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.810000 audit: BPF prog-id=54 op=LOAD Jul 10 00:47:58.810000 audit: BPF prog-id=32 op=UNLOAD Jul 10 00:47:58.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.811000 audit: BPF prog-id=55 op=LOAD Jul 10 00:47:58.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.811000 audit: BPF prog-id=56 op=LOAD Jul 10 00:47:58.811000 audit: BPF prog-id=33 op=UNLOAD Jul 10 00:47:58.811000 audit: BPF prog-id=34 op=UNLOAD Jul 10 00:47:58.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:58.812000 audit: BPF prog-id=57 op=LOAD Jul 10 00:47:58.812000 audit: BPF prog-id=35 op=UNLOAD Jul 10 00:47:58.824045 systemd[1]: Started kubelet.service. Jul 10 00:47:58.823000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:58.825408 systemd[1]: Stopping kubelet.service... Jul 10 00:47:58.825668 systemd[1]: kubelet.service: Deactivated successfully. Jul 10 00:47:58.825855 systemd[1]: Stopped kubelet.service. Jul 10 00:47:58.825000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:58.827532 systemd[1]: Starting kubelet.service... Jul 10 00:47:58.923859 systemd[1]: Started kubelet.service. Jul 10 00:47:58.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:47:58.970371 kubelet[1436]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 10 00:47:58.970371 kubelet[1436]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Jul 10 00:47:58.970371 kubelet[1436]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 10 00:47:58.970795 kubelet[1436]: I0710 00:47:58.970459 1436 server.go:211] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 10 00:47:59.489188 kubelet[1436]: I0710 00:47:59.489131 1436 server.go:491] "Kubelet version" kubeletVersion="v1.31.8" Jul 10 00:47:59.489188 kubelet[1436]: I0710 00:47:59.489168 1436 server.go:493] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 10 00:47:59.489460 kubelet[1436]: I0710 00:47:59.489441 1436 server.go:934] "Client rotation is on, will bootstrap in background" Jul 10 00:47:59.521946 kubelet[1436]: I0710 00:47:59.521902 1436 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 10 00:47:59.535066 kubelet[1436]: E0710 00:47:59.535032 1436 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Jul 10 00:47:59.535066 kubelet[1436]: I0710 00:47:59.535060 1436 server.go:1408] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Jul 10 00:47:59.539928 kubelet[1436]: I0710 00:47:59.539893 1436 server.go:749] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 10 00:47:59.540617 kubelet[1436]: I0710 00:47:59.540589 1436 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Jul 10 00:47:59.540796 kubelet[1436]: I0710 00:47:59.540754 1436 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 10 00:47:59.541002 kubelet[1436]: I0710 00:47:59.540789 1436 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.0.0.143","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Jul 10 00:47:59.541113 kubelet[1436]: I0710 00:47:59.541011 1436 topology_manager.go:138] "Creating topology manager with none policy" Jul 10 00:47:59.541113 kubelet[1436]: I0710 00:47:59.541019 1436 container_manager_linux.go:300] "Creating device plugin manager" Jul 10 00:47:59.541165 kubelet[1436]: I0710 00:47:59.541156 1436 state_mem.go:36] "Initialized new in-memory state store" Jul 10 00:47:59.543504 kubelet[1436]: I0710 00:47:59.543479 1436 kubelet.go:408] "Attempting to sync node with API server" Jul 10 00:47:59.543563 kubelet[1436]: I0710 00:47:59.543520 1436 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 10 00:47:59.543563 kubelet[1436]: I0710 00:47:59.543558 1436 kubelet.go:314] "Adding apiserver pod source" Jul 10 00:47:59.543614 kubelet[1436]: I0710 00:47:59.543581 1436 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 10 00:47:59.543711 kubelet[1436]: E0710 00:47:59.543678 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:47:59.543711 kubelet[1436]: E0710 00:47:59.543675 1436 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:47:59.546659 kubelet[1436]: I0710 00:47:59.546631 1436 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 10 00:47:59.547080 kubelet[1436]: I0710 00:47:59.547054 1436 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Jul 10 00:47:59.547659 kubelet[1436]: W0710 00:47:59.547627 1436 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Jul 10 00:47:59.558462 kubelet[1436]: I0710 00:47:59.558429 1436 server.go:1274] "Started kubelet" Jul 10 00:47:59.558573 kubelet[1436]: I0710 00:47:59.558532 1436 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Jul 10 00:47:59.570202 kernel: kauditd_printk_skb: 244 callbacks suppressed Jul 10 00:47:59.570292 kernel: audit: type=1400 audit(1752108479.558:400): avc: denied { mac_admin } for pid=1436 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:59.570316 kernel: audit: type=1401 audit(1752108479.558:400): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 10 00:47:59.570333 kernel: audit: type=1300 audit(1752108479.558:400): arch=c000003e syscall=188 success=no exit=-22 a0=c0008dc540 a1=c0008f4030 a2=c0008dc510 a3=25 items=0 ppid=1 pid=1436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:47:59.558000 audit[1436]: AVC avc: denied { mac_admin } for pid=1436 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:59.558000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 10 00:47:59.558000 audit[1436]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008dc540 a1=c0008f4030 a2=c0008dc510 a3=25 items=0 ppid=1 pid=1436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:47:59.570552 kubelet[1436]: I0710 00:47:59.559466 1436 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Jul 10 00:47:59.570552 kubelet[1436]: I0710 00:47:59.559622 1436 server.go:449] "Adding debug handlers to kubelet server" Jul 10 00:47:59.570552 kubelet[1436]: I0710 00:47:59.559687 1436 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Jul 10 00:47:59.570552 kubelet[1436]: I0710 00:47:59.559720 1436 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Jul 10 00:47:59.570552 kubelet[1436]: I0710 00:47:59.559749 1436 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 10 00:47:59.570552 kubelet[1436]: I0710 00:47:59.559785 1436 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 10 00:47:59.570552 kubelet[1436]: I0710 00:47:59.562560 1436 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Jul 10 00:47:59.570552 kubelet[1436]: E0710 00:47:59.564745 1436 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.143\" not found" Jul 10 00:47:59.570552 kubelet[1436]: I0710 00:47:59.564786 1436 volume_manager.go:289] "Starting Kubelet Volume Manager" Jul 10 00:47:59.570552 kubelet[1436]: I0710 00:47:59.565006 1436 desired_state_of_world_populator.go:147] "Desired state populator starts to run" Jul 10 00:47:59.570552 kubelet[1436]: I0710 00:47:59.565120 1436 reconciler.go:26] "Reconciler: start to sync state" Jul 10 00:47:59.570552 kubelet[1436]: E0710 00:47:59.565411 1436 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Jul 10 00:47:59.570552 kubelet[1436]: I0710 00:47:59.565576 1436 factory.go:221] Registration of the systemd container factory successfully Jul 10 00:47:59.570847 kubelet[1436]: I0710 00:47:59.565678 1436 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Jul 10 00:47:59.570847 kubelet[1436]: E0710 00:47:59.568150 1436 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.0.0.143\" not found" node="10.0.0.143" Jul 10 00:47:59.558000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 10 00:47:59.574845 kubelet[1436]: I0710 00:47:59.572169 1436 factory.go:221] Registration of the containerd container factory successfully Jul 10 00:47:59.577807 kernel: audit: type=1327 audit(1752108479.558:400): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 10 00:47:59.577844 kernel: audit: type=1400 audit(1752108479.558:401): avc: denied { mac_admin } for pid=1436 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:59.558000 audit[1436]: AVC avc: denied { mac_admin } for pid=1436 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:47:59.579562 kernel: audit: type=1401 audit(1752108479.558:401): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 10 00:47:59.558000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 10 00:47:59.584026 kernel: audit: type=1300 audit(1752108479.558:401): arch=c000003e syscall=188 success=no exit=-22 a0=c0006033a0 a1=c0008f4048 a2=c0008dc5d0 a3=25 items=0 ppid=1 pid=1436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:47:59.558000 audit[1436]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0006033a0 a1=c0008f4048 a2=c0008dc5d0 a3=25 items=0 ppid=1 pid=1436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:47:59.588367 kernel: audit: type=1327 audit(1752108479.558:401): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 10 00:47:59.558000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 10 00:47:59.588450 kubelet[1436]: I0710 00:47:59.585720 1436 cpu_manager.go:214] "Starting CPU manager" policy="none" Jul 10 00:47:59.588450 kubelet[1436]: I0710 00:47:59.585737 1436 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Jul 10 00:47:59.588450 kubelet[1436]: I0710 00:47:59.585755 1436 state_mem.go:36] "Initialized new in-memory state store" Jul 10 00:47:59.665382 kubelet[1436]: E0710 00:47:59.665322 1436 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.143\" not found" Jul 10 00:47:59.765787 kubelet[1436]: E0710 00:47:59.765676 1436 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.143\" not found" Jul 10 00:47:59.866607 kubelet[1436]: E0710 00:47:59.866543 1436 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.143\" not found" Jul 10 00:47:59.967500 kubelet[1436]: E0710 00:47:59.967447 1436 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.0.0.143\" not found" Jul 10 00:47:59.990675 kubelet[1436]: E0710 00:47:59.990627 1436 csi_plugin.go:305] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.0.0.143" not found Jul 10 00:48:00.021791 kubelet[1436]: I0710 00:48:00.021666 1436 policy_none.go:49] "None policy: Start" Jul 10 00:48:00.022618 kubelet[1436]: I0710 00:48:00.022573 1436 memory_manager.go:170] "Starting memorymanager" policy="None" Jul 10 00:48:00.022618 kubelet[1436]: I0710 00:48:00.022594 1436 state_mem.go:35] "Initializing new in-memory state store" Jul 10 00:48:00.030264 systemd[1]: Created slice kubepods.slice. Jul 10 00:48:00.034274 systemd[1]: Created slice kubepods-burstable.slice. Jul 10 00:48:00.036995 systemd[1]: Created slice kubepods-besteffort.slice. Jul 10 00:48:00.037000 audit[1454]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1454 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:48:00.037000 audit[1454]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc9259ef70 a2=0 a3=7ffc9259ef5c items=0 ppid=1436 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:00.045097 kernel: audit: type=1325 audit(1752108480.037:402): table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1454 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:48:00.045158 kernel: audit: type=1300 audit(1752108480.037:402): arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc9259ef70 a2=0 a3=7ffc9259ef5c items=0 ppid=1436 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:00.037000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 10 00:48:00.037000 audit[1456]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1456 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:48:00.037000 audit[1456]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffeee9805f0 a2=0 a3=7ffeee9805dc items=0 ppid=1436 pid=1456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:00.037000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 10 00:48:00.048123 kubelet[1436]: I0710 00:48:00.048083 1436 manager.go:513] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Jul 10 00:48:00.046000 audit[1436]: AVC avc: denied { mac_admin } for pid=1436 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:00.046000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 10 00:48:00.046000 audit[1436]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0006735c0 a1=c0008f50c8 a2=c000673590 a3=25 items=0 ppid=1 pid=1436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:00.046000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 10 00:48:00.048557 kubelet[1436]: I0710 00:48:00.048156 1436 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Jul 10 00:48:00.048557 kubelet[1436]: I0710 00:48:00.048305 1436 eviction_manager.go:189] "Eviction manager: starting control loop" Jul 10 00:48:00.048557 kubelet[1436]: I0710 00:48:00.048322 1436 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Jul 10 00:48:00.048688 kubelet[1436]: I0710 00:48:00.048635 1436 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 10 00:48:00.049763 kubelet[1436]: E0710 00:48:00.049739 1436 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.143\" not found" Jul 10 00:48:00.039000 audit[1458]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1458 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:48:00.039000 audit[1458]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdafe29f40 a2=0 a3=7ffdafe29f2c items=0 ppid=1436 pid=1458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:00.039000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 10 00:48:00.064000 audit[1463]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1463 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:48:00.064000 audit[1463]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd7502dfe0 a2=0 a3=7ffd7502dfcc items=0 ppid=1436 pid=1463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:00.064000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 10 00:48:00.097000 audit[1468]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1468 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:48:00.097000 audit[1468]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffd9905af60 a2=0 a3=7ffd9905af4c items=0 ppid=1436 pid=1468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:00.097000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Jul 10 00:48:00.099574 kubelet[1436]: I0710 00:48:00.099526 1436 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Jul 10 00:48:00.099000 audit[1469]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1469 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:48:00.099000 audit[1469]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffeeb40d080 a2=0 a3=7ffeeb40d06c items=0 ppid=1436 pid=1469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:00.099000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 10 00:48:00.099000 audit[1470]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1470 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:48:00.099000 audit[1470]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd1ccd5950 a2=0 a3=7ffd1ccd593c items=0 ppid=1436 pid=1470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:00.099000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 10 00:48:00.100859 kubelet[1436]: I0710 00:48:00.100793 1436 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Jul 10 00:48:00.100859 kubelet[1436]: I0710 00:48:00.100829 1436 status_manager.go:217] "Starting to sync pod status with apiserver" Jul 10 00:48:00.101022 kubelet[1436]: I0710 00:48:00.101001 1436 kubelet.go:2321] "Starting kubelet main sync loop" Jul 10 00:48:00.101077 kubelet[1436]: E0710 00:48:00.101067 1436 kubelet.go:2345] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Jul 10 00:48:00.100000 audit[1471]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=1471 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:48:00.100000 audit[1471]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe63f05fd0 a2=0 a3=7ffe63f05fbc items=0 ppid=1436 pid=1471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:00.100000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 10 00:48:00.100000 audit[1472]: NETFILTER_CFG table=mangle:10 family=10 entries=1 op=nft_register_chain pid=1472 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:48:00.100000 audit[1472]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe0d05bfb0 a2=0 a3=7ffe0d05bf9c items=0 ppid=1436 pid=1472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:00.100000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 10 00:48:00.102000 audit[1475]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1475 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:48:00.102000 audit[1475]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc92b4a490 a2=0 a3=7ffc92b4a47c items=0 ppid=1436 pid=1475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:00.102000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 10 00:48:00.102000 audit[1474]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1474 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:48:00.102000 audit[1474]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffce540c830 a2=0 a3=7ffce540c81c items=0 ppid=1436 pid=1474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:00.102000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 10 00:48:00.103000 audit[1476]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1476 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:48:00.103000 audit[1476]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcb1221f40 a2=0 a3=7ffcb1221f2c items=0 ppid=1436 pid=1476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:00.103000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 10 00:48:00.149801 kubelet[1436]: I0710 00:48:00.149761 1436 kubelet_node_status.go:72] "Attempting to register node" node="10.0.0.143" Jul 10 00:48:00.156824 kubelet[1436]: I0710 00:48:00.156791 1436 kubelet_node_status.go:75] "Successfully registered node" node="10.0.0.143" Jul 10 00:48:00.167300 kubelet[1436]: I0710 00:48:00.167264 1436 kuberuntime_manager.go:1635] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Jul 10 00:48:00.167651 env[1199]: time="2025-07-10T00:48:00.167613655Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Jul 10 00:48:00.168003 kubelet[1436]: I0710 00:48:00.167810 1436 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Jul 10 00:48:00.447564 sudo[1330]: pam_unix(sudo:session): session closed for user root Jul 10 00:48:00.447000 audit[1330]: USER_END pid=1330 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:48:00.447000 audit[1330]: CRED_DISP pid=1330 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 10 00:48:00.449388 sshd[1326]: pam_unix(sshd:session): session closed for user core Jul 10 00:48:00.450000 audit[1326]: USER_END pid=1326 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:48:00.450000 audit[1326]: CRED_DISP pid=1326 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 10 00:48:00.451742 systemd[1]: sshd@6-10.0.0.143:22-10.0.0.1:42182.service: Deactivated successfully. Jul 10 00:48:00.451000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.143:22-10.0.0.1:42182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 10 00:48:00.452526 systemd[1]: session-7.scope: Deactivated successfully. Jul 10 00:48:00.453107 systemd-logind[1182]: Session 7 logged out. Waiting for processes to exit. Jul 10 00:48:00.453921 systemd-logind[1182]: Removed session 7. Jul 10 00:48:00.491378 kubelet[1436]: I0710 00:48:00.491345 1436 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Jul 10 00:48:00.491553 kubelet[1436]: W0710 00:48:00.491524 1436 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.Service ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Jul 10 00:48:00.491553 kubelet[1436]: W0710 00:48:00.491540 1436 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Jul 10 00:48:00.491705 kubelet[1436]: W0710 00:48:00.491682 1436 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Jul 10 00:48:00.544580 kubelet[1436]: E0710 00:48:00.544552 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:00.544580 kubelet[1436]: I0710 00:48:00.544564 1436 apiserver.go:52] "Watching apiserver" Jul 10 00:48:00.547888 kubelet[1436]: E0710 00:48:00.547859 1436 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6ghr7" podUID="36da2ccb-1a46-4dff-99a7-99fa203d27fa" Jul 10 00:48:00.553400 systemd[1]: Created slice kubepods-besteffort-pod2344f131_f61f_46e2_80e5_cc00b74de3b1.slice. Jul 10 00:48:00.565535 kubelet[1436]: I0710 00:48:00.565487 1436 desired_state_of_world_populator.go:155] "Finished populating initial desired state of world" Jul 10 00:48:00.565751 systemd[1]: Created slice kubepods-besteffort-pod4b670b13_9273_48d6_9851_677391ce79f0.slice. Jul 10 00:48:00.570537 kubelet[1436]: I0710 00:48:00.570505 1436 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/4b670b13-9273-48d6-9851-677391ce79f0-xtables-lock\") pod \"kube-proxy-g2g62\" (UID: \"4b670b13-9273-48d6-9851-677391ce79f0\") " pod="kube-system/kube-proxy-g2g62" Jul 10 00:48:00.570629 kubelet[1436]: I0710 00:48:00.570555 1436 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/2344f131-f61f-46e2-80e5-cc00b74de3b1-node-certs\") pod \"calico-node-f8w6d\" (UID: \"2344f131-f61f-46e2-80e5-cc00b74de3b1\") " pod="calico-system/calico-node-f8w6d" Jul 10 00:48:00.570629 kubelet[1436]: I0710 00:48:00.570582 1436 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/4b670b13-9273-48d6-9851-677391ce79f0-kube-proxy\") pod \"kube-proxy-g2g62\" (UID: \"4b670b13-9273-48d6-9851-677391ce79f0\") " pod="kube-system/kube-proxy-g2g62" Jul 10 00:48:00.570629 kubelet[1436]: I0710 00:48:00.570605 1436 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/2344f131-f61f-46e2-80e5-cc00b74de3b1-flexvol-driver-host\") pod \"calico-node-f8w6d\" (UID: \"2344f131-f61f-46e2-80e5-cc00b74de3b1\") " pod="calico-system/calico-node-f8w6d" Jul 10 00:48:00.570629 kubelet[1436]: I0710 00:48:00.570628 1436 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/2344f131-f61f-46e2-80e5-cc00b74de3b1-lib-modules\") pod \"calico-node-f8w6d\" (UID: \"2344f131-f61f-46e2-80e5-cc00b74de3b1\") " pod="calico-system/calico-node-f8w6d" Jul 10 00:48:00.570784 kubelet[1436]: I0710 00:48:00.570646 1436 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/2344f131-f61f-46e2-80e5-cc00b74de3b1-policysync\") pod \"calico-node-f8w6d\" (UID: \"2344f131-f61f-46e2-80e5-cc00b74de3b1\") " pod="calico-system/calico-node-f8w6d" Jul 10 00:48:00.570784 kubelet[1436]: I0710 00:48:00.570680 1436 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/2344f131-f61f-46e2-80e5-cc00b74de3b1-var-lib-calico\") pod \"calico-node-f8w6d\" (UID: \"2344f131-f61f-46e2-80e5-cc00b74de3b1\") " pod="calico-system/calico-node-f8w6d" Jul 10 00:48:00.570784 kubelet[1436]: I0710 00:48:00.570700 1436 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/2344f131-f61f-46e2-80e5-cc00b74de3b1-var-run-calico\") pod \"calico-node-f8w6d\" (UID: \"2344f131-f61f-46e2-80e5-cc00b74de3b1\") " pod="calico-system/calico-node-f8w6d" Jul 10 00:48:00.570784 kubelet[1436]: I0710 00:48:00.570718 1436 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/36da2ccb-1a46-4dff-99a7-99fa203d27fa-registration-dir\") pod \"csi-node-driver-6ghr7\" (UID: \"36da2ccb-1a46-4dff-99a7-99fa203d27fa\") " pod="calico-system/csi-node-driver-6ghr7" Jul 10 00:48:00.570784 kubelet[1436]: I0710 00:48:00.570737 1436 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/36da2ccb-1a46-4dff-99a7-99fa203d27fa-socket-dir\") pod \"csi-node-driver-6ghr7\" (UID: \"36da2ccb-1a46-4dff-99a7-99fa203d27fa\") " pod="calico-system/csi-node-driver-6ghr7" Jul 10 00:48:00.570960 kubelet[1436]: I0710 00:48:00.570756 1436 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wr9gn\" (UniqueName: \"kubernetes.io/projected/4b670b13-9273-48d6-9851-677391ce79f0-kube-api-access-wr9gn\") pod \"kube-proxy-g2g62\" (UID: \"4b670b13-9273-48d6-9851-677391ce79f0\") " pod="kube-system/kube-proxy-g2g62" Jul 10 00:48:00.570960 kubelet[1436]: I0710 00:48:00.570774 1436 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/2344f131-f61f-46e2-80e5-cc00b74de3b1-cni-log-dir\") pod \"calico-node-f8w6d\" (UID: \"2344f131-f61f-46e2-80e5-cc00b74de3b1\") " pod="calico-system/calico-node-f8w6d" Jul 10 00:48:00.570960 kubelet[1436]: I0710 00:48:00.570802 1436 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/2344f131-f61f-46e2-80e5-cc00b74de3b1-xtables-lock\") pod \"calico-node-f8w6d\" (UID: \"2344f131-f61f-46e2-80e5-cc00b74de3b1\") " pod="calico-system/calico-node-f8w6d" Jul 10 00:48:00.570960 kubelet[1436]: I0710 00:48:00.570825 1436 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5g82j\" (UniqueName: \"kubernetes.io/projected/2344f131-f61f-46e2-80e5-cc00b74de3b1-kube-api-access-5g82j\") pod \"calico-node-f8w6d\" (UID: \"2344f131-f61f-46e2-80e5-cc00b74de3b1\") " pod="calico-system/calico-node-f8w6d" Jul 10 00:48:00.570960 kubelet[1436]: I0710 00:48:00.570858 1436 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/36da2ccb-1a46-4dff-99a7-99fa203d27fa-kubelet-dir\") pod \"csi-node-driver-6ghr7\" (UID: \"36da2ccb-1a46-4dff-99a7-99fa203d27fa\") " pod="calico-system/csi-node-driver-6ghr7" Jul 10 00:48:00.571111 kubelet[1436]: I0710 00:48:00.570897 1436 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nkf5v\" (UniqueName: \"kubernetes.io/projected/36da2ccb-1a46-4dff-99a7-99fa203d27fa-kube-api-access-nkf5v\") pod \"csi-node-driver-6ghr7\" (UID: \"36da2ccb-1a46-4dff-99a7-99fa203d27fa\") " pod="calico-system/csi-node-driver-6ghr7" Jul 10 00:48:00.571111 kubelet[1436]: I0710 00:48:00.570925 1436 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/2344f131-f61f-46e2-80e5-cc00b74de3b1-cni-bin-dir\") pod \"calico-node-f8w6d\" (UID: \"2344f131-f61f-46e2-80e5-cc00b74de3b1\") " pod="calico-system/calico-node-f8w6d" Jul 10 00:48:00.571111 kubelet[1436]: I0710 00:48:00.570945 1436 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/2344f131-f61f-46e2-80e5-cc00b74de3b1-cni-net-dir\") pod \"calico-node-f8w6d\" (UID: \"2344f131-f61f-46e2-80e5-cc00b74de3b1\") " pod="calico-system/calico-node-f8w6d" Jul 10 00:48:00.571111 kubelet[1436]: I0710 00:48:00.570964 1436 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/2344f131-f61f-46e2-80e5-cc00b74de3b1-tigera-ca-bundle\") pod \"calico-node-f8w6d\" (UID: \"2344f131-f61f-46e2-80e5-cc00b74de3b1\") " pod="calico-system/calico-node-f8w6d" Jul 10 00:48:00.571111 kubelet[1436]: I0710 00:48:00.570982 1436 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/36da2ccb-1a46-4dff-99a7-99fa203d27fa-varrun\") pod \"csi-node-driver-6ghr7\" (UID: \"36da2ccb-1a46-4dff-99a7-99fa203d27fa\") " pod="calico-system/csi-node-driver-6ghr7" Jul 10 00:48:00.571236 kubelet[1436]: I0710 00:48:00.571002 1436 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/4b670b13-9273-48d6-9851-677391ce79f0-lib-modules\") pod \"kube-proxy-g2g62\" (UID: \"4b670b13-9273-48d6-9851-677391ce79f0\") " pod="kube-system/kube-proxy-g2g62" Jul 10 00:48:00.672935 kubelet[1436]: I0710 00:48:00.672904 1436 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Jul 10 00:48:00.673084 kubelet[1436]: E0710 00:48:00.673062 1436 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:48:00.673084 kubelet[1436]: W0710 00:48:00.673079 1436 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:48:00.673211 kubelet[1436]: E0710 00:48:00.673102 1436 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:48:00.673299 kubelet[1436]: E0710 00:48:00.673281 1436 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:48:00.673299 kubelet[1436]: W0710 00:48:00.673293 1436 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:48:00.673430 kubelet[1436]: E0710 00:48:00.673304 1436 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:48:00.673538 kubelet[1436]: E0710 00:48:00.673520 1436 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:48:00.673538 kubelet[1436]: W0710 00:48:00.673531 1436 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:48:00.673538 kubelet[1436]: E0710 00:48:00.673540 1436 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:48:00.673700 kubelet[1436]: E0710 00:48:00.673686 1436 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:48:00.673700 kubelet[1436]: W0710 00:48:00.673695 1436 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:48:00.673775 kubelet[1436]: E0710 00:48:00.673707 1436 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:48:00.673913 kubelet[1436]: E0710 00:48:00.673891 1436 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:48:00.673913 kubelet[1436]: W0710 00:48:00.673900 1436 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:48:00.673913 kubelet[1436]: E0710 00:48:00.673909 1436 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:48:00.676109 kubelet[1436]: E0710 00:48:00.676082 1436 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:48:00.676186 kubelet[1436]: W0710 00:48:00.676105 1436 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:48:00.676186 kubelet[1436]: E0710 00:48:00.676126 1436 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:48:00.773194 kubelet[1436]: E0710 00:48:00.773117 1436 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:48:00.773194 kubelet[1436]: W0710 00:48:00.773130 1436 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:48:00.773194 kubelet[1436]: E0710 00:48:00.773141 1436 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:48:00.773345 kubelet[1436]: E0710 00:48:00.773306 1436 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:48:00.773345 kubelet[1436]: W0710 00:48:00.773314 1436 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:48:00.773345 kubelet[1436]: E0710 00:48:00.773322 1436 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:48:00.773504 kubelet[1436]: E0710 00:48:00.773489 1436 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:48:00.773504 kubelet[1436]: W0710 00:48:00.773500 1436 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:48:00.773594 kubelet[1436]: E0710 00:48:00.773508 1436 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:48:00.838853 kubelet[1436]: E0710 00:48:00.838830 1436 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:48:00.838853 kubelet[1436]: W0710 00:48:00.838850 1436 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:48:00.838977 kubelet[1436]: E0710 00:48:00.838874 1436 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:48:00.839124 kubelet[1436]: E0710 00:48:00.839096 1436 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:48:00.839124 kubelet[1436]: W0710 00:48:00.839108 1436 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:48:00.839248 kubelet[1436]: E0710 00:48:00.839129 1436 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:48:00.866178 env[1199]: time="2025-07-10T00:48:00.866140704Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-f8w6d,Uid:2344f131-f61f-46e2-80e5-cc00b74de3b1,Namespace:calico-system,Attempt:0,}" Jul 10 00:48:00.874642 kubelet[1436]: E0710 00:48:00.874610 1436 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:48:00.874642 kubelet[1436]: W0710 00:48:00.874625 1436 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:48:00.874642 kubelet[1436]: E0710 00:48:00.874640 1436 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:48:00.975784 kubelet[1436]: E0710 00:48:00.975767 1436 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:48:00.975784 kubelet[1436]: W0710 00:48:00.975779 1436 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:48:00.975880 kubelet[1436]: E0710 00:48:00.975790 1436 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:48:01.077179 kubelet[1436]: E0710 00:48:01.077093 1436 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:48:01.077179 kubelet[1436]: W0710 00:48:01.077107 1436 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:48:01.077179 kubelet[1436]: E0710 00:48:01.077122 1436 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:48:01.177770 kubelet[1436]: E0710 00:48:01.177753 1436 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:48:01.177770 kubelet[1436]: W0710 00:48:01.177766 1436 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:48:01.177890 kubelet[1436]: E0710 00:48:01.177777 1436 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:48:01.278791 kubelet[1436]: E0710 00:48:01.278758 1436 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:48:01.278791 kubelet[1436]: W0710 00:48:01.278782 1436 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:48:01.279005 kubelet[1436]: E0710 00:48:01.278807 1436 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:48:01.379736 kubelet[1436]: E0710 00:48:01.379661 1436 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:48:01.379736 kubelet[1436]: W0710 00:48:01.379677 1436 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:48:01.379736 kubelet[1436]: E0710 00:48:01.379695 1436 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:48:01.480012 kubelet[1436]: E0710 00:48:01.479987 1436 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:48:01.480012 kubelet[1436]: W0710 00:48:01.480004 1436 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:48:01.480122 kubelet[1436]: E0710 00:48:01.480019 1436 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:48:01.545221 kubelet[1436]: E0710 00:48:01.545128 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:01.581356 kubelet[1436]: E0710 00:48:01.581324 1436 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:48:01.581356 kubelet[1436]: W0710 00:48:01.581343 1436 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:48:01.581356 kubelet[1436]: E0710 00:48:01.581362 1436 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:48:01.622066 kubelet[1436]: E0710 00:48:01.622037 1436 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 10 00:48:01.622066 kubelet[1436]: W0710 00:48:01.622060 1436 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 10 00:48:01.622220 kubelet[1436]: E0710 00:48:01.622086 1436 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 10 00:48:01.768369 kubelet[1436]: E0710 00:48:01.768219 1436 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 10 00:48:01.769040 env[1199]: time="2025-07-10T00:48:01.768973197Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-g2g62,Uid:4b670b13-9273-48d6-9851-677391ce79f0,Namespace:kube-system,Attempt:0,}" Jul 10 00:48:02.029427 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2465809466.mount: Deactivated successfully. Jul 10 00:48:02.036161 env[1199]: time="2025-07-10T00:48:02.036108006Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:48:02.038581 env[1199]: time="2025-07-10T00:48:02.038530289Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:48:02.040006 env[1199]: time="2025-07-10T00:48:02.039968063Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:48:02.042304 env[1199]: time="2025-07-10T00:48:02.042276603Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:48:02.043573 env[1199]: time="2025-07-10T00:48:02.043543465Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:48:02.045148 env[1199]: time="2025-07-10T00:48:02.045111683Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:48:02.047802 env[1199]: time="2025-07-10T00:48:02.047764828Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:48:02.048647 env[1199]: time="2025-07-10T00:48:02.048600611Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:48:02.068506 env[1199]: time="2025-07-10T00:48:02.068388919Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 10 00:48:02.068506 env[1199]: time="2025-07-10T00:48:02.068478040Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 10 00:48:02.068506 env[1199]: time="2025-07-10T00:48:02.068492401Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 10 00:48:02.068745 env[1199]: time="2025-07-10T00:48:02.068651232Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/55c945b55bc4743f09b888fe507dcdc8e79c1079a2ec81130d213c31851e1206 pid=1515 runtime=io.containerd.runc.v2 Jul 10 00:48:02.070199 env[1199]: time="2025-07-10T00:48:02.070143816Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 10 00:48:02.070199 env[1199]: time="2025-07-10T00:48:02.070170239Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 10 00:48:02.070199 env[1199]: time="2025-07-10T00:48:02.070179775Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 10 00:48:02.070368 env[1199]: time="2025-07-10T00:48:02.070311410Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2bfe63fb6b1bdd15fdb1dbc9f5b635dd063c8a2c42c00f6465c2c8a24480ea85 pid=1523 runtime=io.containerd.runc.v2 Jul 10 00:48:02.085544 systemd[1]: Started cri-containerd-55c945b55bc4743f09b888fe507dcdc8e79c1079a2ec81130d213c31851e1206.scope. Jul 10 00:48:02.089563 systemd[1]: Started cri-containerd-2bfe63fb6b1bdd15fdb1dbc9f5b635dd063c8a2c42c00f6465c2c8a24480ea85.scope. Jul 10 00:48:02.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.097000 audit: BPF prog-id=58 op=LOAD Jul 10 00:48:02.097000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.097000 audit[1538]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1515 pid=1538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:02.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535633934356235356263343734336630396238383866653530376463 Jul 10 00:48:02.097000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.097000 audit[1538]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1515 pid=1538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:02.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535633934356235356263343734336630396238383866653530376463 Jul 10 00:48:02.097000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.097000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.097000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.097000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.097000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.097000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.097000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.097000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.097000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.097000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.097000 audit: BPF prog-id=59 op=LOAD Jul 10 00:48:02.097000 audit[1538]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000292f50 items=0 ppid=1515 pid=1538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:02.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535633934356235356263343734336630396238383866653530376463 Jul 10 00:48:02.097000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.097000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.097000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.097000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.097000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.097000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.097000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.097000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.097000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.097000 audit: BPF prog-id=60 op=LOAD Jul 10 00:48:02.097000 audit[1538]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000292f98 items=0 ppid=1515 pid=1538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:02.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535633934356235356263343734336630396238383866653530376463 Jul 10 00:48:02.098000 audit: BPF prog-id=60 op=UNLOAD Jul 10 00:48:02.098000 audit: BPF prog-id=59 op=UNLOAD Jul 10 00:48:02.098000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.098000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.098000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.098000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.098000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.098000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.098000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.098000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.098000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.098000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.098000 audit: BPF prog-id=61 op=LOAD Jul 10 00:48:02.098000 audit[1538]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002933a8 items=0 ppid=1515 pid=1538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:02.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535633934356235356263343734336630396238383866653530376463 Jul 10 00:48:02.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.098000 audit: BPF prog-id=62 op=LOAD Jul 10 00:48:02.099000 audit[1539]: AVC avc: denied { bpf } for pid=1539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.099000 audit[1539]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1523 pid=1539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:02.099000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262666536336662366231626464313566646231646263396635623633 Jul 10 00:48:02.099000 audit[1539]: AVC avc: denied { perfmon } for pid=1539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.099000 audit[1539]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1523 pid=1539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:02.099000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262666536336662366231626464313566646231646263396635623633 Jul 10 00:48:02.099000 audit[1539]: AVC avc: denied { bpf } for pid=1539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.099000 audit[1539]: AVC avc: denied { bpf } for pid=1539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.099000 audit[1539]: AVC avc: denied { bpf } for pid=1539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.099000 audit[1539]: AVC avc: denied { perfmon } for pid=1539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.099000 audit[1539]: AVC avc: denied { perfmon } for pid=1539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.099000 audit[1539]: AVC avc: denied { perfmon } for pid=1539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.099000 audit[1539]: AVC avc: denied { perfmon } for pid=1539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.099000 audit[1539]: AVC avc: denied { perfmon } for pid=1539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.099000 audit[1539]: AVC avc: denied { bpf } for pid=1539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.099000 audit[1539]: AVC avc: denied { bpf } for pid=1539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.099000 audit: BPF prog-id=63 op=LOAD Jul 10 00:48:02.099000 audit[1539]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0002e1100 items=0 ppid=1523 pid=1539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:02.099000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262666536336662366231626464313566646231646263396635623633 Jul 10 00:48:02.099000 audit[1539]: AVC avc: denied { bpf } for pid=1539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.099000 audit[1539]: AVC avc: denied { bpf } for pid=1539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.099000 audit[1539]: AVC avc: denied { perfmon } for pid=1539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.099000 audit[1539]: AVC avc: denied { perfmon } for pid=1539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.099000 audit[1539]: AVC avc: denied { perfmon } for pid=1539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.099000 audit[1539]: AVC avc: denied { perfmon } for pid=1539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.099000 audit[1539]: AVC avc: denied { perfmon } for pid=1539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.099000 audit[1539]: AVC avc: denied { bpf } for pid=1539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.099000 audit[1539]: AVC avc: denied { bpf } for pid=1539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.099000 audit: BPF prog-id=64 op=LOAD Jul 10 00:48:02.099000 audit[1539]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0002e1148 items=0 ppid=1523 pid=1539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:02.099000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262666536336662366231626464313566646231646263396635623633 Jul 10 00:48:02.099000 audit: BPF prog-id=64 op=UNLOAD Jul 10 00:48:02.099000 audit: BPF prog-id=63 op=UNLOAD Jul 10 00:48:02.099000 audit[1539]: AVC avc: denied { bpf } for pid=1539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.099000 audit[1539]: AVC avc: denied { bpf } for pid=1539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.099000 audit[1539]: AVC avc: denied { bpf } for pid=1539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.099000 audit[1539]: AVC avc: denied { perfmon } for pid=1539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.099000 audit[1539]: AVC avc: denied { perfmon } for pid=1539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.099000 audit[1539]: AVC avc: denied { perfmon } for pid=1539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.099000 audit[1539]: AVC avc: denied { perfmon } for pid=1539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.099000 audit[1539]: AVC avc: denied { perfmon } for pid=1539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.099000 audit[1539]: AVC avc: denied { bpf } for pid=1539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.099000 audit[1539]: AVC avc: denied { bpf } for pid=1539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:02.099000 audit: BPF prog-id=65 op=LOAD Jul 10 00:48:02.099000 audit[1539]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0002e1558 items=0 ppid=1523 pid=1539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:02.099000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262666536336662366231626464313566646231646263396635623633 Jul 10 00:48:02.103747 kubelet[1436]: E0710 00:48:02.103037 1436 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6ghr7" podUID="36da2ccb-1a46-4dff-99a7-99fa203d27fa" Jul 10 00:48:02.112741 env[1199]: time="2025-07-10T00:48:02.112680917Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-f8w6d,Uid:2344f131-f61f-46e2-80e5-cc00b74de3b1,Namespace:calico-system,Attempt:0,} returns sandbox id \"55c945b55bc4743f09b888fe507dcdc8e79c1079a2ec81130d213c31851e1206\"" Jul 10 00:48:02.115308 env[1199]: time="2025-07-10T00:48:02.115255109Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2\"" Jul 10 00:48:02.116043 env[1199]: time="2025-07-10T00:48:02.116012957Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-g2g62,Uid:4b670b13-9273-48d6-9851-677391ce79f0,Namespace:kube-system,Attempt:0,} returns sandbox id \"2bfe63fb6b1bdd15fdb1dbc9f5b635dd063c8a2c42c00f6465c2c8a24480ea85\"" Jul 10 00:48:02.116571 kubelet[1436]: E0710 00:48:02.116539 1436 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 10 00:48:02.545609 kubelet[1436]: E0710 00:48:02.545574 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:03.467681 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2443905273.mount: Deactivated successfully. Jul 10 00:48:03.546035 kubelet[1436]: E0710 00:48:03.545983 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:03.628161 env[1199]: time="2025-07-10T00:48:03.628111281Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:48:03.629958 env[1199]: time="2025-07-10T00:48:03.629918500Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:639615519fa6f7bc4b4756066ba9780068fd291eacc36c120f6c555e62f2b00e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:48:03.631339 env[1199]: time="2025-07-10T00:48:03.631303044Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:48:03.632795 env[1199]: time="2025-07-10T00:48:03.632771323Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:972be127eaecd7d1a2d5393b8d14f1ae8f88550bee83e0519e9590c7e15eb41b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:48:03.633252 env[1199]: time="2025-07-10T00:48:03.633228831Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.2\" returns image reference \"sha256:639615519fa6f7bc4b4756066ba9780068fd291eacc36c120f6c555e62f2b00e\"" Jul 10 00:48:03.634340 env[1199]: time="2025-07-10T00:48:03.634305661Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.10\"" Jul 10 00:48:03.635371 env[1199]: time="2025-07-10T00:48:03.635345991Z" level=info msg="CreateContainer within sandbox \"55c945b55bc4743f09b888fe507dcdc8e79c1079a2ec81130d213c31851e1206\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Jul 10 00:48:03.649350 env[1199]: time="2025-07-10T00:48:03.649307405Z" level=info msg="CreateContainer within sandbox \"55c945b55bc4743f09b888fe507dcdc8e79c1079a2ec81130d213c31851e1206\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"e09d1e5e608cb9cce98197bb0eb179736d9e2b59be45f8c29d7c224495a53ddd\"" Jul 10 00:48:03.649847 env[1199]: time="2025-07-10T00:48:03.649821586Z" level=info msg="StartContainer for \"e09d1e5e608cb9cce98197bb0eb179736d9e2b59be45f8c29d7c224495a53ddd\"" Jul 10 00:48:03.662953 systemd[1]: Started cri-containerd-e09d1e5e608cb9cce98197bb0eb179736d9e2b59be45f8c29d7c224495a53ddd.scope. Jul 10 00:48:03.675000 audit[1589]: AVC avc: denied { perfmon } for pid=1589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:03.675000 audit[1589]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f4bcebc07c8 items=0 ppid=1515 pid=1589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:03.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530396431653565363038636239636365393831393762623065623137 Jul 10 00:48:03.675000 audit[1589]: AVC avc: denied { bpf } for pid=1589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:03.675000 audit[1589]: AVC avc: denied { bpf } for pid=1589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:03.675000 audit[1589]: AVC avc: denied { bpf } for pid=1589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:03.675000 audit[1589]: AVC avc: denied { perfmon } for pid=1589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:03.675000 audit[1589]: AVC avc: denied { perfmon } for pid=1589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:03.675000 audit[1589]: AVC avc: denied { perfmon } for pid=1589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:03.675000 audit[1589]: AVC avc: denied { perfmon } for pid=1589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:03.675000 audit[1589]: AVC avc: denied { perfmon } for pid=1589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:03.675000 audit[1589]: AVC avc: denied { bpf } for pid=1589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:03.675000 audit[1589]: AVC avc: denied { bpf } for pid=1589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:03.675000 audit: BPF prog-id=66 op=LOAD Jul 10 00:48:03.675000 audit[1589]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000331bd8 items=0 ppid=1515 pid=1589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:03.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530396431653565363038636239636365393831393762623065623137 Jul 10 00:48:03.675000 audit[1589]: AVC avc: denied { bpf } for pid=1589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:03.675000 audit[1589]: AVC avc: denied { bpf } for pid=1589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:03.675000 audit[1589]: AVC avc: denied { perfmon } for pid=1589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:03.675000 audit[1589]: AVC avc: denied { perfmon } for pid=1589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:03.675000 audit[1589]: AVC avc: denied { perfmon } for pid=1589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:03.675000 audit[1589]: AVC avc: denied { perfmon } for pid=1589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:03.675000 audit[1589]: AVC avc: denied { perfmon } for pid=1589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:03.675000 audit[1589]: AVC avc: denied { bpf } for pid=1589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:03.675000 audit[1589]: AVC avc: denied { bpf } for pid=1589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:03.675000 audit: BPF prog-id=67 op=LOAD Jul 10 00:48:03.675000 audit[1589]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000331c28 items=0 ppid=1515 pid=1589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:03.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530396431653565363038636239636365393831393762623065623137 Jul 10 00:48:03.675000 audit: BPF prog-id=67 op=UNLOAD Jul 10 00:48:03.675000 audit: BPF prog-id=66 op=UNLOAD Jul 10 00:48:03.675000 audit[1589]: AVC avc: denied { bpf } for pid=1589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:03.675000 audit[1589]: AVC avc: denied { bpf } for pid=1589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:03.675000 audit[1589]: AVC avc: denied { bpf } for pid=1589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:03.675000 audit[1589]: AVC avc: denied { perfmon } for pid=1589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:03.675000 audit[1589]: AVC avc: denied { perfmon } for pid=1589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:03.675000 audit[1589]: AVC avc: denied { perfmon } for pid=1589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:03.675000 audit[1589]: AVC avc: denied { perfmon } for pid=1589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:03.675000 audit[1589]: AVC avc: denied { perfmon } for pid=1589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:03.675000 audit[1589]: AVC avc: denied { bpf } for pid=1589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:03.675000 audit[1589]: AVC avc: denied { bpf } for pid=1589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:03.675000 audit: BPF prog-id=68 op=LOAD Jul 10 00:48:03.675000 audit[1589]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000331cb8 items=0 ppid=1515 pid=1589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:03.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530396431653565363038636239636365393831393762623065623137 Jul 10 00:48:03.687142 env[1199]: time="2025-07-10T00:48:03.687101160Z" level=info msg="StartContainer for \"e09d1e5e608cb9cce98197bb0eb179736d9e2b59be45f8c29d7c224495a53ddd\" returns successfully" Jul 10 00:48:03.694112 systemd[1]: cri-containerd-e09d1e5e608cb9cce98197bb0eb179736d9e2b59be45f8c29d7c224495a53ddd.scope: Deactivated successfully. Jul 10 00:48:03.696000 audit: BPF prog-id=68 op=UNLOAD Jul 10 00:48:04.102204 kubelet[1436]: E0710 00:48:04.102159 1436 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6ghr7" podUID="36da2ccb-1a46-4dff-99a7-99fa203d27fa" Jul 10 00:48:04.105248 env[1199]: time="2025-07-10T00:48:04.105199585Z" level=info msg="shim disconnected" id=e09d1e5e608cb9cce98197bb0eb179736d9e2b59be45f8c29d7c224495a53ddd Jul 10 00:48:04.105338 env[1199]: time="2025-07-10T00:48:04.105251314Z" level=warning msg="cleaning up after shim disconnected" id=e09d1e5e608cb9cce98197bb0eb179736d9e2b59be45f8c29d7c224495a53ddd namespace=k8s.io Jul 10 00:48:04.105338 env[1199]: time="2025-07-10T00:48:04.105263746Z" level=info msg="cleaning up dead shim" Jul 10 00:48:04.112525 env[1199]: time="2025-07-10T00:48:04.112470167Z" level=warning msg="cleanup warnings time=\"2025-07-10T00:48:04Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1627 runtime=io.containerd.runc.v2\n" Jul 10 00:48:04.547279 kubelet[1436]: E0710 00:48:04.547131 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:05.096956 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2742355555.mount: Deactivated successfully. Jul 10 00:48:05.548321 kubelet[1436]: E0710 00:48:05.548188 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:05.697553 env[1199]: time="2025-07-10T00:48:05.697486773Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:48:05.699333 env[1199]: time="2025-07-10T00:48:05.699290505Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3ed600862d3e69931e0f9f4dbf5c2b46343af40aa079772434f13de771bdc30c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:48:05.700722 env[1199]: time="2025-07-10T00:48:05.700672831Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:48:05.702078 env[1199]: time="2025-07-10T00:48:05.702021124Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:bcbb293812bdf587b28ea98369a8c347ca84884160046296761acdf12b27029d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:48:05.702381 env[1199]: time="2025-07-10T00:48:05.702342064Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.10\" returns image reference \"sha256:3ed600862d3e69931e0f9f4dbf5c2b46343af40aa079772434f13de771bdc30c\"" Jul 10 00:48:05.703429 env[1199]: time="2025-07-10T00:48:05.703389446Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.2\"" Jul 10 00:48:05.704412 env[1199]: time="2025-07-10T00:48:05.704364985Z" level=info msg="CreateContainer within sandbox \"2bfe63fb6b1bdd15fdb1dbc9f5b635dd063c8a2c42c00f6465c2c8a24480ea85\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Jul 10 00:48:05.719130 env[1199]: time="2025-07-10T00:48:05.719094428Z" level=info msg="CreateContainer within sandbox \"2bfe63fb6b1bdd15fdb1dbc9f5b635dd063c8a2c42c00f6465c2c8a24480ea85\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"112c3a6ea4059919f3ce744050c9de999683167d97bbc95eb9a8620b2607fbfd\"" Jul 10 00:48:05.719600 env[1199]: time="2025-07-10T00:48:05.719537088Z" level=info msg="StartContainer for \"112c3a6ea4059919f3ce744050c9de999683167d97bbc95eb9a8620b2607fbfd\"" Jul 10 00:48:05.737541 systemd[1]: Started cri-containerd-112c3a6ea4059919f3ce744050c9de999683167d97bbc95eb9a8620b2607fbfd.scope. Jul 10 00:48:05.749000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:05.751585 kernel: kauditd_printk_skb: 201 callbacks suppressed Jul 10 00:48:05.751652 kernel: audit: type=1400 audit(1752108485.749:463): avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:05.749000 audit[1651]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f59e15a9518 items=0 ppid=1523 pid=1651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:05.758819 kernel: audit: type=1300 audit(1752108485.749:463): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f59e15a9518 items=0 ppid=1523 pid=1651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:05.758869 kernel: audit: type=1327 audit(1752108485.749:463): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131326333613665613430353939313966336365373434303530633964 Jul 10 00:48:05.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131326333613665613430353939313966336365373434303530633964 Jul 10 00:48:05.762594 kernel: audit: type=1400 audit(1752108485.749:464): avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:05.749000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:05.765334 kernel: audit: type=1400 audit(1752108485.749:464): avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:05.749000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:05.749000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:05.770948 kernel: audit: type=1400 audit(1752108485.749:464): avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:05.770996 kernel: audit: type=1400 audit(1752108485.749:464): avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:05.749000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:05.773760 kernel: audit: type=1400 audit(1752108485.749:464): avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:05.749000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:05.776543 kernel: audit: type=1400 audit(1752108485.749:464): avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:05.749000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:05.782350 kernel: audit: type=1400 audit(1752108485.749:464): avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:05.749000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:05.749000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:05.749000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:05.749000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:05.749000 audit: BPF prog-id=69 op=LOAD Jul 10 00:48:05.749000 audit[1651]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002d9ba8 items=0 ppid=1523 pid=1651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:05.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131326333613665613430353939313966336365373434303530633964 Jul 10 00:48:05.750000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:05.750000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:05.750000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:05.750000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:05.750000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:05.750000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:05.750000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:05.750000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:05.750000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:05.750000 audit: BPF prog-id=70 op=LOAD Jul 10 00:48:05.750000 audit[1651]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002d9bf8 items=0 ppid=1523 pid=1651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:05.750000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131326333613665613430353939313966336365373434303530633964 Jul 10 00:48:05.757000 audit: BPF prog-id=70 op=UNLOAD Jul 10 00:48:05.757000 audit: BPF prog-id=69 op=UNLOAD Jul 10 00:48:05.757000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:05.757000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:05.757000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:05.757000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:05.757000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:05.757000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:05.757000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:05.757000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:05.757000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:05.757000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:05.757000 audit: BPF prog-id=71 op=LOAD Jul 10 00:48:05.757000 audit[1651]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002d9c88 items=0 ppid=1523 pid=1651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:05.757000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131326333613665613430353939313966336365373434303530633964 Jul 10 00:48:05.783851 env[1199]: time="2025-07-10T00:48:05.783660577Z" level=info msg="StartContainer for \"112c3a6ea4059919f3ce744050c9de999683167d97bbc95eb9a8620b2607fbfd\" returns successfully" Jul 10 00:48:05.878000 audit[1715]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1715 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:48:05.878000 audit[1715]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd2227b720 a2=0 a3=7ffd2227b70c items=0 ppid=1662 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:05.878000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 10 00:48:05.878000 audit[1716]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1716 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:48:05.878000 audit[1716]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd92d9e360 a2=0 a3=7ffd92d9e34c items=0 ppid=1662 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:05.878000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 10 00:48:05.879000 audit[1717]: NETFILTER_CFG table=nat:16 family=10 entries=1 op=nft_register_chain pid=1717 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:48:05.879000 audit[1717]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffea1eb9de0 a2=0 a3=7ffea1eb9dcc items=0 ppid=1662 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:05.879000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 10 00:48:05.881000 audit[1718]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_chain pid=1718 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:48:05.881000 audit[1718]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc6fefbb30 a2=0 a3=7ffc6fefbb1c items=0 ppid=1662 pid=1718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:05.881000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 10 00:48:05.881000 audit[1719]: NETFILTER_CFG table=filter:18 family=10 entries=1 op=nft_register_chain pid=1719 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:48:05.881000 audit[1719]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe43efb930 a2=0 a3=7ffe43efb91c items=0 ppid=1662 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:05.881000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 10 00:48:05.882000 audit[1720]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=1720 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:48:05.882000 audit[1720]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff07f6efb0 a2=0 a3=7fff07f6ef9c items=0 ppid=1662 pid=1720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:05.882000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 10 00:48:05.883000 audit[1721]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1721 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:48:05.883000 audit[1721]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff848af820 a2=0 a3=7fff848af80c items=0 ppid=1662 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:05.883000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 10 00:48:05.885000 audit[1723]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1723 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:48:05.885000 audit[1723]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff83375e20 a2=0 a3=7fff83375e0c items=0 ppid=1662 pid=1723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:05.885000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Jul 10 00:48:05.889000 audit[1726]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1726 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:48:05.889000 audit[1726]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd92b508b0 a2=0 a3=7ffd92b5089c items=0 ppid=1662 pid=1726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:05.889000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Jul 10 00:48:05.890000 audit[1727]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1727 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:48:05.890000 audit[1727]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff20a7c3a0 a2=0 a3=7fff20a7c38c items=0 ppid=1662 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:05.890000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 10 00:48:05.892000 audit[1729]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1729 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:48:05.892000 audit[1729]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffca66721d0 a2=0 a3=7ffca66721bc items=0 ppid=1662 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:05.892000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 10 00:48:05.892000 audit[1730]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1730 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:48:05.892000 audit[1730]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff549a9c40 a2=0 a3=7fff549a9c2c items=0 ppid=1662 pid=1730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:05.892000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 10 00:48:05.895000 audit[1732]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1732 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:48:05.895000 audit[1732]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff1e5ec8e0 a2=0 a3=7fff1e5ec8cc items=0 ppid=1662 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:05.895000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 10 00:48:05.898000 audit[1735]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1735 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:48:05.898000 audit[1735]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffec7fa6680 a2=0 a3=7ffec7fa666c items=0 ppid=1662 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:05.898000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Jul 10 00:48:05.899000 audit[1736]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1736 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:48:05.899000 audit[1736]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe0b3c8ce0 a2=0 a3=7ffe0b3c8ccc items=0 ppid=1662 pid=1736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:05.899000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 10 00:48:05.901000 audit[1738]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1738 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:48:05.901000 audit[1738]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd69343790 a2=0 a3=7ffd6934377c items=0 ppid=1662 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:05.901000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 10 00:48:05.902000 audit[1739]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1739 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:48:05.902000 audit[1739]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe9bf07a00 a2=0 a3=7ffe9bf079ec items=0 ppid=1662 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:05.902000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 10 00:48:05.904000 audit[1741]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1741 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:48:05.904000 audit[1741]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeede5a2d0 a2=0 a3=7ffeede5a2bc items=0 ppid=1662 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:05.904000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 10 00:48:05.907000 audit[1744]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1744 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:48:05.907000 audit[1744]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffec0d11a0 a2=0 a3=7fffec0d118c items=0 ppid=1662 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:05.907000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 10 00:48:05.910000 audit[1747]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1747 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:48:05.910000 audit[1747]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe77145830 a2=0 a3=7ffe7714581c items=0 ppid=1662 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:05.910000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 10 00:48:05.911000 audit[1748]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1748 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:48:05.911000 audit[1748]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff8bfb50e0 a2=0 a3=7fff8bfb50cc items=0 ppid=1662 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:05.911000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 10 00:48:05.913000 audit[1750]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1750 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:48:05.913000 audit[1750]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd9782bed0 a2=0 a3=7ffd9782bebc items=0 ppid=1662 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:05.913000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 10 00:48:05.930000 audit[1754]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1754 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:48:05.930000 audit[1754]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe25c6ef00 a2=0 a3=7ffe25c6eeec items=0 ppid=1662 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:05.930000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 10 00:48:05.931000 audit[1755]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1755 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:48:05.931000 audit[1755]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe039660c0 a2=0 a3=7ffe039660ac items=0 ppid=1662 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:05.931000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 10 00:48:05.933000 audit[1757]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1757 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 10 00:48:05.933000 audit[1757]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc9c5e1450 a2=0 a3=7ffc9c5e143c items=0 ppid=1662 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:05.933000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 10 00:48:05.954000 audit[1763]: NETFILTER_CFG table=filter:39 family=2 entries=8 op=nft_register_rule pid=1763 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:48:05.954000 audit[1763]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffde9382380 a2=0 a3=7ffde938236c items=0 ppid=1662 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:05.954000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:48:05.971000 audit[1763]: NETFILTER_CFG table=nat:40 family=2 entries=42 op=nft_register_chain pid=1763 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:48:05.971000 audit[1763]: SYSCALL arch=c000003e syscall=46 success=yes exit=19812 a0=3 a1=7ffde9382380 a2=0 a3=7ffde938236c items=0 ppid=1662 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:05.971000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:48:05.981000 audit[1772]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1772 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:48:05.981000 audit[1772]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc7d643670 a2=0 a3=7ffc7d64365c items=0 ppid=1662 pid=1772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:05.981000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 10 00:48:05.984000 audit[1776]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1776 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:48:05.984000 audit[1776]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd58f0c7a0 a2=0 a3=7ffd58f0c78c items=0 ppid=1662 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:05.984000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Jul 10 00:48:05.987000 audit[1782]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1782 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:48:05.987000 audit[1782]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd67206b10 a2=0 a3=7ffd67206afc items=0 ppid=1662 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:05.987000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Jul 10 00:48:05.989000 audit[1784]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1784 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:48:05.989000 audit[1784]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd3a7aa0d0 a2=0 a3=7ffd3a7aa0bc items=0 ppid=1662 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:05.989000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 10 00:48:05.991000 audit[1788]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1788 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:48:05.991000 audit[1788]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffca1f018b0 a2=0 a3=7ffca1f0189c items=0 ppid=1662 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:05.991000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 10 00:48:05.992000 audit[1790]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1790 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:48:05.992000 audit[1790]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff828bdaf0 a2=0 a3=7fff828bdadc items=0 ppid=1662 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:05.992000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 10 00:48:05.994000 audit[1795]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1795 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:48:05.994000 audit[1795]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff5059d020 a2=0 a3=7fff5059d00c items=0 ppid=1662 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:05.994000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Jul 10 00:48:05.997000 audit[1800]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1800 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:48:05.997000 audit[1800]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd93d3f7d0 a2=0 a3=7ffd93d3f7bc items=0 ppid=1662 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:05.997000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 10 00:48:05.998000 audit[1802]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1802 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:48:05.998000 audit[1802]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe24cc7470 a2=0 a3=7ffe24cc745c items=0 ppid=1662 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:05.998000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 10 00:48:06.000000 audit[1806]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1806 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:48:06.000000 audit[1806]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffce67af290 a2=0 a3=7ffce67af27c items=0 ppid=1662 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:06.000000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 10 00:48:06.001000 audit[1808]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1808 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:48:06.001000 audit[1808]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffb7d38590 a2=0 a3=7fffb7d3857c items=0 ppid=1662 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:06.001000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 10 00:48:06.004000 audit[1812]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1812 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:48:06.004000 audit[1812]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffee877f090 a2=0 a3=7ffee877f07c items=0 ppid=1662 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:06.004000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 10 00:48:06.007000 audit[1819]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1819 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:48:06.007000 audit[1819]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd6f78bce0 a2=0 a3=7ffd6f78bccc items=0 ppid=1662 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:06.007000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 10 00:48:06.010000 audit[1825]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1825 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:48:06.010000 audit[1825]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd3415d900 a2=0 a3=7ffd3415d8ec items=0 ppid=1662 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:06.010000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Jul 10 00:48:06.011000 audit[1827]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1827 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:48:06.011000 audit[1827]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff8c03a4c0 a2=0 a3=7fff8c03a4ac items=0 ppid=1662 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:06.011000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 10 00:48:06.013000 audit[1830]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1830 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:48:06.013000 audit[1830]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc5fb9e780 a2=0 a3=7ffc5fb9e76c items=0 ppid=1662 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:06.013000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 10 00:48:06.014000 audit[1831]: NETFILTER_CFG table=filter:57 family=2 entries=14 op=nft_register_rule pid=1831 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:48:06.014000 audit[1831]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff271e3700 a2=0 a3=7fff271e36ec items=0 ppid=1662 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:06.014000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:48:06.019000 audit[1831]: NETFILTER_CFG table=nat:58 family=2 entries=60 op=nft_register_rule pid=1831 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:48:06.019000 audit[1831]: SYSCALL arch=c000003e syscall=46 success=yes exit=19812 a0=3 a1=7fff271e3700 a2=0 a3=7fff271e36ec items=0 ppid=1662 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:06.019000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:48:06.027000 audit[1834]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1834 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:48:06.027000 audit[1834]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe6eee9430 a2=0 a3=7ffe6eee941c items=0 ppid=1662 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:06.027000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 10 00:48:06.028000 audit[1835]: NETFILTER_CFG table=nat:60 family=10 entries=1 op=nft_register_chain pid=1835 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:48:06.028000 audit[1835]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd1ce7dc80 a2=0 a3=7ffd1ce7dc6c items=0 ppid=1662 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:06.028000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 10 00:48:06.030000 audit[1837]: NETFILTER_CFG table=nat:61 family=10 entries=2 op=nft_register_chain pid=1837 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:48:06.030000 audit[1837]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffca3d28600 a2=0 a3=7ffca3d285ec items=0 ppid=1662 pid=1837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:06.030000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 10 00:48:06.030000 audit[1838]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_chain pid=1838 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:48:06.030000 audit[1838]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe57399800 a2=0 a3=7ffe573997ec items=0 ppid=1662 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:06.030000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 10 00:48:06.032000 audit[1840]: NETFILTER_CFG table=filter:63 family=10 entries=1 op=nft_register_rule pid=1840 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:48:06.032000 audit[1840]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffa2378990 a2=0 a3=7fffa237897c items=0 ppid=1662 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:06.032000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 10 00:48:06.035000 audit[1843]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_rule pid=1843 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 10 00:48:06.035000 audit[1843]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffff87a1790 a2=0 a3=7ffff87a177c items=0 ppid=1662 pid=1843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:06.035000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 10 00:48:06.038000 audit[1845]: NETFILTER_CFG table=filter:65 family=10 entries=3 op=nft_register_rule pid=1845 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 10 00:48:06.038000 audit[1845]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffdbac17490 a2=0 a3=7ffdbac1747c items=0 ppid=1662 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:06.038000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:48:06.038000 audit[1845]: NETFILTER_CFG table=nat:66 family=10 entries=7 op=nft_register_chain pid=1845 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 10 00:48:06.038000 audit[1845]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffdbac17490 a2=0 a3=7ffdbac1747c items=0 ppid=1662 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:06.038000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:48:06.070000 audit[1875]: NETFILTER_CFG table=filter:67 family=10 entries=6 op=nft_register_rule pid=1875 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 10 00:48:06.070000 audit[1875]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7fff44a39f30 a2=0 a3=7fff44a39f1c items=0 ppid=1662 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:06.070000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:48:06.075000 audit[1875]: NETFILTER_CFG table=nat:68 family=10 entries=10 op=nft_register_rule pid=1875 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 10 00:48:06.075000 audit[1875]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fff44a39f30 a2=0 a3=7fff44a39f1c items=0 ppid=1662 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:06.075000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:48:06.097081 systemd[1]: run-containerd-runc-k8s.io-112c3a6ea4059919f3ce744050c9de999683167d97bbc95eb9a8620b2607fbfd-runc.v8iXIo.mount: Deactivated successfully. Jul 10 00:48:06.101983 kubelet[1436]: E0710 00:48:06.101922 1436 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6ghr7" podUID="36da2ccb-1a46-4dff-99a7-99fa203d27fa" Jul 10 00:48:06.116447 kubelet[1436]: E0710 00:48:06.116390 1436 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 10 00:48:06.127327 kubelet[1436]: I0710 00:48:06.125154 1436 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-g2g62" podStartSLOduration=2.5389275209999997 podStartE2EDuration="6.125133012s" podCreationTimestamp="2025-07-10 00:48:00 +0000 UTC" firstStartedPulling="2025-07-10 00:48:02.116972977 +0000 UTC m=+3.183259250" lastFinishedPulling="2025-07-10 00:48:05.703178468 +0000 UTC m=+6.769464741" observedRunningTime="2025-07-10 00:48:06.124607903 +0000 UTC m=+7.190894166" watchObservedRunningTime="2025-07-10 00:48:06.125133012 +0000 UTC m=+7.191419284" Jul 10 00:48:06.548601 kubelet[1436]: E0710 00:48:06.548551 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:06.735000 audit[1877]: NETFILTER_CFG table=filter:69 family=2 entries=14 op=nft_register_rule pid=1877 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:48:06.735000 audit[1877]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff2a6a4ae0 a2=0 a3=7fff2a6a4acc items=0 ppid=1662 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:06.735000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:48:06.742000 audit[1877]: NETFILTER_CFG table=nat:70 family=2 entries=44 op=nft_register_rule pid=1877 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:48:06.742000 audit[1877]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7fff2a6a4ae0 a2=0 a3=7fff2a6a4acc items=0 ppid=1662 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:06.742000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:48:07.120291 kubelet[1436]: E0710 00:48:07.120244 1436 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 10 00:48:07.549351 kubelet[1436]: E0710 00:48:07.549300 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:07.757000 audit[1879]: NETFILTER_CFG table=filter:71 family=2 entries=14 op=nft_register_rule pid=1879 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:48:07.757000 audit[1879]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffcec9a3e50 a2=0 a3=7ffcec9a3e3c items=0 ppid=1662 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:07.757000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:48:07.767000 audit[1879]: NETFILTER_CFG table=nat:72 family=2 entries=56 op=nft_register_chain pid=1879 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:48:07.767000 audit[1879]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffcec9a3e50 a2=0 a3=7ffcec9a3e3c items=0 ppid=1662 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:07.767000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:48:08.101932 kubelet[1436]: E0710 00:48:08.101871 1436 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6ghr7" podUID="36da2ccb-1a46-4dff-99a7-99fa203d27fa" Jul 10 00:48:08.550085 kubelet[1436]: E0710 00:48:08.550032 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:08.758000 audit[1882]: NETFILTER_CFG table=filter:73 family=2 entries=14 op=nft_register_rule pid=1882 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:48:08.758000 audit[1882]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffc566a5af0 a2=0 a3=7ffc566a5adc items=0 ppid=1662 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:08.758000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:48:08.763000 audit[1882]: NETFILTER_CFG table=nat:74 family=2 entries=20 op=nft_register_rule pid=1882 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:48:08.763000 audit[1882]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc566a5af0 a2=0 a3=7ffc566a5adc items=0 ppid=1662 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:08.763000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:48:09.022000 audit[1884]: NETFILTER_CFG table=filter:75 family=2 entries=13 op=nft_register_rule pid=1884 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:48:09.022000 audit[1884]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffc7a86fdf0 a2=0 a3=7ffc7a86fddc items=0 ppid=1662 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:09.022000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:48:09.026000 audit[1884]: NETFILTER_CFG table=nat:76 family=2 entries=27 op=nft_register_chain pid=1884 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:48:09.026000 audit[1884]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffc7a86fdf0 a2=0 a3=7ffc7a86fddc items=0 ppid=1662 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:09.026000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:48:09.551076 kubelet[1436]: E0710 00:48:09.551028 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:09.570571 env[1199]: time="2025-07-10T00:48:09.570503627Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:48:09.572243 env[1199]: time="2025-07-10T00:48:09.572195668Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:77a357d0d33e3016e61153f7d2b7de72371579c4aaeb767fb7ef0af606fe1630,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:48:09.573751 env[1199]: time="2025-07-10T00:48:09.573709843Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:48:09.575180 env[1199]: time="2025-07-10T00:48:09.575155343Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:50686775cc60acb78bd92a66fa2d84e1700b2d8e43a718fbadbf35e59baefb4d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:48:09.575637 env[1199]: time="2025-07-10T00:48:09.575607020Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.2\" returns image reference \"sha256:77a357d0d33e3016e61153f7d2b7de72371579c4aaeb767fb7ef0af606fe1630\"" Jul 10 00:48:09.577703 env[1199]: time="2025-07-10T00:48:09.577675985Z" level=info msg="CreateContainer within sandbox \"55c945b55bc4743f09b888fe507dcdc8e79c1079a2ec81130d213c31851e1206\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Jul 10 00:48:09.591423 env[1199]: time="2025-07-10T00:48:09.591344106Z" level=info msg="CreateContainer within sandbox \"55c945b55bc4743f09b888fe507dcdc8e79c1079a2ec81130d213c31851e1206\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"99e5b63cd92ef4db96a8efabd87446fc93decfe87f35226e61f85170117662b2\"" Jul 10 00:48:09.591919 env[1199]: time="2025-07-10T00:48:09.591872310Z" level=info msg="StartContainer for \"99e5b63cd92ef4db96a8efabd87446fc93decfe87f35226e61f85170117662b2\"" Jul 10 00:48:09.606556 systemd[1]: Started cri-containerd-99e5b63cd92ef4db96a8efabd87446fc93decfe87f35226e61f85170117662b2.scope. Jul 10 00:48:09.617000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:09.617000 audit[1894]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f071c567638 items=0 ppid=1515 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:09.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939653562363363643932656634646239366138656661626438373434 Jul 10 00:48:09.618000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:09.618000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:09.618000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:09.618000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:09.618000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:09.618000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:09.618000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:09.618000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:09.618000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:09.618000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:09.618000 audit: BPF prog-id=72 op=LOAD Jul 10 00:48:09.618000 audit[1894]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0002d5ba8 items=0 ppid=1515 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:09.618000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939653562363363643932656634646239366138656661626438373434 Jul 10 00:48:09.618000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:09.618000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:09.618000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:09.618000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:09.618000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:09.618000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:09.618000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:09.618000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:09.618000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:09.618000 audit: BPF prog-id=73 op=LOAD Jul 10 00:48:09.618000 audit[1894]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0002d5bf8 items=0 ppid=1515 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:09.618000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939653562363363643932656634646239366138656661626438373434 Jul 10 00:48:09.618000 audit: BPF prog-id=73 op=UNLOAD Jul 10 00:48:09.618000 audit: BPF prog-id=72 op=UNLOAD Jul 10 00:48:09.618000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:09.618000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:09.618000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:09.618000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:09.618000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:09.618000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:09.618000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:09.618000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:09.618000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:09.618000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:09.618000 audit: BPF prog-id=74 op=LOAD Jul 10 00:48:09.618000 audit[1894]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0002d5c88 items=0 ppid=1515 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:09.618000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939653562363363643932656634646239366138656661626438373434 Jul 10 00:48:09.966056 env[1199]: time="2025-07-10T00:48:09.965920914Z" level=info msg="StartContainer for \"99e5b63cd92ef4db96a8efabd87446fc93decfe87f35226e61f85170117662b2\" returns successfully" Jul 10 00:48:10.101541 kubelet[1436]: E0710 00:48:10.101489 1436 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6ghr7" podUID="36da2ccb-1a46-4dff-99a7-99fa203d27fa" Jul 10 00:48:10.551567 kubelet[1436]: E0710 00:48:10.551499 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:10.590715 systemd[1]: cri-containerd-99e5b63cd92ef4db96a8efabd87446fc93decfe87f35226e61f85170117662b2.scope: Deactivated successfully. Jul 10 00:48:10.596000 audit: BPF prog-id=74 op=UNLOAD Jul 10 00:48:10.605716 kubelet[1436]: I0710 00:48:10.605685 1436 kubelet_node_status.go:488] "Fast updating node status as it just became ready" Jul 10 00:48:10.608508 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-99e5b63cd92ef4db96a8efabd87446fc93decfe87f35226e61f85170117662b2-rootfs.mount: Deactivated successfully. Jul 10 00:48:11.017000 audit[1936]: NETFILTER_CFG table=filter:77 family=2 entries=11 op=nft_register_rule pid=1936 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:48:11.021978 kernel: kauditd_printk_skb: 266 callbacks suppressed Jul 10 00:48:11.022048 kernel: audit: type=1325 audit(1752108491.017:539): table=filter:77 family=2 entries=11 op=nft_register_rule pid=1936 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:48:11.022077 kernel: audit: type=1300 audit(1752108491.017:539): arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fffb797ff70 a2=0 a3=7fffb797ff5c items=0 ppid=1662 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:11.017000 audit[1936]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fffb797ff70 a2=0 a3=7fffb797ff5c items=0 ppid=1662 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:11.017000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:48:11.029755 kernel: audit: type=1327 audit(1752108491.017:539): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:48:11.035000 audit[1936]: NETFILTER_CFG table=nat:78 family=2 entries=29 op=nft_register_chain pid=1936 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:48:11.035000 audit[1936]: SYSCALL arch=c000003e syscall=46 success=yes exit=10116 a0=3 a1=7fffb797ff70 a2=0 a3=7fffb797ff5c items=0 ppid=1662 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:11.045415 kernel: audit: type=1325 audit(1752108491.035:540): table=nat:78 family=2 entries=29 op=nft_register_chain pid=1936 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:48:11.045463 kernel: audit: type=1300 audit(1752108491.035:540): arch=c000003e syscall=46 success=yes exit=10116 a0=3 a1=7fffb797ff70 a2=0 a3=7fffb797ff5c items=0 ppid=1662 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:11.045485 kernel: audit: type=1327 audit(1752108491.035:540): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:48:11.035000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:48:11.281852 env[1199]: time="2025-07-10T00:48:11.280591353Z" level=info msg="shim disconnected" id=99e5b63cd92ef4db96a8efabd87446fc93decfe87f35226e61f85170117662b2 Jul 10 00:48:11.281852 env[1199]: time="2025-07-10T00:48:11.280642633Z" level=warning msg="cleaning up after shim disconnected" id=99e5b63cd92ef4db96a8efabd87446fc93decfe87f35226e61f85170117662b2 namespace=k8s.io Jul 10 00:48:11.281852 env[1199]: time="2025-07-10T00:48:11.280652287Z" level=info msg="cleaning up dead shim" Jul 10 00:48:11.287025 env[1199]: time="2025-07-10T00:48:11.286981305Z" level=warning msg="cleanup warnings time=\"2025-07-10T00:48:11Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1937 runtime=io.containerd.runc.v2\n" Jul 10 00:48:11.552611 kubelet[1436]: E0710 00:48:11.552447 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:11.790000 audit[1950]: NETFILTER_CFG table=filter:79 family=2 entries=10 op=nft_register_rule pid=1950 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:48:11.790000 audit[1950]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fff1a0cdca0 a2=0 a3=7fff1a0cdc8c items=0 ppid=1662 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:11.797695 kernel: audit: type=1325 audit(1752108491.790:541): table=filter:79 family=2 entries=10 op=nft_register_rule pid=1950 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:48:11.797753 kernel: audit: type=1300 audit(1752108491.790:541): arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fff1a0cdca0 a2=0 a3=7fff1a0cdc8c items=0 ppid=1662 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:11.797786 kernel: audit: type=1327 audit(1752108491.790:541): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:48:11.790000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:48:11.803000 audit[1950]: NETFILTER_CFG table=nat:80 family=2 entries=32 op=nft_register_rule pid=1950 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:48:11.803000 audit[1950]: SYSCALL arch=c000003e syscall=46 success=yes exit=10116 a0=3 a1=7fff1a0cdca0 a2=0 a3=7fff1a0cdc8c items=0 ppid=1662 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:11.803000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:48:11.807423 kernel: audit: type=1325 audit(1752108491.803:542): table=nat:80 family=2 entries=32 op=nft_register_rule pid=1950 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:48:12.105805 systemd[1]: Created slice kubepods-besteffort-pod36da2ccb_1a46_4dff_99a7_99fa203d27fa.slice. Jul 10 00:48:12.107640 env[1199]: time="2025-07-10T00:48:12.107606136Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6ghr7,Uid:36da2ccb-1a46-4dff-99a7-99fa203d27fa,Namespace:calico-system,Attempt:0,}" Jul 10 00:48:12.130244 env[1199]: time="2025-07-10T00:48:12.130195573Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.2\"" Jul 10 00:48:12.161429 env[1199]: time="2025-07-10T00:48:12.161323137Z" level=error msg="Failed to destroy network for sandbox \"396246d785b8a0333ac9f7e4b6c96716c4db627750267225f3ef407423dd4382\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:48:12.161768 env[1199]: time="2025-07-10T00:48:12.161731723Z" level=error msg="encountered an error cleaning up failed sandbox \"396246d785b8a0333ac9f7e4b6c96716c4db627750267225f3ef407423dd4382\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:48:12.161838 env[1199]: time="2025-07-10T00:48:12.161783647Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6ghr7,Uid:36da2ccb-1a46-4dff-99a7-99fa203d27fa,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"396246d785b8a0333ac9f7e4b6c96716c4db627750267225f3ef407423dd4382\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:48:12.162103 kubelet[1436]: E0710 00:48:12.162067 1436 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"396246d785b8a0333ac9f7e4b6c96716c4db627750267225f3ef407423dd4382\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:48:12.162221 kubelet[1436]: E0710 00:48:12.162133 1436 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"396246d785b8a0333ac9f7e4b6c96716c4db627750267225f3ef407423dd4382\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-6ghr7" Jul 10 00:48:12.162221 kubelet[1436]: E0710 00:48:12.162159 1436 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"396246d785b8a0333ac9f7e4b6c96716c4db627750267225f3ef407423dd4382\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-6ghr7" Jul 10 00:48:12.162221 kubelet[1436]: E0710 00:48:12.162203 1436 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-6ghr7_calico-system(36da2ccb-1a46-4dff-99a7-99fa203d27fa)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-6ghr7_calico-system(36da2ccb-1a46-4dff-99a7-99fa203d27fa)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"396246d785b8a0333ac9f7e4b6c96716c4db627750267225f3ef407423dd4382\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-6ghr7" podUID="36da2ccb-1a46-4dff-99a7-99fa203d27fa" Jul 10 00:48:12.163016 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-396246d785b8a0333ac9f7e4b6c96716c4db627750267225f3ef407423dd4382-shm.mount: Deactivated successfully. Jul 10 00:48:12.553166 kubelet[1436]: E0710 00:48:12.553107 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:12.731299 systemd[1]: Created slice kubepods-besteffort-podc43cfb22_45f7_4a5e_8549_09bd6e72a011.slice. Jul 10 00:48:12.756155 kubelet[1436]: I0710 00:48:12.756103 1436 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fplc2\" (UniqueName: \"kubernetes.io/projected/c43cfb22-45f7-4a5e-8549-09bd6e72a011-kube-api-access-fplc2\") pod \"nginx-deployment-8587fbcb89-7z2fh\" (UID: \"c43cfb22-45f7-4a5e-8549-09bd6e72a011\") " pod="default/nginx-deployment-8587fbcb89-7z2fh" Jul 10 00:48:12.803000 audit[1986]: NETFILTER_CFG table=filter:81 family=2 entries=10 op=nft_register_rule pid=1986 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:48:12.803000 audit[1986]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffff6109650 a2=0 a3=7ffff610963c items=0 ppid=1662 pid=1986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:12.803000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:48:12.808000 audit[1986]: NETFILTER_CFG table=nat:82 family=2 entries=36 op=nft_register_chain pid=1986 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:48:12.808000 audit[1986]: SYSCALL arch=c000003e syscall=46 success=yes exit=12004 a0=3 a1=7ffff6109650 a2=0 a3=7ffff610963c items=0 ppid=1662 pid=1986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:12.808000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:48:12.844004 systemd[1]: Created slice kubepods-besteffort-podd227c798_038b_4a53_9200_e2ed59b1bceb.slice. Jul 10 00:48:12.856752 kubelet[1436]: I0710 00:48:12.856724 1436 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/d227c798-038b-4a53-9200-e2ed59b1bceb-calico-apiserver-certs\") pod \"calico-apiserver-67c56776df-gs6gv\" (UID: \"d227c798-038b-4a53-9200-e2ed59b1bceb\") " pod="calico-apiserver/calico-apiserver-67c56776df-gs6gv" Jul 10 00:48:12.856856 kubelet[1436]: I0710 00:48:12.856767 1436 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zhzkb\" (UniqueName: \"kubernetes.io/projected/d227c798-038b-4a53-9200-e2ed59b1bceb-kube-api-access-zhzkb\") pod \"calico-apiserver-67c56776df-gs6gv\" (UID: \"d227c798-038b-4a53-9200-e2ed59b1bceb\") " pod="calico-apiserver/calico-apiserver-67c56776df-gs6gv" Jul 10 00:48:13.034163 env[1199]: time="2025-07-10T00:48:13.034112955Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-7z2fh,Uid:c43cfb22-45f7-4a5e-8549-09bd6e72a011,Namespace:default,Attempt:0,}" Jul 10 00:48:13.085725 env[1199]: time="2025-07-10T00:48:13.085566860Z" level=error msg="Failed to destroy network for sandbox \"1af1e807611e3888c4d7f8f340aba1cdc486ace21fa9f6f200ecb1b9038d3328\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:48:13.086001 env[1199]: time="2025-07-10T00:48:13.085961980Z" level=error msg="encountered an error cleaning up failed sandbox \"1af1e807611e3888c4d7f8f340aba1cdc486ace21fa9f6f200ecb1b9038d3328\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:48:13.086075 env[1199]: time="2025-07-10T00:48:13.086025249Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-7z2fh,Uid:c43cfb22-45f7-4a5e-8549-09bd6e72a011,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1af1e807611e3888c4d7f8f340aba1cdc486ace21fa9f6f200ecb1b9038d3328\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:48:13.086358 kubelet[1436]: E0710 00:48:13.086298 1436 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1af1e807611e3888c4d7f8f340aba1cdc486ace21fa9f6f200ecb1b9038d3328\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:48:13.086447 kubelet[1436]: E0710 00:48:13.086391 1436 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1af1e807611e3888c4d7f8f340aba1cdc486ace21fa9f6f200ecb1b9038d3328\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-7z2fh" Jul 10 00:48:13.086447 kubelet[1436]: E0710 00:48:13.086434 1436 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1af1e807611e3888c4d7f8f340aba1cdc486ace21fa9f6f200ecb1b9038d3328\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-7z2fh" Jul 10 00:48:13.086527 kubelet[1436]: E0710 00:48:13.086492 1436 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-8587fbcb89-7z2fh_default(c43cfb22-45f7-4a5e-8549-09bd6e72a011)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-8587fbcb89-7z2fh_default(c43cfb22-45f7-4a5e-8549-09bd6e72a011)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1af1e807611e3888c4d7f8f340aba1cdc486ace21fa9f6f200ecb1b9038d3328\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-7z2fh" podUID="c43cfb22-45f7-4a5e-8549-09bd6e72a011" Jul 10 00:48:13.131942 kubelet[1436]: I0710 00:48:13.131921 1436 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1af1e807611e3888c4d7f8f340aba1cdc486ace21fa9f6f200ecb1b9038d3328" Jul 10 00:48:13.132456 env[1199]: time="2025-07-10T00:48:13.132429079Z" level=info msg="StopPodSandbox for \"1af1e807611e3888c4d7f8f340aba1cdc486ace21fa9f6f200ecb1b9038d3328\"" Jul 10 00:48:13.133297 kubelet[1436]: I0710 00:48:13.133275 1436 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="396246d785b8a0333ac9f7e4b6c96716c4db627750267225f3ef407423dd4382" Jul 10 00:48:13.133841 env[1199]: time="2025-07-10T00:48:13.133816101Z" level=info msg="StopPodSandbox for \"396246d785b8a0333ac9f7e4b6c96716c4db627750267225f3ef407423dd4382\"" Jul 10 00:48:13.146238 env[1199]: time="2025-07-10T00:48:13.146191963Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-67c56776df-gs6gv,Uid:d227c798-038b-4a53-9200-e2ed59b1bceb,Namespace:calico-apiserver,Attempt:0,}" Jul 10 00:48:13.159279 env[1199]: time="2025-07-10T00:48:13.159215869Z" level=error msg="StopPodSandbox for \"396246d785b8a0333ac9f7e4b6c96716c4db627750267225f3ef407423dd4382\" failed" error="failed to destroy network for sandbox \"396246d785b8a0333ac9f7e4b6c96716c4db627750267225f3ef407423dd4382\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:48:13.159460 kubelet[1436]: E0710 00:48:13.159434 1436 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"396246d785b8a0333ac9f7e4b6c96716c4db627750267225f3ef407423dd4382\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="396246d785b8a0333ac9f7e4b6c96716c4db627750267225f3ef407423dd4382" Jul 10 00:48:13.159546 kubelet[1436]: E0710 00:48:13.159483 1436 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"396246d785b8a0333ac9f7e4b6c96716c4db627750267225f3ef407423dd4382"} Jul 10 00:48:13.159546 kubelet[1436]: E0710 00:48:13.159536 1436 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"36da2ccb-1a46-4dff-99a7-99fa203d27fa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"396246d785b8a0333ac9f7e4b6c96716c4db627750267225f3ef407423dd4382\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 10 00:48:13.159674 kubelet[1436]: E0710 00:48:13.159557 1436 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"36da2ccb-1a46-4dff-99a7-99fa203d27fa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"396246d785b8a0333ac9f7e4b6c96716c4db627750267225f3ef407423dd4382\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-6ghr7" podUID="36da2ccb-1a46-4dff-99a7-99fa203d27fa" Jul 10 00:48:13.165685 env[1199]: time="2025-07-10T00:48:13.165630475Z" level=error msg="StopPodSandbox for \"1af1e807611e3888c4d7f8f340aba1cdc486ace21fa9f6f200ecb1b9038d3328\" failed" error="failed to destroy network for sandbox \"1af1e807611e3888c4d7f8f340aba1cdc486ace21fa9f6f200ecb1b9038d3328\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:48:13.165824 kubelet[1436]: E0710 00:48:13.165800 1436 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1af1e807611e3888c4d7f8f340aba1cdc486ace21fa9f6f200ecb1b9038d3328\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1af1e807611e3888c4d7f8f340aba1cdc486ace21fa9f6f200ecb1b9038d3328" Jul 10 00:48:13.165917 kubelet[1436]: E0710 00:48:13.165827 1436 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1af1e807611e3888c4d7f8f340aba1cdc486ace21fa9f6f200ecb1b9038d3328"} Jul 10 00:48:13.165917 kubelet[1436]: E0710 00:48:13.165849 1436 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c43cfb22-45f7-4a5e-8549-09bd6e72a011\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1af1e807611e3888c4d7f8f340aba1cdc486ace21fa9f6f200ecb1b9038d3328\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 10 00:48:13.165917 kubelet[1436]: E0710 00:48:13.165865 1436 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c43cfb22-45f7-4a5e-8549-09bd6e72a011\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1af1e807611e3888c4d7f8f340aba1cdc486ace21fa9f6f200ecb1b9038d3328\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-7z2fh" podUID="c43cfb22-45f7-4a5e-8549-09bd6e72a011" Jul 10 00:48:13.207925 env[1199]: time="2025-07-10T00:48:13.207849823Z" level=error msg="Failed to destroy network for sandbox \"c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:48:13.208299 env[1199]: time="2025-07-10T00:48:13.208264200Z" level=error msg="encountered an error cleaning up failed sandbox \"c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:48:13.208344 env[1199]: time="2025-07-10T00:48:13.208315755Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-67c56776df-gs6gv,Uid:d227c798-038b-4a53-9200-e2ed59b1bceb,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:48:13.208616 kubelet[1436]: E0710 00:48:13.208579 1436 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:48:13.208691 kubelet[1436]: E0710 00:48:13.208652 1436 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-67c56776df-gs6gv" Jul 10 00:48:13.208691 kubelet[1436]: E0710 00:48:13.208675 1436 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-67c56776df-gs6gv" Jul 10 00:48:13.208745 kubelet[1436]: E0710 00:48:13.208724 1436 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-67c56776df-gs6gv_calico-apiserver(d227c798-038b-4a53-9200-e2ed59b1bceb)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-67c56776df-gs6gv_calico-apiserver(d227c798-038b-4a53-9200-e2ed59b1bceb)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-67c56776df-gs6gv" podUID="d227c798-038b-4a53-9200-e2ed59b1bceb" Jul 10 00:48:13.209527 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4-shm.mount: Deactivated successfully. Jul 10 00:48:13.284000 audit[2093]: NETFILTER_CFG table=filter:83 family=2 entries=10 op=nft_register_rule pid=2093 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:48:13.284000 audit[2093]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffede4afdb0 a2=0 a3=7ffede4afd9c items=0 ppid=1662 pid=2093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:13.284000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:48:13.289000 audit[2093]: NETFILTER_CFG table=nat:84 family=2 entries=38 op=nft_register_rule pid=2093 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:48:13.289000 audit[2093]: SYSCALL arch=c000003e syscall=46 success=yes exit=12004 a0=3 a1=7ffede4afdb0 a2=0 a3=7ffede4afd9c items=0 ppid=1662 pid=2093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:13.289000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:48:13.553469 kubelet[1436]: E0710 00:48:13.553410 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:14.136184 kubelet[1436]: I0710 00:48:14.136134 1436 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4" Jul 10 00:48:14.136687 env[1199]: time="2025-07-10T00:48:14.136651570Z" level=info msg="StopPodSandbox for \"c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4\"" Jul 10 00:48:14.156058 env[1199]: time="2025-07-10T00:48:14.155998115Z" level=error msg="StopPodSandbox for \"c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4\" failed" error="failed to destroy network for sandbox \"c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 10 00:48:14.156286 kubelet[1436]: E0710 00:48:14.156233 1436 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4" Jul 10 00:48:14.156334 kubelet[1436]: E0710 00:48:14.156296 1436 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4"} Jul 10 00:48:14.156379 kubelet[1436]: E0710 00:48:14.156336 1436 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d227c798-038b-4a53-9200-e2ed59b1bceb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 10 00:48:14.156379 kubelet[1436]: E0710 00:48:14.156362 1436 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d227c798-038b-4a53-9200-e2ed59b1bceb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-67c56776df-gs6gv" podUID="d227c798-038b-4a53-9200-e2ed59b1bceb" Jul 10 00:48:14.554245 kubelet[1436]: E0710 00:48:14.554198 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:15.555311 kubelet[1436]: E0710 00:48:15.555259 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:16.555481 kubelet[1436]: E0710 00:48:16.555412 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:16.822000 audit[2114]: NETFILTER_CFG table=filter:85 family=2 entries=10 op=nft_register_rule pid=2114 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:48:16.825391 kernel: kauditd_printk_skb: 14 callbacks suppressed Jul 10 00:48:16.825570 kernel: audit: type=1325 audit(1752108496.822:547): table=filter:85 family=2 entries=10 op=nft_register_rule pid=2114 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:48:16.822000 audit[2114]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffcb05abfb0 a2=0 a3=7ffcb05abf9c items=0 ppid=1662 pid=2114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:16.833245 kernel: audit: type=1300 audit(1752108496.822:547): arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffcb05abfb0 a2=0 a3=7ffcb05abf9c items=0 ppid=1662 pid=2114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:16.833320 kernel: audit: type=1327 audit(1752108496.822:547): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:48:16.822000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:48:16.841000 audit[2114]: NETFILTER_CFG table=nat:86 family=2 entries=24 op=nft_register_rule pid=2114 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:48:16.854735 kernel: audit: type=1325 audit(1752108496.841:548): table=nat:86 family=2 entries=24 op=nft_register_rule pid=2114 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:48:16.854834 kernel: audit: type=1300 audit(1752108496.841:548): arch=c000003e syscall=46 success=yes exit=7308 a0=3 a1=7ffcb05abfb0 a2=0 a3=7ffcb05abf9c items=0 ppid=1662 pid=2114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:16.854866 kernel: audit: type=1327 audit(1752108496.841:548): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:48:16.841000 audit[2114]: SYSCALL arch=c000003e syscall=46 success=yes exit=7308 a0=3 a1=7ffcb05abfb0 a2=0 a3=7ffcb05abf9c items=0 ppid=1662 pid=2114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:16.841000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:48:17.556287 kubelet[1436]: E0710 00:48:17.556213 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:18.531907 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount536902447.mount: Deactivated successfully. Jul 10 00:48:18.557009 kubelet[1436]: E0710 00:48:18.556931 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:19.252499 env[1199]: time="2025-07-10T00:48:19.252376018Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:48:19.254590 env[1199]: time="2025-07-10T00:48:19.254552946Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cc52550d767f73458fee2ee68db9db5de30d175e8fa4569ebdb43610127b6d20,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:48:19.256269 env[1199]: time="2025-07-10T00:48:19.256217655Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:48:19.257671 env[1199]: time="2025-07-10T00:48:19.257640204Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e94d49349cc361ef2216d27dda4a097278984d778279f66e79b0616c827c6760,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:48:19.258169 env[1199]: time="2025-07-10T00:48:19.258141956Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.2\" returns image reference \"sha256:cc52550d767f73458fee2ee68db9db5de30d175e8fa4569ebdb43610127b6d20\"" Jul 10 00:48:19.267869 env[1199]: time="2025-07-10T00:48:19.267824375Z" level=info msg="CreateContainer within sandbox \"55c945b55bc4743f09b888fe507dcdc8e79c1079a2ec81130d213c31851e1206\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Jul 10 00:48:19.284331 env[1199]: time="2025-07-10T00:48:19.284281698Z" level=info msg="CreateContainer within sandbox \"55c945b55bc4743f09b888fe507dcdc8e79c1079a2ec81130d213c31851e1206\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"e8cffba2b27907d26d05b0e8d89092af226dcd471e0334a070e4f8600c8dde0b\"" Jul 10 00:48:19.284824 env[1199]: time="2025-07-10T00:48:19.284789572Z" level=info msg="StartContainer for \"e8cffba2b27907d26d05b0e8d89092af226dcd471e0334a070e4f8600c8dde0b\"" Jul 10 00:48:19.300511 systemd[1]: Started cri-containerd-e8cffba2b27907d26d05b0e8d89092af226dcd471e0334a070e4f8600c8dde0b.scope. Jul 10 00:48:19.314000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:19.314000 audit[2125]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7fcba1ad6e78 items=0 ppid=1515 pid=2125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:19.324104 kernel: audit: type=1400 audit(1752108499.314:549): avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:19.324177 kernel: audit: type=1300 audit(1752108499.314:549): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7fcba1ad6e78 items=0 ppid=1515 pid=2125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:19.324217 kernel: audit: type=1327 audit(1752108499.314:549): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538636666626132623237393037643236643035623065386438393039 Jul 10 00:48:19.314000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538636666626132623237393037643236643035623065386438393039 Jul 10 00:48:19.328258 kernel: audit: type=1400 audit(1752108499.314:550): avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:19.314000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:19.314000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:19.314000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:19.314000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:19.314000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:19.314000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:19.314000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:19.314000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:19.314000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:19.314000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:19.314000 audit: BPF prog-id=75 op=LOAD Jul 10 00:48:19.314000 audit[2125]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001499d8 a2=78 a3=c00026fc58 items=0 ppid=1515 pid=2125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:19.314000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538636666626132623237393037643236643035623065386438393039 Jul 10 00:48:19.323000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:19.323000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:19.323000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:19.323000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:19.323000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:19.323000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:19.323000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:19.323000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:19.323000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:19.323000 audit: BPF prog-id=76 op=LOAD Jul 10 00:48:19.323000 audit[2125]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000149770 a2=78 a3=c00026fca8 items=0 ppid=1515 pid=2125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:19.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538636666626132623237393037643236643035623065386438393039 Jul 10 00:48:19.326000 audit: BPF prog-id=76 op=UNLOAD Jul 10 00:48:19.326000 audit: BPF prog-id=75 op=UNLOAD Jul 10 00:48:19.326000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:19.326000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:19.326000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:19.326000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:19.326000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:19.326000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:19.326000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:19.326000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:19.326000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:19.326000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:19.326000 audit: BPF prog-id=77 op=LOAD Jul 10 00:48:19.326000 audit[2125]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000149c30 a2=78 a3=c00026fd38 items=0 ppid=1515 pid=2125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:19.326000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538636666626132623237393037643236643035623065386438393039 Jul 10 00:48:19.343211 env[1199]: time="2025-07-10T00:48:19.343164029Z" level=info msg="StartContainer for \"e8cffba2b27907d26d05b0e8d89092af226dcd471e0334a070e4f8600c8dde0b\" returns successfully" Jul 10 00:48:19.419239 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Jul 10 00:48:19.419366 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Jul 10 00:48:19.544595 kubelet[1436]: E0710 00:48:19.544468 1436 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:19.557987 kubelet[1436]: E0710 00:48:19.557925 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:20.163848 systemd[1]: run-containerd-runc-k8s.io-e8cffba2b27907d26d05b0e8d89092af226dcd471e0334a070e4f8600c8dde0b-runc.cDKSAJ.mount: Deactivated successfully. Jul 10 00:48:20.558117 kubelet[1436]: E0710 00:48:20.558064 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:20.605000 audit[2248]: AVC avc: denied { write } for pid=2248 comm="tee" name="fd" dev="proc" ino=21526 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 10 00:48:20.605000 audit[2248]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff361c57f5 a2=241 a3=1b6 items=1 ppid=2217 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:20.605000 audit: CWD cwd="/etc/service/enabled/bird/log" Jul 10 00:48:20.605000 audit: PATH item=0 name="/dev/fd/63" inode=20024 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:48:20.605000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 10 00:48:20.614000 audit[2265]: AVC avc: denied { write } for pid=2265 comm="tee" name="fd" dev="proc" ino=19264 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 10 00:48:20.614000 audit[2265]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff0a2297e4 a2=241 a3=1b6 items=1 ppid=2216 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:20.614000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Jul 10 00:48:20.614000 audit: PATH item=0 name="/dev/fd/63" inode=19261 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:48:20.614000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 10 00:48:20.616000 audit[2271]: AVC avc: denied { write } for pid=2271 comm="tee" name="fd" dev="proc" ino=21538 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 10 00:48:20.616000 audit[2271]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc9ce937f4 a2=241 a3=1b6 items=1 ppid=2221 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:20.616000 audit: CWD cwd="/etc/service/enabled/bird6/log" Jul 10 00:48:20.616000 audit: PATH item=0 name="/dev/fd/63" inode=21529 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:48:20.616000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 10 00:48:20.619000 audit[2268]: AVC avc: denied { write } for pid=2268 comm="tee" name="fd" dev="proc" ino=20037 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 10 00:48:20.619000 audit[2268]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffda3ce7e5 a2=241 a3=1b6 items=1 ppid=2226 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:20.619000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Jul 10 00:48:20.619000 audit: PATH item=0 name="/dev/fd/63" inode=20031 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:48:20.619000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 10 00:48:20.620000 audit[2283]: AVC avc: denied { write } for pid=2283 comm="tee" name="fd" dev="proc" ino=21542 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 10 00:48:20.620000 audit[2283]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffb49be7f4 a2=241 a3=1b6 items=1 ppid=2232 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:20.620000 audit: CWD cwd="/etc/service/enabled/felix/log" Jul 10 00:48:20.620000 audit: PATH item=0 name="/dev/fd/63" inode=21532 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:48:20.620000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 10 00:48:20.622000 audit[2285]: AVC avc: denied { write } for pid=2285 comm="tee" name="fd" dev="proc" ino=21546 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 10 00:48:20.622000 audit[2285]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffddd94c7f4 a2=241 a3=1b6 items=1 ppid=2215 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:20.622000 audit: CWD cwd="/etc/service/enabled/confd/log" Jul 10 00:48:20.622000 audit: PATH item=0 name="/dev/fd/63" inode=21535 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:48:20.622000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 10 00:48:20.666000 audit[2299]: AVC avc: denied { write } for pid=2299 comm="tee" name="fd" dev="proc" ino=21550 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 10 00:48:20.666000 audit[2299]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd6a1de7f6 a2=241 a3=1b6 items=1 ppid=2225 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:20.666000 audit: CWD cwd="/etc/service/enabled/cni/log" Jul 10 00:48:20.666000 audit: PATH item=0 name="/dev/fd/63" inode=20990 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:48:20.666000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 10 00:48:20.745000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.745000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.745000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.745000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.745000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.745000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.745000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.745000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.745000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.745000 audit: BPF prog-id=78 op=LOAD Jul 10 00:48:20.745000 audit[2330]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe66714430 a2=98 a3=1fffffffffffffff items=0 ppid=2233 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:20.745000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 10 00:48:20.746000 audit: BPF prog-id=78 op=UNLOAD Jul 10 00:48:20.746000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.746000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.746000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.746000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.746000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.746000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.746000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.746000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.746000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.746000 audit: BPF prog-id=79 op=LOAD Jul 10 00:48:20.746000 audit[2330]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe66714310 a2=94 a3=3 items=0 ppid=2233 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:20.746000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 10 00:48:20.746000 audit: BPF prog-id=79 op=UNLOAD Jul 10 00:48:20.746000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.746000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.746000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.746000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.746000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.746000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.746000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.746000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.746000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.746000 audit: BPF prog-id=80 op=LOAD Jul 10 00:48:20.746000 audit[2330]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe66714350 a2=94 a3=7ffe66714530 items=0 ppid=2233 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:20.746000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 10 00:48:20.746000 audit: BPF prog-id=80 op=UNLOAD Jul 10 00:48:20.746000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.746000 audit[2330]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffe66714420 a2=50 a3=a000000085 items=0 ppid=2233 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:20.746000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Jul 10 00:48:20.747000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.747000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.747000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.747000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.747000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.747000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.747000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.747000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.747000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.747000 audit: BPF prog-id=81 op=LOAD Jul 10 00:48:20.747000 audit[2331]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffeb98b08d0 a2=98 a3=3 items=0 ppid=2233 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:20.747000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:48:20.747000 audit: BPF prog-id=81 op=UNLOAD Jul 10 00:48:20.747000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.747000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.747000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.747000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.747000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.747000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.747000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.747000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.747000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.747000 audit: BPF prog-id=82 op=LOAD Jul 10 00:48:20.747000 audit[2331]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffeb98b06c0 a2=94 a3=54428f items=0 ppid=2233 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:20.747000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:48:20.747000 audit: BPF prog-id=82 op=UNLOAD Jul 10 00:48:20.747000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.747000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.747000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.747000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.747000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.747000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.747000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.747000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.747000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.747000 audit: BPF prog-id=83 op=LOAD Jul 10 00:48:20.747000 audit[2331]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffeb98b06f0 a2=94 a3=2 items=0 ppid=2233 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:20.747000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:48:20.747000 audit: BPF prog-id=83 op=UNLOAD Jul 10 00:48:20.857000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.857000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.857000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.857000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.857000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.857000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.857000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.857000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.857000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.857000 audit: BPF prog-id=84 op=LOAD Jul 10 00:48:20.857000 audit[2331]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffeb98b05b0 a2=94 a3=1 items=0 ppid=2233 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:20.857000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:48:20.857000 audit: BPF prog-id=84 op=UNLOAD Jul 10 00:48:20.857000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.857000 audit[2331]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffeb98b0680 a2=50 a3=7ffeb98b0760 items=0 ppid=2233 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:20.857000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:48:20.865000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.865000 audit[2331]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb98b05c0 a2=28 a3=0 items=0 ppid=2233 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:20.865000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:48:20.865000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.865000 audit[2331]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb98b05f0 a2=28 a3=0 items=0 ppid=2233 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:20.865000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:48:20.865000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.865000 audit[2331]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb98b0500 a2=28 a3=0 items=0 ppid=2233 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:20.865000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:48:20.865000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.865000 audit[2331]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb98b0610 a2=28 a3=0 items=0 ppid=2233 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:20.865000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:48:20.865000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.865000 audit[2331]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb98b05f0 a2=28 a3=0 items=0 ppid=2233 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:20.865000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:48:20.865000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.865000 audit[2331]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb98b05e0 a2=28 a3=0 items=0 ppid=2233 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:20.865000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:48:20.865000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.865000 audit[2331]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb98b0610 a2=28 a3=0 items=0 ppid=2233 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:20.865000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:48:20.865000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.865000 audit[2331]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb98b05f0 a2=28 a3=0 items=0 ppid=2233 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:20.865000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:48:20.865000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.865000 audit[2331]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb98b0610 a2=28 a3=0 items=0 ppid=2233 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:20.865000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:48:20.865000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.865000 audit[2331]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb98b05e0 a2=28 a3=0 items=0 ppid=2233 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:20.865000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:48:20.865000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.865000 audit[2331]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb98b0650 a2=28 a3=0 items=0 ppid=2233 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:20.865000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:48:20.866000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.866000 audit[2331]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffeb98b0400 a2=50 a3=1 items=0 ppid=2233 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:20.866000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:48:20.866000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.866000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.866000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.866000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.866000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.866000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.866000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.866000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.866000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.866000 audit: BPF prog-id=85 op=LOAD Jul 10 00:48:20.866000 audit[2331]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffeb98b0400 a2=94 a3=5 items=0 ppid=2233 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:20.866000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:48:20.866000 audit: BPF prog-id=85 op=UNLOAD Jul 10 00:48:20.866000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.866000 audit[2331]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffeb98b04b0 a2=50 a3=1 items=0 ppid=2233 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:20.866000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:48:20.866000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.866000 audit[2331]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffeb98b05d0 a2=4 a3=38 items=0 ppid=2233 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:20.866000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:48:20.866000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.866000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.866000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.866000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.866000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.866000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.866000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.866000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.866000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.866000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.866000 audit[2331]: AVC avc: denied { confidentiality } for pid=2331 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:20.866000 audit[2331]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffeb98b0620 a2=94 a3=6 items=0 ppid=2233 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:20.866000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:48:20.866000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.866000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.866000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.866000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.866000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.866000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.866000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.866000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.866000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.866000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.866000 audit[2331]: AVC avc: denied { confidentiality } for pid=2331 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:20.866000 audit[2331]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffeb98afdd0 a2=94 a3=88 items=0 ppid=2233 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:20.866000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:48:20.866000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.866000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.866000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.866000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.866000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.866000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.866000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.866000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.866000 audit[2331]: AVC avc: denied { perfmon } for pid=2331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.866000 audit[2331]: AVC avc: denied { bpf } for pid=2331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.866000 audit[2331]: AVC avc: denied { confidentiality } for pid=2331 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:20.866000 audit[2331]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffeb98afdd0 a2=94 a3=88 items=0 ppid=2233 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:20.866000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Jul 10 00:48:20.873000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.873000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.873000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.873000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.873000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.873000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.873000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.873000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.873000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.873000 audit: BPF prog-id=86 op=LOAD Jul 10 00:48:20.873000 audit[2339]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffccfc12d80 a2=98 a3=1999999999999999 items=0 ppid=2233 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:20.873000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Jul 10 00:48:20.873000 audit: BPF prog-id=86 op=UNLOAD Jul 10 00:48:20.873000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.873000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.873000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.873000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.873000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.873000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.873000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.873000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.873000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.873000 audit: BPF prog-id=87 op=LOAD Jul 10 00:48:20.873000 audit[2339]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffccfc12c60 a2=94 a3=ffff items=0 ppid=2233 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:20.873000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Jul 10 00:48:20.873000 audit: BPF prog-id=87 op=UNLOAD Jul 10 00:48:20.873000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.873000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.873000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.873000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.873000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.873000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.873000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.873000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.873000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:20.873000 audit: BPF prog-id=88 op=LOAD Jul 10 00:48:20.873000 audit[2339]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffccfc12ca0 a2=94 a3=7ffccfc12e80 items=0 ppid=2233 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:20.873000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Jul 10 00:48:20.874000 audit: BPF prog-id=88 op=UNLOAD Jul 10 00:48:21.010853 systemd-networkd[1025]: vxlan.calico: Link UP Jul 10 00:48:21.010869 systemd-networkd[1025]: vxlan.calico: Gained carrier Jul 10 00:48:21.033000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.033000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.033000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.033000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.033000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.033000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.033000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.033000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.033000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.033000 audit: BPF prog-id=89 op=LOAD Jul 10 00:48:21.033000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc2b2e4450 a2=98 a3=0 items=0 ppid=2233 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:21.033000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:48:21.033000 audit: BPF prog-id=89 op=UNLOAD Jul 10 00:48:21.033000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.033000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.033000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.033000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.033000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.033000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.033000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.033000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.033000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.033000 audit: BPF prog-id=90 op=LOAD Jul 10 00:48:21.033000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc2b2e4260 a2=94 a3=54428f items=0 ppid=2233 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:21.033000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:48:21.033000 audit: BPF prog-id=90 op=UNLOAD Jul 10 00:48:21.033000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.033000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.033000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.033000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.033000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.033000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.033000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.033000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.033000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.033000 audit: BPF prog-id=91 op=LOAD Jul 10 00:48:21.033000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc2b2e4290 a2=94 a3=2 items=0 ppid=2233 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:21.033000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:48:21.033000 audit: BPF prog-id=91 op=UNLOAD Jul 10 00:48:21.033000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.033000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc2b2e4160 a2=28 a3=0 items=0 ppid=2233 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:21.033000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:48:21.033000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.033000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc2b2e4190 a2=28 a3=0 items=0 ppid=2233 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:21.033000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:48:21.033000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.033000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc2b2e40a0 a2=28 a3=0 items=0 ppid=2233 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:21.033000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:48:21.033000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.033000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc2b2e41b0 a2=28 a3=0 items=0 ppid=2233 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:21.033000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:48:21.033000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.033000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc2b2e4190 a2=28 a3=0 items=0 ppid=2233 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:21.033000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:48:21.033000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.033000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc2b2e4180 a2=28 a3=0 items=0 ppid=2233 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:21.033000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:48:21.033000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.033000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc2b2e41b0 a2=28 a3=0 items=0 ppid=2233 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:21.033000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:48:21.034000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.034000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc2b2e4190 a2=28 a3=0 items=0 ppid=2233 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:21.034000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:48:21.034000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.034000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc2b2e41b0 a2=28 a3=0 items=0 ppid=2233 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:21.034000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:48:21.034000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.034000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc2b2e4180 a2=28 a3=0 items=0 ppid=2233 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:21.034000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:48:21.034000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.034000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc2b2e41f0 a2=28 a3=0 items=0 ppid=2233 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:21.034000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:48:21.034000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.034000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.034000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.034000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.034000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.034000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.034000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.034000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.034000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.034000 audit: BPF prog-id=92 op=LOAD Jul 10 00:48:21.034000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc2b2e4060 a2=94 a3=0 items=0 ppid=2233 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:21.034000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:48:21.034000 audit: BPF prog-id=92 op=UNLOAD Jul 10 00:48:21.034000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.034000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffc2b2e4050 a2=50 a3=2800 items=0 ppid=2233 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:21.034000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:48:21.035000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.035000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffc2b2e4050 a2=50 a3=2800 items=0 ppid=2233 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:21.035000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:48:21.035000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.035000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.035000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.035000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.035000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.035000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.035000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.035000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.035000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.035000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.035000 audit: BPF prog-id=93 op=LOAD Jul 10 00:48:21.035000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc2b2e3870 a2=94 a3=2 items=0 ppid=2233 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:21.035000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:48:21.035000 audit: BPF prog-id=93 op=UNLOAD Jul 10 00:48:21.035000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.035000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.035000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.035000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.035000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.035000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.035000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.035000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.035000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.035000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.035000 audit: BPF prog-id=94 op=LOAD Jul 10 00:48:21.035000 audit[2365]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc2b2e3970 a2=94 a3=30 items=0 ppid=2233 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:21.035000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 10 00:48:21.037000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.037000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.037000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.037000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.037000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.037000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.037000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.037000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.037000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.037000 audit: BPF prog-id=95 op=LOAD Jul 10 00:48:21.037000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc9cfe3b20 a2=98 a3=0 items=0 ppid=2233 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:21.037000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:48:21.038000 audit: BPF prog-id=95 op=UNLOAD Jul 10 00:48:21.038000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.038000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.038000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.038000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.038000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.038000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.038000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.038000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.038000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.038000 audit: BPF prog-id=96 op=LOAD Jul 10 00:48:21.038000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc9cfe3910 a2=94 a3=54428f items=0 ppid=2233 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:21.038000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:48:21.038000 audit: BPF prog-id=96 op=UNLOAD Jul 10 00:48:21.038000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.038000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.038000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.038000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.038000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.038000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.038000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.038000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.038000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.038000 audit: BPF prog-id=97 op=LOAD Jul 10 00:48:21.038000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc9cfe3940 a2=94 a3=2 items=0 ppid=2233 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:21.038000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:48:21.038000 audit: BPF prog-id=97 op=UNLOAD Jul 10 00:48:21.142000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.142000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.142000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.142000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.142000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.142000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.142000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.142000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.142000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.142000 audit: BPF prog-id=98 op=LOAD Jul 10 00:48:21.142000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc9cfe3800 a2=94 a3=1 items=0 ppid=2233 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:21.142000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:48:21.142000 audit: BPF prog-id=98 op=UNLOAD Jul 10 00:48:21.142000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.142000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc9cfe38d0 a2=50 a3=7ffc9cfe39b0 items=0 ppid=2233 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:21.142000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:48:21.150000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.150000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc9cfe3810 a2=28 a3=0 items=0 ppid=2233 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:21.150000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:48:21.150000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.150000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc9cfe3840 a2=28 a3=0 items=0 ppid=2233 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:21.150000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:48:21.150000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.150000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc9cfe3750 a2=28 a3=0 items=0 ppid=2233 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:21.150000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:48:21.150000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.150000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc9cfe3860 a2=28 a3=0 items=0 ppid=2233 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:21.150000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:48:21.150000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.150000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc9cfe3840 a2=28 a3=0 items=0 ppid=2233 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:21.150000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:48:21.150000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.150000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc9cfe3830 a2=28 a3=0 items=0 ppid=2233 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:21.150000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:48:21.150000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.150000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc9cfe3860 a2=28 a3=0 items=0 ppid=2233 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:21.150000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:48:21.150000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.150000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc9cfe3840 a2=28 a3=0 items=0 ppid=2233 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:21.150000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:48:21.150000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.150000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc9cfe3860 a2=28 a3=0 items=0 ppid=2233 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:21.150000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:48:21.150000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.150000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc9cfe3830 a2=28 a3=0 items=0 ppid=2233 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:21.150000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:48:21.150000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.150000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc9cfe38a0 a2=28 a3=0 items=0 ppid=2233 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:21.150000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:48:21.150000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.150000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc9cfe3650 a2=50 a3=1 items=0 ppid=2233 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:21.150000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:48:21.150000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.150000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.150000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.150000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.150000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.150000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.150000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.150000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.150000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.150000 audit: BPF prog-id=99 op=LOAD Jul 10 00:48:21.150000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc9cfe3650 a2=94 a3=5 items=0 ppid=2233 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:21.150000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:48:21.150000 audit: BPF prog-id=99 op=UNLOAD Jul 10 00:48:21.150000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.150000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc9cfe3700 a2=50 a3=1 items=0 ppid=2233 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:21.150000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:48:21.150000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.150000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc9cfe3820 a2=4 a3=38 items=0 ppid=2233 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:21.150000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:48:21.150000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.150000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.150000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.150000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.150000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.150000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.150000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.150000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.150000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.150000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.150000 audit[2368]: AVC avc: denied { confidentiality } for pid=2368 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:21.150000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc9cfe3870 a2=94 a3=6 items=0 ppid=2233 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:21.150000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:48:21.151000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.151000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.151000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.151000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.151000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.151000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.151000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.151000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.151000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.151000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.151000 audit[2368]: AVC avc: denied { confidentiality } for pid=2368 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:21.151000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc9cfe3020 a2=94 a3=88 items=0 ppid=2233 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:21.151000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:48:21.151000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.151000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.151000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.151000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.151000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.151000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.151000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.151000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.151000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.151000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.151000 audit[2368]: AVC avc: denied { confidentiality } for pid=2368 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:21.151000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc9cfe3020 a2=94 a3=88 items=0 ppid=2233 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:21.151000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:48:21.151000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.151000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc9cfe4a50 a2=10 a3=208 items=0 ppid=2233 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:21.151000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:48:21.151000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.151000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc9cfe48f0 a2=10 a3=3 items=0 ppid=2233 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:21.151000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:48:21.151000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.151000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc9cfe4890 a2=10 a3=3 items=0 ppid=2233 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:21.151000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:48:21.151000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:21.151000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc9cfe4890 a2=10 a3=7 items=0 ppid=2233 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:21.151000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 10 00:48:21.157000 audit: BPF prog-id=94 op=UNLOAD Jul 10 00:48:21.157000 audit[2374]: SYSCALL arch=c000003e syscall=202 success=yes exit=0 a0=c000046d48 a1=80 a2=0 a3=0 items=0 ppid=1515 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:21.157000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538636666626132623237393037643236643035623065386438393039 Jul 10 00:48:21.203000 audit[2415]: NETFILTER_CFG table=nat:87 family=2 entries=15 op=nft_register_chain pid=2415 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 00:48:21.203000 audit[2415]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffe196c9740 a2=0 a3=7ffe196c972c items=0 ppid=2233 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:21.203000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 00:48:21.204000 audit[2418]: NETFILTER_CFG table=mangle:88 family=2 entries=16 op=nft_register_chain pid=2418 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 00:48:21.204000 audit[2418]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffc0c83d590 a2=0 a3=7ffc0c83d57c items=0 ppid=2233 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:21.204000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 00:48:21.210000 audit[2416]: NETFILTER_CFG table=filter:89 family=2 entries=39 op=nft_register_chain pid=2416 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 00:48:21.210000 audit[2416]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7fffe37f0ff0 a2=0 a3=7fffe37f0fdc items=0 ppid=2233 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:21.210000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 00:48:21.215000 audit[2414]: NETFILTER_CFG table=raw:90 family=2 entries=21 op=nft_register_chain pid=2414 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 00:48:21.215000 audit[2414]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7fffc3482b80 a2=0 a3=7fffc3482b6c items=0 ppid=2233 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:21.215000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 00:48:21.558895 kubelet[1436]: E0710 00:48:21.558863 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:22.559490 kubelet[1436]: E0710 00:48:22.559441 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:22.980547 systemd-networkd[1025]: vxlan.calico: Gained IPv6LL Jul 10 00:48:23.560298 kubelet[1436]: E0710 00:48:23.560247 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:24.102353 env[1199]: time="2025-07-10T00:48:24.102254015Z" level=info msg="StopPodSandbox for \"1af1e807611e3888c4d7f8f340aba1cdc486ace21fa9f6f200ecb1b9038d3328\"" Jul 10 00:48:24.169131 kubelet[1436]: I0710 00:48:24.169029 1436 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-f8w6d" podStartSLOduration=7.024531237 podStartE2EDuration="24.168997637s" podCreationTimestamp="2025-07-10 00:48:00 +0000 UTC" firstStartedPulling="2025-07-10 00:48:02.114654746 +0000 UTC m=+3.180941019" lastFinishedPulling="2025-07-10 00:48:19.259121146 +0000 UTC m=+20.325407419" observedRunningTime="2025-07-10 00:48:20.165902404 +0000 UTC m=+21.232188686" watchObservedRunningTime="2025-07-10 00:48:24.168997637 +0000 UTC m=+25.235283909" Jul 10 00:48:24.200604 env[1199]: 2025-07-10 00:48:24.169 [INFO][2439] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="1af1e807611e3888c4d7f8f340aba1cdc486ace21fa9f6f200ecb1b9038d3328" Jul 10 00:48:24.200604 env[1199]: 2025-07-10 00:48:24.169 [INFO][2439] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1af1e807611e3888c4d7f8f340aba1cdc486ace21fa9f6f200ecb1b9038d3328" iface="eth0" netns="/var/run/netns/cni-c6ef5dec-fa5f-bf88-e10f-3a810a5f51d7" Jul 10 00:48:24.200604 env[1199]: 2025-07-10 00:48:24.170 [INFO][2439] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1af1e807611e3888c4d7f8f340aba1cdc486ace21fa9f6f200ecb1b9038d3328" iface="eth0" netns="/var/run/netns/cni-c6ef5dec-fa5f-bf88-e10f-3a810a5f51d7" Jul 10 00:48:24.200604 env[1199]: 2025-07-10 00:48:24.170 [INFO][2439] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="1af1e807611e3888c4d7f8f340aba1cdc486ace21fa9f6f200ecb1b9038d3328" iface="eth0" netns="/var/run/netns/cni-c6ef5dec-fa5f-bf88-e10f-3a810a5f51d7" Jul 10 00:48:24.200604 env[1199]: 2025-07-10 00:48:24.170 [INFO][2439] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="1af1e807611e3888c4d7f8f340aba1cdc486ace21fa9f6f200ecb1b9038d3328" Jul 10 00:48:24.200604 env[1199]: 2025-07-10 00:48:24.170 [INFO][2439] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1af1e807611e3888c4d7f8f340aba1cdc486ace21fa9f6f200ecb1b9038d3328" Jul 10 00:48:24.200604 env[1199]: 2025-07-10 00:48:24.188 [INFO][2448] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1af1e807611e3888c4d7f8f340aba1cdc486ace21fa9f6f200ecb1b9038d3328" HandleID="k8s-pod-network.1af1e807611e3888c4d7f8f340aba1cdc486ace21fa9f6f200ecb1b9038d3328" Workload="10.0.0.143-k8s-nginx--deployment--8587fbcb89--7z2fh-eth0" Jul 10 00:48:24.200604 env[1199]: 2025-07-10 00:48:24.188 [INFO][2448] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:48:24.200604 env[1199]: 2025-07-10 00:48:24.188 [INFO][2448] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:48:24.200604 env[1199]: 2025-07-10 00:48:24.195 [WARNING][2448] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1af1e807611e3888c4d7f8f340aba1cdc486ace21fa9f6f200ecb1b9038d3328" HandleID="k8s-pod-network.1af1e807611e3888c4d7f8f340aba1cdc486ace21fa9f6f200ecb1b9038d3328" Workload="10.0.0.143-k8s-nginx--deployment--8587fbcb89--7z2fh-eth0" Jul 10 00:48:24.200604 env[1199]: 2025-07-10 00:48:24.195 [INFO][2448] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1af1e807611e3888c4d7f8f340aba1cdc486ace21fa9f6f200ecb1b9038d3328" HandleID="k8s-pod-network.1af1e807611e3888c4d7f8f340aba1cdc486ace21fa9f6f200ecb1b9038d3328" Workload="10.0.0.143-k8s-nginx--deployment--8587fbcb89--7z2fh-eth0" Jul 10 00:48:24.200604 env[1199]: 2025-07-10 00:48:24.196 [INFO][2448] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:48:24.200604 env[1199]: 2025-07-10 00:48:24.199 [INFO][2439] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="1af1e807611e3888c4d7f8f340aba1cdc486ace21fa9f6f200ecb1b9038d3328" Jul 10 00:48:24.201115 env[1199]: time="2025-07-10T00:48:24.200767762Z" level=info msg="TearDown network for sandbox \"1af1e807611e3888c4d7f8f340aba1cdc486ace21fa9f6f200ecb1b9038d3328\" successfully" Jul 10 00:48:24.201115 env[1199]: time="2025-07-10T00:48:24.200814899Z" level=info msg="StopPodSandbox for \"1af1e807611e3888c4d7f8f340aba1cdc486ace21fa9f6f200ecb1b9038d3328\" returns successfully" Jul 10 00:48:24.201739 env[1199]: time="2025-07-10T00:48:24.201707303Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-7z2fh,Uid:c43cfb22-45f7-4a5e-8549-09bd6e72a011,Namespace:default,Attempt:1,}" Jul 10 00:48:24.202864 systemd[1]: run-netns-cni\x2dc6ef5dec\x2dfa5f\x2dbf88\x2de10f\x2d3a810a5f51d7.mount: Deactivated successfully. Jul 10 00:48:24.560862 kubelet[1436]: E0710 00:48:24.560799 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:24.576736 systemd-networkd[1025]: cali3ca120c466f: Link UP Jul 10 00:48:24.579490 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 10 00:48:24.579639 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali3ca120c466f: link becomes ready Jul 10 00:48:24.579528 systemd-networkd[1025]: cali3ca120c466f: Gained carrier Jul 10 00:48:24.589852 env[1199]: 2025-07-10 00:48:24.523 [INFO][2456] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.143-k8s-nginx--deployment--8587fbcb89--7z2fh-eth0 nginx-deployment-8587fbcb89- default c43cfb22-45f7-4a5e-8549-09bd6e72a011 1311 0 2025-07-10 00:48:12 +0000 UTC map[app:nginx pod-template-hash:8587fbcb89 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.143 nginx-deployment-8587fbcb89-7z2fh eth0 default [] [] [kns.default ksa.default.default] cali3ca120c466f [] [] }} ContainerID="2ac319311d35b16aec9c009db5d2e01e2b76282af526d70a813356f5a59131b3" Namespace="default" Pod="nginx-deployment-8587fbcb89-7z2fh" WorkloadEndpoint="10.0.0.143-k8s-nginx--deployment--8587fbcb89--7z2fh-" Jul 10 00:48:24.589852 env[1199]: 2025-07-10 00:48:24.523 [INFO][2456] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="2ac319311d35b16aec9c009db5d2e01e2b76282af526d70a813356f5a59131b3" Namespace="default" Pod="nginx-deployment-8587fbcb89-7z2fh" WorkloadEndpoint="10.0.0.143-k8s-nginx--deployment--8587fbcb89--7z2fh-eth0" Jul 10 00:48:24.589852 env[1199]: 2025-07-10 00:48:24.543 [INFO][2471] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2ac319311d35b16aec9c009db5d2e01e2b76282af526d70a813356f5a59131b3" HandleID="k8s-pod-network.2ac319311d35b16aec9c009db5d2e01e2b76282af526d70a813356f5a59131b3" Workload="10.0.0.143-k8s-nginx--deployment--8587fbcb89--7z2fh-eth0" Jul 10 00:48:24.589852 env[1199]: 2025-07-10 00:48:24.543 [INFO][2471] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="2ac319311d35b16aec9c009db5d2e01e2b76282af526d70a813356f5a59131b3" HandleID="k8s-pod-network.2ac319311d35b16aec9c009db5d2e01e2b76282af526d70a813356f5a59131b3" Workload="10.0.0.143-k8s-nginx--deployment--8587fbcb89--7z2fh-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002c9360), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.143", "pod":"nginx-deployment-8587fbcb89-7z2fh", "timestamp":"2025-07-10 00:48:24.543429421 +0000 UTC"}, Hostname:"10.0.0.143", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 10 00:48:24.589852 env[1199]: 2025-07-10 00:48:24.543 [INFO][2471] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:48:24.589852 env[1199]: 2025-07-10 00:48:24.543 [INFO][2471] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:48:24.589852 env[1199]: 2025-07-10 00:48:24.543 [INFO][2471] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.143' Jul 10 00:48:24.589852 env[1199]: 2025-07-10 00:48:24.550 [INFO][2471] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.2ac319311d35b16aec9c009db5d2e01e2b76282af526d70a813356f5a59131b3" host="10.0.0.143" Jul 10 00:48:24.589852 env[1199]: 2025-07-10 00:48:24.554 [INFO][2471] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.143" Jul 10 00:48:24.589852 env[1199]: 2025-07-10 00:48:24.558 [INFO][2471] ipam/ipam.go 511: Trying affinity for 192.168.66.0/26 host="10.0.0.143" Jul 10 00:48:24.589852 env[1199]: 2025-07-10 00:48:24.559 [INFO][2471] ipam/ipam.go 158: Attempting to load block cidr=192.168.66.0/26 host="10.0.0.143" Jul 10 00:48:24.589852 env[1199]: 2025-07-10 00:48:24.561 [INFO][2471] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.66.0/26 host="10.0.0.143" Jul 10 00:48:24.589852 env[1199]: 2025-07-10 00:48:24.561 [INFO][2471] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.66.0/26 handle="k8s-pod-network.2ac319311d35b16aec9c009db5d2e01e2b76282af526d70a813356f5a59131b3" host="10.0.0.143" Jul 10 00:48:24.589852 env[1199]: 2025-07-10 00:48:24.563 [INFO][2471] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.2ac319311d35b16aec9c009db5d2e01e2b76282af526d70a813356f5a59131b3 Jul 10 00:48:24.589852 env[1199]: 2025-07-10 00:48:24.566 [INFO][2471] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.66.0/26 handle="k8s-pod-network.2ac319311d35b16aec9c009db5d2e01e2b76282af526d70a813356f5a59131b3" host="10.0.0.143" Jul 10 00:48:24.589852 env[1199]: 2025-07-10 00:48:24.570 [INFO][2471] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.66.1/26] block=192.168.66.0/26 handle="k8s-pod-network.2ac319311d35b16aec9c009db5d2e01e2b76282af526d70a813356f5a59131b3" host="10.0.0.143" Jul 10 00:48:24.589852 env[1199]: 2025-07-10 00:48:24.570 [INFO][2471] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.66.1/26] handle="k8s-pod-network.2ac319311d35b16aec9c009db5d2e01e2b76282af526d70a813356f5a59131b3" host="10.0.0.143" Jul 10 00:48:24.589852 env[1199]: 2025-07-10 00:48:24.570 [INFO][2471] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:48:24.589852 env[1199]: 2025-07-10 00:48:24.570 [INFO][2471] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.66.1/26] IPv6=[] ContainerID="2ac319311d35b16aec9c009db5d2e01e2b76282af526d70a813356f5a59131b3" HandleID="k8s-pod-network.2ac319311d35b16aec9c009db5d2e01e2b76282af526d70a813356f5a59131b3" Workload="10.0.0.143-k8s-nginx--deployment--8587fbcb89--7z2fh-eth0" Jul 10 00:48:24.590513 env[1199]: 2025-07-10 00:48:24.572 [INFO][2456] cni-plugin/k8s.go 418: Populated endpoint ContainerID="2ac319311d35b16aec9c009db5d2e01e2b76282af526d70a813356f5a59131b3" Namespace="default" Pod="nginx-deployment-8587fbcb89-7z2fh" WorkloadEndpoint="10.0.0.143-k8s-nginx--deployment--8587fbcb89--7z2fh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-nginx--deployment--8587fbcb89--7z2fh-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"c43cfb22-45f7-4a5e-8549-09bd6e72a011", ResourceVersion:"1311", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 48, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"", Pod:"nginx-deployment-8587fbcb89-7z2fh", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.66.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali3ca120c466f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:48:24.590513 env[1199]: 2025-07-10 00:48:24.572 [INFO][2456] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.66.1/32] ContainerID="2ac319311d35b16aec9c009db5d2e01e2b76282af526d70a813356f5a59131b3" Namespace="default" Pod="nginx-deployment-8587fbcb89-7z2fh" WorkloadEndpoint="10.0.0.143-k8s-nginx--deployment--8587fbcb89--7z2fh-eth0" Jul 10 00:48:24.590513 env[1199]: 2025-07-10 00:48:24.572 [INFO][2456] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali3ca120c466f ContainerID="2ac319311d35b16aec9c009db5d2e01e2b76282af526d70a813356f5a59131b3" Namespace="default" Pod="nginx-deployment-8587fbcb89-7z2fh" WorkloadEndpoint="10.0.0.143-k8s-nginx--deployment--8587fbcb89--7z2fh-eth0" Jul 10 00:48:24.590513 env[1199]: 2025-07-10 00:48:24.580 [INFO][2456] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="2ac319311d35b16aec9c009db5d2e01e2b76282af526d70a813356f5a59131b3" Namespace="default" Pod="nginx-deployment-8587fbcb89-7z2fh" WorkloadEndpoint="10.0.0.143-k8s-nginx--deployment--8587fbcb89--7z2fh-eth0" Jul 10 00:48:24.590513 env[1199]: 2025-07-10 00:48:24.580 [INFO][2456] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="2ac319311d35b16aec9c009db5d2e01e2b76282af526d70a813356f5a59131b3" Namespace="default" Pod="nginx-deployment-8587fbcb89-7z2fh" WorkloadEndpoint="10.0.0.143-k8s-nginx--deployment--8587fbcb89--7z2fh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-nginx--deployment--8587fbcb89--7z2fh-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"c43cfb22-45f7-4a5e-8549-09bd6e72a011", ResourceVersion:"1311", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 48, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"2ac319311d35b16aec9c009db5d2e01e2b76282af526d70a813356f5a59131b3", Pod:"nginx-deployment-8587fbcb89-7z2fh", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.66.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali3ca120c466f", MAC:"0e:f6:cc:45:2e:77", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:48:24.590513 env[1199]: 2025-07-10 00:48:24.587 [INFO][2456] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="2ac319311d35b16aec9c009db5d2e01e2b76282af526d70a813356f5a59131b3" Namespace="default" Pod="nginx-deployment-8587fbcb89-7z2fh" WorkloadEndpoint="10.0.0.143-k8s-nginx--deployment--8587fbcb89--7z2fh-eth0" Jul 10 00:48:24.598429 env[1199]: time="2025-07-10T00:48:24.598334887Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 10 00:48:24.598429 env[1199]: time="2025-07-10T00:48:24.598384742Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 10 00:48:24.598620 env[1199]: time="2025-07-10T00:48:24.598407103Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 10 00:48:24.598620 env[1199]: time="2025-07-10T00:48:24.598529987Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2ac319311d35b16aec9c009db5d2e01e2b76282af526d70a813356f5a59131b3 pid=2496 runtime=io.containerd.runc.v2 Jul 10 00:48:24.615247 systemd[1]: Started cri-containerd-2ac319311d35b16aec9c009db5d2e01e2b76282af526d70a813356f5a59131b3.scope. Jul 10 00:48:24.619159 kernel: kauditd_printk_skb: 598 callbacks suppressed Jul 10 00:48:24.620715 kernel: audit: type=1325 audit(1752108504.601:664): table=filter:91 family=2 entries=38 op=nft_register_chain pid=2492 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 00:48:24.620754 kernel: audit: type=1300 audit(1752108504.601:664): arch=c000003e syscall=46 success=yes exit=21324 a0=3 a1=7ffd280e9d20 a2=0 a3=7ffd280e9d0c items=0 ppid=2233 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:24.601000 audit[2492]: NETFILTER_CFG table=filter:91 family=2 entries=38 op=nft_register_chain pid=2492 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 00:48:24.601000 audit[2492]: SYSCALL arch=c000003e syscall=46 success=yes exit=21324 a0=3 a1=7ffd280e9d20 a2=0 a3=7ffd280e9d0c items=0 ppid=2233 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:24.601000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 00:48:24.628585 kernel: audit: type=1327 audit(1752108504.601:664): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 00:48:24.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:24.634443 kernel: audit: type=1400 audit(1752108504.630:665): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:24.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:24.637461 kernel: audit: type=1400 audit(1752108504.630:666): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:24.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:24.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:24.643477 kernel: audit: type=1400 audit(1752108504.631:667): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:24.643528 kernel: audit: type=1400 audit(1752108504.631:668): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:24.643549 kernel: audit: type=1400 audit(1752108504.631:669): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:24.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:24.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:24.646834 systemd-resolved[1135]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 10 00:48:24.649933 kernel: audit: type=1400 audit(1752108504.631:670): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:24.650008 kernel: audit: type=1400 audit(1752108504.631:671): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:24.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:24.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:24.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:24.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:24.633000 audit: BPF prog-id=100 op=LOAD Jul 10 00:48:24.634000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:24.634000 audit[2507]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2496 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:24.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261633331393331316433356231366165633963303039646235643265 Jul 10 00:48:24.634000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:24.634000 audit[2507]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2496 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:24.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261633331393331316433356231366165633963303039646235643265 Jul 10 00:48:24.634000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:24.634000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:24.634000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:24.634000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:24.634000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:24.634000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:24.634000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:24.634000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:24.634000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:24.634000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:24.634000 audit: BPF prog-id=101 op=LOAD Jul 10 00:48:24.634000 audit[2507]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002a5390 items=0 ppid=2496 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:24.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261633331393331316433356231366165633963303039646235643265 Jul 10 00:48:24.637000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:24.637000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:24.637000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:24.637000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:24.637000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:24.637000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:24.637000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:24.637000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:24.637000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:24.637000 audit: BPF prog-id=102 op=LOAD Jul 10 00:48:24.637000 audit[2507]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002a53d8 items=0 ppid=2496 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:24.637000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261633331393331316433356231366165633963303039646235643265 Jul 10 00:48:24.640000 audit: BPF prog-id=102 op=UNLOAD Jul 10 00:48:24.640000 audit: BPF prog-id=101 op=UNLOAD Jul 10 00:48:24.640000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:24.640000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:24.640000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:24.640000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:24.640000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:24.640000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:24.640000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:24.640000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:24.640000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:24.640000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:24.640000 audit: BPF prog-id=103 op=LOAD Jul 10 00:48:24.640000 audit[2507]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002a57e8 items=0 ppid=2496 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:24.640000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261633331393331316433356231366165633963303039646235643265 Jul 10 00:48:24.674613 env[1199]: time="2025-07-10T00:48:24.674568145Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-7z2fh,Uid:c43cfb22-45f7-4a5e-8549-09bd6e72a011,Namespace:default,Attempt:1,} returns sandbox id \"2ac319311d35b16aec9c009db5d2e01e2b76282af526d70a813356f5a59131b3\"" Jul 10 00:48:24.676458 env[1199]: time="2025-07-10T00:48:24.676431486Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Jul 10 00:48:25.102464 env[1199]: time="2025-07-10T00:48:25.102384355Z" level=info msg="StopPodSandbox for \"c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4\"" Jul 10 00:48:25.166654 env[1199]: 2025-07-10 00:48:25.137 [INFO][2541] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4" Jul 10 00:48:25.166654 env[1199]: 2025-07-10 00:48:25.137 [INFO][2541] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4" iface="eth0" netns="/var/run/netns/cni-d27fe688-5c22-b95d-8f78-04a99c03e87a" Jul 10 00:48:25.166654 env[1199]: 2025-07-10 00:48:25.137 [INFO][2541] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4" iface="eth0" netns="/var/run/netns/cni-d27fe688-5c22-b95d-8f78-04a99c03e87a" Jul 10 00:48:25.166654 env[1199]: 2025-07-10 00:48:25.137 [INFO][2541] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4" iface="eth0" netns="/var/run/netns/cni-d27fe688-5c22-b95d-8f78-04a99c03e87a" Jul 10 00:48:25.166654 env[1199]: 2025-07-10 00:48:25.137 [INFO][2541] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4" Jul 10 00:48:25.166654 env[1199]: 2025-07-10 00:48:25.138 [INFO][2541] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4" Jul 10 00:48:25.166654 env[1199]: 2025-07-10 00:48:25.157 [INFO][2551] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4" HandleID="k8s-pod-network.c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4" Workload="10.0.0.143-k8s-calico--apiserver--67c56776df--gs6gv-eth0" Jul 10 00:48:25.166654 env[1199]: 2025-07-10 00:48:25.157 [INFO][2551] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:48:25.166654 env[1199]: 2025-07-10 00:48:25.157 [INFO][2551] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:48:25.166654 env[1199]: 2025-07-10 00:48:25.162 [WARNING][2551] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4" HandleID="k8s-pod-network.c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4" Workload="10.0.0.143-k8s-calico--apiserver--67c56776df--gs6gv-eth0" Jul 10 00:48:25.166654 env[1199]: 2025-07-10 00:48:25.162 [INFO][2551] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4" HandleID="k8s-pod-network.c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4" Workload="10.0.0.143-k8s-calico--apiserver--67c56776df--gs6gv-eth0" Jul 10 00:48:25.166654 env[1199]: 2025-07-10 00:48:25.164 [INFO][2551] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:48:25.166654 env[1199]: 2025-07-10 00:48:25.165 [INFO][2541] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4" Jul 10 00:48:25.167129 env[1199]: time="2025-07-10T00:48:25.166858249Z" level=info msg="TearDown network for sandbox \"c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4\" successfully" Jul 10 00:48:25.167129 env[1199]: time="2025-07-10T00:48:25.166907227Z" level=info msg="StopPodSandbox for \"c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4\" returns successfully" Jul 10 00:48:25.167595 env[1199]: time="2025-07-10T00:48:25.167562568Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-67c56776df-gs6gv,Uid:d227c798-038b-4a53-9200-e2ed59b1bceb,Namespace:calico-apiserver,Attempt:1,}" Jul 10 00:48:25.203472 systemd[1]: run-netns-cni\x2dd27fe688\x2d5c22\x2db95d\x2d8f78\x2d04a99c03e87a.mount: Deactivated successfully. Jul 10 00:48:25.259250 systemd-networkd[1025]: cali4f046377295: Link UP Jul 10 00:48:25.260667 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4f046377295: link becomes ready Jul 10 00:48:25.260503 systemd-networkd[1025]: cali4f046377295: Gained carrier Jul 10 00:48:25.269133 env[1199]: 2025-07-10 00:48:25.209 [INFO][2559] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.143-k8s-calico--apiserver--67c56776df--gs6gv-eth0 calico-apiserver-67c56776df- calico-apiserver d227c798-038b-4a53-9200-e2ed59b1bceb 1325 0 2025-07-10 00:48:12 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:67c56776df projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s 10.0.0.143 calico-apiserver-67c56776df-gs6gv eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali4f046377295 [] [] }} ContainerID="798f3d5a1afd2450d322de77d326f65b7741b3ed963b32623a9f2a6ce4e717cd" Namespace="calico-apiserver" Pod="calico-apiserver-67c56776df-gs6gv" WorkloadEndpoint="10.0.0.143-k8s-calico--apiserver--67c56776df--gs6gv-" Jul 10 00:48:25.269133 env[1199]: 2025-07-10 00:48:25.209 [INFO][2559] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="798f3d5a1afd2450d322de77d326f65b7741b3ed963b32623a9f2a6ce4e717cd" Namespace="calico-apiserver" Pod="calico-apiserver-67c56776df-gs6gv" WorkloadEndpoint="10.0.0.143-k8s-calico--apiserver--67c56776df--gs6gv-eth0" Jul 10 00:48:25.269133 env[1199]: 2025-07-10 00:48:25.229 [INFO][2574] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="798f3d5a1afd2450d322de77d326f65b7741b3ed963b32623a9f2a6ce4e717cd" HandleID="k8s-pod-network.798f3d5a1afd2450d322de77d326f65b7741b3ed963b32623a9f2a6ce4e717cd" Workload="10.0.0.143-k8s-calico--apiserver--67c56776df--gs6gv-eth0" Jul 10 00:48:25.269133 env[1199]: 2025-07-10 00:48:25.229 [INFO][2574] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="798f3d5a1afd2450d322de77d326f65b7741b3ed963b32623a9f2a6ce4e717cd" HandleID="k8s-pod-network.798f3d5a1afd2450d322de77d326f65b7741b3ed963b32623a9f2a6ce4e717cd" Workload="10.0.0.143-k8s-calico--apiserver--67c56776df--gs6gv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000511d10), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"10.0.0.143", "pod":"calico-apiserver-67c56776df-gs6gv", "timestamp":"2025-07-10 00:48:25.229788131 +0000 UTC"}, Hostname:"10.0.0.143", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 10 00:48:25.269133 env[1199]: 2025-07-10 00:48:25.229 [INFO][2574] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:48:25.269133 env[1199]: 2025-07-10 00:48:25.230 [INFO][2574] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:48:25.269133 env[1199]: 2025-07-10 00:48:25.230 [INFO][2574] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.143' Jul 10 00:48:25.269133 env[1199]: 2025-07-10 00:48:25.235 [INFO][2574] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.798f3d5a1afd2450d322de77d326f65b7741b3ed963b32623a9f2a6ce4e717cd" host="10.0.0.143" Jul 10 00:48:25.269133 env[1199]: 2025-07-10 00:48:25.239 [INFO][2574] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.143" Jul 10 00:48:25.269133 env[1199]: 2025-07-10 00:48:25.242 [INFO][2574] ipam/ipam.go 511: Trying affinity for 192.168.66.0/26 host="10.0.0.143" Jul 10 00:48:25.269133 env[1199]: 2025-07-10 00:48:25.244 [INFO][2574] ipam/ipam.go 158: Attempting to load block cidr=192.168.66.0/26 host="10.0.0.143" Jul 10 00:48:25.269133 env[1199]: 2025-07-10 00:48:25.245 [INFO][2574] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.66.0/26 host="10.0.0.143" Jul 10 00:48:25.269133 env[1199]: 2025-07-10 00:48:25.245 [INFO][2574] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.66.0/26 handle="k8s-pod-network.798f3d5a1afd2450d322de77d326f65b7741b3ed963b32623a9f2a6ce4e717cd" host="10.0.0.143" Jul 10 00:48:25.269133 env[1199]: 2025-07-10 00:48:25.246 [INFO][2574] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.798f3d5a1afd2450d322de77d326f65b7741b3ed963b32623a9f2a6ce4e717cd Jul 10 00:48:25.269133 env[1199]: 2025-07-10 00:48:25.249 [INFO][2574] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.66.0/26 handle="k8s-pod-network.798f3d5a1afd2450d322de77d326f65b7741b3ed963b32623a9f2a6ce4e717cd" host="10.0.0.143" Jul 10 00:48:25.269133 env[1199]: 2025-07-10 00:48:25.254 [INFO][2574] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.66.2/26] block=192.168.66.0/26 handle="k8s-pod-network.798f3d5a1afd2450d322de77d326f65b7741b3ed963b32623a9f2a6ce4e717cd" host="10.0.0.143" Jul 10 00:48:25.269133 env[1199]: 2025-07-10 00:48:25.254 [INFO][2574] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.66.2/26] handle="k8s-pod-network.798f3d5a1afd2450d322de77d326f65b7741b3ed963b32623a9f2a6ce4e717cd" host="10.0.0.143" Jul 10 00:48:25.269133 env[1199]: 2025-07-10 00:48:25.254 [INFO][2574] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:48:25.269133 env[1199]: 2025-07-10 00:48:25.254 [INFO][2574] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.66.2/26] IPv6=[] ContainerID="798f3d5a1afd2450d322de77d326f65b7741b3ed963b32623a9f2a6ce4e717cd" HandleID="k8s-pod-network.798f3d5a1afd2450d322de77d326f65b7741b3ed963b32623a9f2a6ce4e717cd" Workload="10.0.0.143-k8s-calico--apiserver--67c56776df--gs6gv-eth0" Jul 10 00:48:25.269803 env[1199]: 2025-07-10 00:48:25.256 [INFO][2559] cni-plugin/k8s.go 418: Populated endpoint ContainerID="798f3d5a1afd2450d322de77d326f65b7741b3ed963b32623a9f2a6ce4e717cd" Namespace="calico-apiserver" Pod="calico-apiserver-67c56776df-gs6gv" WorkloadEndpoint="10.0.0.143-k8s-calico--apiserver--67c56776df--gs6gv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-calico--apiserver--67c56776df--gs6gv-eth0", GenerateName:"calico-apiserver-67c56776df-", Namespace:"calico-apiserver", SelfLink:"", UID:"d227c798-038b-4a53-9200-e2ed59b1bceb", ResourceVersion:"1325", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 48, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"67c56776df", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"", Pod:"calico-apiserver-67c56776df-gs6gv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.66.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali4f046377295", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:48:25.269803 env[1199]: 2025-07-10 00:48:25.256 [INFO][2559] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.66.2/32] ContainerID="798f3d5a1afd2450d322de77d326f65b7741b3ed963b32623a9f2a6ce4e717cd" Namespace="calico-apiserver" Pod="calico-apiserver-67c56776df-gs6gv" WorkloadEndpoint="10.0.0.143-k8s-calico--apiserver--67c56776df--gs6gv-eth0" Jul 10 00:48:25.269803 env[1199]: 2025-07-10 00:48:25.256 [INFO][2559] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali4f046377295 ContainerID="798f3d5a1afd2450d322de77d326f65b7741b3ed963b32623a9f2a6ce4e717cd" Namespace="calico-apiserver" Pod="calico-apiserver-67c56776df-gs6gv" WorkloadEndpoint="10.0.0.143-k8s-calico--apiserver--67c56776df--gs6gv-eth0" Jul 10 00:48:25.269803 env[1199]: 2025-07-10 00:48:25.261 [INFO][2559] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="798f3d5a1afd2450d322de77d326f65b7741b3ed963b32623a9f2a6ce4e717cd" Namespace="calico-apiserver" Pod="calico-apiserver-67c56776df-gs6gv" WorkloadEndpoint="10.0.0.143-k8s-calico--apiserver--67c56776df--gs6gv-eth0" Jul 10 00:48:25.269803 env[1199]: 2025-07-10 00:48:25.261 [INFO][2559] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="798f3d5a1afd2450d322de77d326f65b7741b3ed963b32623a9f2a6ce4e717cd" Namespace="calico-apiserver" Pod="calico-apiserver-67c56776df-gs6gv" WorkloadEndpoint="10.0.0.143-k8s-calico--apiserver--67c56776df--gs6gv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-calico--apiserver--67c56776df--gs6gv-eth0", GenerateName:"calico-apiserver-67c56776df-", Namespace:"calico-apiserver", SelfLink:"", UID:"d227c798-038b-4a53-9200-e2ed59b1bceb", ResourceVersion:"1325", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 48, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"67c56776df", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"798f3d5a1afd2450d322de77d326f65b7741b3ed963b32623a9f2a6ce4e717cd", Pod:"calico-apiserver-67c56776df-gs6gv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.66.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali4f046377295", MAC:"12:62:1d:58:d6:80", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:48:25.269803 env[1199]: 2025-07-10 00:48:25.267 [INFO][2559] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="798f3d5a1afd2450d322de77d326f65b7741b3ed963b32623a9f2a6ce4e717cd" Namespace="calico-apiserver" Pod="calico-apiserver-67c56776df-gs6gv" WorkloadEndpoint="10.0.0.143-k8s-calico--apiserver--67c56776df--gs6gv-eth0" Jul 10 00:48:25.278000 audit[2591]: NETFILTER_CFG table=filter:92 family=2 entries=50 op=nft_register_chain pid=2591 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 00:48:25.278000 audit[2591]: SYSCALL arch=c000003e syscall=46 success=yes exit=28208 a0=3 a1=7fffc5d7ca30 a2=0 a3=7fffc5d7ca1c items=0 ppid=2233 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:25.278000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 00:48:25.282821 env[1199]: time="2025-07-10T00:48:25.282742526Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 10 00:48:25.282821 env[1199]: time="2025-07-10T00:48:25.282788957Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 10 00:48:25.282821 env[1199]: time="2025-07-10T00:48:25.282800839Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 10 00:48:25.283040 env[1199]: time="2025-07-10T00:48:25.282940714Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/798f3d5a1afd2450d322de77d326f65b7741b3ed963b32623a9f2a6ce4e717cd pid=2599 runtime=io.containerd.runc.v2 Jul 10 00:48:25.295639 systemd[1]: Started cri-containerd-798f3d5a1afd2450d322de77d326f65b7741b3ed963b32623a9f2a6ce4e717cd.scope. Jul 10 00:48:25.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:25.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:25.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:25.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:25.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:25.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:25.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:25.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:25.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:25.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:25.305000 audit: BPF prog-id=104 op=LOAD Jul 10 00:48:25.305000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:25.305000 audit[2608]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2599 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:25.305000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739386633643561316166643234353064333232646537376433323666 Jul 10 00:48:25.306000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:25.306000 audit[2608]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2599 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:25.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739386633643561316166643234353064333232646537376433323666 Jul 10 00:48:25.306000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:25.306000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:25.306000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:25.306000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:25.306000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:25.306000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:25.306000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:25.306000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:25.306000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:25.306000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:25.306000 audit: BPF prog-id=105 op=LOAD Jul 10 00:48:25.306000 audit[2608]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000219fb0 items=0 ppid=2599 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:25.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739386633643561316166643234353064333232646537376433323666 Jul 10 00:48:25.306000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:25.306000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:25.306000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:25.306000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:25.306000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:25.306000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:25.306000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:25.306000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:25.306000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:25.306000 audit: BPF prog-id=106 op=LOAD Jul 10 00:48:25.306000 audit[2608]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000219ff8 items=0 ppid=2599 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:25.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739386633643561316166643234353064333232646537376433323666 Jul 10 00:48:25.306000 audit: BPF prog-id=106 op=UNLOAD Jul 10 00:48:25.306000 audit: BPF prog-id=105 op=UNLOAD Jul 10 00:48:25.306000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:25.306000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:25.306000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:25.306000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:25.306000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:25.306000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:25.306000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:25.306000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:25.306000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:25.306000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:25.306000 audit: BPF prog-id=107 op=LOAD Jul 10 00:48:25.306000 audit[2608]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000414408 items=0 ppid=2599 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:25.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739386633643561316166643234353064333232646537376433323666 Jul 10 00:48:25.308421 systemd-resolved[1135]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 10 00:48:25.329970 env[1199]: time="2025-07-10T00:48:25.329938084Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-67c56776df-gs6gv,Uid:d227c798-038b-4a53-9200-e2ed59b1bceb,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"798f3d5a1afd2450d322de77d326f65b7741b3ed963b32623a9f2a6ce4e717cd\"" Jul 10 00:48:25.561773 kubelet[1436]: E0710 00:48:25.561720 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:26.103248 env[1199]: time="2025-07-10T00:48:26.103195577Z" level=info msg="StopPodSandbox for \"396246d785b8a0333ac9f7e4b6c96716c4db627750267225f3ef407423dd4382\"" Jul 10 00:48:26.194517 env[1199]: 2025-07-10 00:48:26.162 [INFO][2644] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="396246d785b8a0333ac9f7e4b6c96716c4db627750267225f3ef407423dd4382" Jul 10 00:48:26.194517 env[1199]: 2025-07-10 00:48:26.162 [INFO][2644] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="396246d785b8a0333ac9f7e4b6c96716c4db627750267225f3ef407423dd4382" iface="eth0" netns="/var/run/netns/cni-eeec8ada-b785-880e-5be5-48f56973d36b" Jul 10 00:48:26.194517 env[1199]: 2025-07-10 00:48:26.162 [INFO][2644] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="396246d785b8a0333ac9f7e4b6c96716c4db627750267225f3ef407423dd4382" iface="eth0" netns="/var/run/netns/cni-eeec8ada-b785-880e-5be5-48f56973d36b" Jul 10 00:48:26.194517 env[1199]: 2025-07-10 00:48:26.162 [INFO][2644] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="396246d785b8a0333ac9f7e4b6c96716c4db627750267225f3ef407423dd4382" iface="eth0" netns="/var/run/netns/cni-eeec8ada-b785-880e-5be5-48f56973d36b" Jul 10 00:48:26.194517 env[1199]: 2025-07-10 00:48:26.162 [INFO][2644] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="396246d785b8a0333ac9f7e4b6c96716c4db627750267225f3ef407423dd4382" Jul 10 00:48:26.194517 env[1199]: 2025-07-10 00:48:26.163 [INFO][2644] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="396246d785b8a0333ac9f7e4b6c96716c4db627750267225f3ef407423dd4382" Jul 10 00:48:26.194517 env[1199]: 2025-07-10 00:48:26.184 [INFO][2654] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="396246d785b8a0333ac9f7e4b6c96716c4db627750267225f3ef407423dd4382" HandleID="k8s-pod-network.396246d785b8a0333ac9f7e4b6c96716c4db627750267225f3ef407423dd4382" Workload="10.0.0.143-k8s-csi--node--driver--6ghr7-eth0" Jul 10 00:48:26.194517 env[1199]: 2025-07-10 00:48:26.184 [INFO][2654] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:48:26.194517 env[1199]: 2025-07-10 00:48:26.184 [INFO][2654] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:48:26.194517 env[1199]: 2025-07-10 00:48:26.189 [WARNING][2654] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="396246d785b8a0333ac9f7e4b6c96716c4db627750267225f3ef407423dd4382" HandleID="k8s-pod-network.396246d785b8a0333ac9f7e4b6c96716c4db627750267225f3ef407423dd4382" Workload="10.0.0.143-k8s-csi--node--driver--6ghr7-eth0" Jul 10 00:48:26.194517 env[1199]: 2025-07-10 00:48:26.189 [INFO][2654] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="396246d785b8a0333ac9f7e4b6c96716c4db627750267225f3ef407423dd4382" HandleID="k8s-pod-network.396246d785b8a0333ac9f7e4b6c96716c4db627750267225f3ef407423dd4382" Workload="10.0.0.143-k8s-csi--node--driver--6ghr7-eth0" Jul 10 00:48:26.194517 env[1199]: 2025-07-10 00:48:26.191 [INFO][2654] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:48:26.194517 env[1199]: 2025-07-10 00:48:26.193 [INFO][2644] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="396246d785b8a0333ac9f7e4b6c96716c4db627750267225f3ef407423dd4382" Jul 10 00:48:26.195021 env[1199]: time="2025-07-10T00:48:26.194676042Z" level=info msg="TearDown network for sandbox \"396246d785b8a0333ac9f7e4b6c96716c4db627750267225f3ef407423dd4382\" successfully" Jul 10 00:48:26.195021 env[1199]: time="2025-07-10T00:48:26.194736845Z" level=info msg="StopPodSandbox for \"396246d785b8a0333ac9f7e4b6c96716c4db627750267225f3ef407423dd4382\" returns successfully" Jul 10 00:48:26.196326 systemd[1]: run-netns-cni\x2deeec8ada\x2db785\x2d880e\x2d5be5\x2d48f56973d36b.mount: Deactivated successfully. Jul 10 00:48:26.196553 env[1199]: time="2025-07-10T00:48:26.196448357Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6ghr7,Uid:36da2ccb-1a46-4dff-99a7-99fa203d27fa,Namespace:calico-system,Attempt:1,}" Jul 10 00:48:26.308768 systemd-networkd[1025]: cali4f046377295: Gained IPv6LL Jul 10 00:48:26.309060 systemd-networkd[1025]: cali3ca120c466f: Gained IPv6LL Jul 10 00:48:26.497208 systemd-networkd[1025]: cali9313fe8d25a: Link UP Jul 10 00:48:26.499832 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 10 00:48:26.499891 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9313fe8d25a: link becomes ready Jul 10 00:48:26.500120 systemd-networkd[1025]: cali9313fe8d25a: Gained carrier Jul 10 00:48:26.510611 env[1199]: 2025-07-10 00:48:26.446 [INFO][2668] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.143-k8s-csi--node--driver--6ghr7-eth0 csi-node-driver- calico-system 36da2ccb-1a46-4dff-99a7-99fa203d27fa 1333 0 2025-07-10 00:48:00 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:57bd658777 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.0.0.143 csi-node-driver-6ghr7 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali9313fe8d25a [] [] }} ContainerID="c0121c841a7774af0f2e592e762745eb8d039b6169dca3dba92d3c1cb1bb1614" Namespace="calico-system" Pod="csi-node-driver-6ghr7" WorkloadEndpoint="10.0.0.143-k8s-csi--node--driver--6ghr7-" Jul 10 00:48:26.510611 env[1199]: 2025-07-10 00:48:26.446 [INFO][2668] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="c0121c841a7774af0f2e592e762745eb8d039b6169dca3dba92d3c1cb1bb1614" Namespace="calico-system" Pod="csi-node-driver-6ghr7" WorkloadEndpoint="10.0.0.143-k8s-csi--node--driver--6ghr7-eth0" Jul 10 00:48:26.510611 env[1199]: 2025-07-10 00:48:26.469 [INFO][2682] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c0121c841a7774af0f2e592e762745eb8d039b6169dca3dba92d3c1cb1bb1614" HandleID="k8s-pod-network.c0121c841a7774af0f2e592e762745eb8d039b6169dca3dba92d3c1cb1bb1614" Workload="10.0.0.143-k8s-csi--node--driver--6ghr7-eth0" Jul 10 00:48:26.510611 env[1199]: 2025-07-10 00:48:26.469 [INFO][2682] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c0121c841a7774af0f2e592e762745eb8d039b6169dca3dba92d3c1cb1bb1614" HandleID="k8s-pod-network.c0121c841a7774af0f2e592e762745eb8d039b6169dca3dba92d3c1cb1bb1614" Workload="10.0.0.143-k8s-csi--node--driver--6ghr7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000507d70), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.143", "pod":"csi-node-driver-6ghr7", "timestamp":"2025-07-10 00:48:26.469189308 +0000 UTC"}, Hostname:"10.0.0.143", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 10 00:48:26.510611 env[1199]: 2025-07-10 00:48:26.469 [INFO][2682] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:48:26.510611 env[1199]: 2025-07-10 00:48:26.469 [INFO][2682] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:48:26.510611 env[1199]: 2025-07-10 00:48:26.469 [INFO][2682] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.143' Jul 10 00:48:26.510611 env[1199]: 2025-07-10 00:48:26.475 [INFO][2682] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.c0121c841a7774af0f2e592e762745eb8d039b6169dca3dba92d3c1cb1bb1614" host="10.0.0.143" Jul 10 00:48:26.510611 env[1199]: 2025-07-10 00:48:26.478 [INFO][2682] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.143" Jul 10 00:48:26.510611 env[1199]: 2025-07-10 00:48:26.482 [INFO][2682] ipam/ipam.go 511: Trying affinity for 192.168.66.0/26 host="10.0.0.143" Jul 10 00:48:26.510611 env[1199]: 2025-07-10 00:48:26.483 [INFO][2682] ipam/ipam.go 158: Attempting to load block cidr=192.168.66.0/26 host="10.0.0.143" Jul 10 00:48:26.510611 env[1199]: 2025-07-10 00:48:26.485 [INFO][2682] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.66.0/26 host="10.0.0.143" Jul 10 00:48:26.510611 env[1199]: 2025-07-10 00:48:26.485 [INFO][2682] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.66.0/26 handle="k8s-pod-network.c0121c841a7774af0f2e592e762745eb8d039b6169dca3dba92d3c1cb1bb1614" host="10.0.0.143" Jul 10 00:48:26.510611 env[1199]: 2025-07-10 00:48:26.486 [INFO][2682] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.c0121c841a7774af0f2e592e762745eb8d039b6169dca3dba92d3c1cb1bb1614 Jul 10 00:48:26.510611 env[1199]: 2025-07-10 00:48:26.489 [INFO][2682] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.66.0/26 handle="k8s-pod-network.c0121c841a7774af0f2e592e762745eb8d039b6169dca3dba92d3c1cb1bb1614" host="10.0.0.143" Jul 10 00:48:26.510611 env[1199]: 2025-07-10 00:48:26.493 [INFO][2682] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.66.3/26] block=192.168.66.0/26 handle="k8s-pod-network.c0121c841a7774af0f2e592e762745eb8d039b6169dca3dba92d3c1cb1bb1614" host="10.0.0.143" Jul 10 00:48:26.510611 env[1199]: 2025-07-10 00:48:26.494 [INFO][2682] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.66.3/26] handle="k8s-pod-network.c0121c841a7774af0f2e592e762745eb8d039b6169dca3dba92d3c1cb1bb1614" host="10.0.0.143" Jul 10 00:48:26.510611 env[1199]: 2025-07-10 00:48:26.494 [INFO][2682] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:48:26.510611 env[1199]: 2025-07-10 00:48:26.494 [INFO][2682] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.66.3/26] IPv6=[] ContainerID="c0121c841a7774af0f2e592e762745eb8d039b6169dca3dba92d3c1cb1bb1614" HandleID="k8s-pod-network.c0121c841a7774af0f2e592e762745eb8d039b6169dca3dba92d3c1cb1bb1614" Workload="10.0.0.143-k8s-csi--node--driver--6ghr7-eth0" Jul 10 00:48:26.511162 env[1199]: 2025-07-10 00:48:26.495 [INFO][2668] cni-plugin/k8s.go 418: Populated endpoint ContainerID="c0121c841a7774af0f2e592e762745eb8d039b6169dca3dba92d3c1cb1bb1614" Namespace="calico-system" Pod="csi-node-driver-6ghr7" WorkloadEndpoint="10.0.0.143-k8s-csi--node--driver--6ghr7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-csi--node--driver--6ghr7-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"36da2ccb-1a46-4dff-99a7-99fa203d27fa", ResourceVersion:"1333", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 48, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"57bd658777", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"", Pod:"csi-node-driver-6ghr7", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.66.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali9313fe8d25a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:48:26.511162 env[1199]: 2025-07-10 00:48:26.495 [INFO][2668] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.66.3/32] ContainerID="c0121c841a7774af0f2e592e762745eb8d039b6169dca3dba92d3c1cb1bb1614" Namespace="calico-system" Pod="csi-node-driver-6ghr7" WorkloadEndpoint="10.0.0.143-k8s-csi--node--driver--6ghr7-eth0" Jul 10 00:48:26.511162 env[1199]: 2025-07-10 00:48:26.495 [INFO][2668] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali9313fe8d25a ContainerID="c0121c841a7774af0f2e592e762745eb8d039b6169dca3dba92d3c1cb1bb1614" Namespace="calico-system" Pod="csi-node-driver-6ghr7" WorkloadEndpoint="10.0.0.143-k8s-csi--node--driver--6ghr7-eth0" Jul 10 00:48:26.511162 env[1199]: 2025-07-10 00:48:26.500 [INFO][2668] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c0121c841a7774af0f2e592e762745eb8d039b6169dca3dba92d3c1cb1bb1614" Namespace="calico-system" Pod="csi-node-driver-6ghr7" WorkloadEndpoint="10.0.0.143-k8s-csi--node--driver--6ghr7-eth0" Jul 10 00:48:26.511162 env[1199]: 2025-07-10 00:48:26.500 [INFO][2668] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="c0121c841a7774af0f2e592e762745eb8d039b6169dca3dba92d3c1cb1bb1614" Namespace="calico-system" Pod="csi-node-driver-6ghr7" WorkloadEndpoint="10.0.0.143-k8s-csi--node--driver--6ghr7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-csi--node--driver--6ghr7-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"36da2ccb-1a46-4dff-99a7-99fa203d27fa", ResourceVersion:"1333", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 48, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"57bd658777", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"c0121c841a7774af0f2e592e762745eb8d039b6169dca3dba92d3c1cb1bb1614", Pod:"csi-node-driver-6ghr7", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.66.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali9313fe8d25a", MAC:"e6:10:4d:38:a5:9b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:48:26.511162 env[1199]: 2025-07-10 00:48:26.507 [INFO][2668] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="c0121c841a7774af0f2e592e762745eb8d039b6169dca3dba92d3c1cb1bb1614" Namespace="calico-system" Pod="csi-node-driver-6ghr7" WorkloadEndpoint="10.0.0.143-k8s-csi--node--driver--6ghr7-eth0" Jul 10 00:48:26.516000 audit[2701]: NETFILTER_CFG table=filter:93 family=2 entries=46 op=nft_register_chain pid=2701 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 00:48:26.516000 audit[2701]: SYSCALL arch=c000003e syscall=46 success=yes exit=23740 a0=3 a1=7ffe1db672e0 a2=0 a3=7ffe1db672cc items=0 ppid=2233 pid=2701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:26.516000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 00:48:26.520678 env[1199]: time="2025-07-10T00:48:26.520615095Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 10 00:48:26.520678 env[1199]: time="2025-07-10T00:48:26.520652950Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 10 00:48:26.520678 env[1199]: time="2025-07-10T00:48:26.520663627Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 10 00:48:26.520984 env[1199]: time="2025-07-10T00:48:26.520921787Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c0121c841a7774af0f2e592e762745eb8d039b6169dca3dba92d3c1cb1bb1614 pid=2705 runtime=io.containerd.runc.v2 Jul 10 00:48:26.532380 systemd[1]: Started cri-containerd-c0121c841a7774af0f2e592e762745eb8d039b6169dca3dba92d3c1cb1bb1614.scope. Jul 10 00:48:26.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:26.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:26.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:26.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:26.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:26.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:26.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:26.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:26.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:26.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:26.544000 audit: BPF prog-id=108 op=LOAD Jul 10 00:48:26.544000 audit[2716]: AVC avc: denied { bpf } for pid=2716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:26.544000 audit[2716]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2705 pid=2716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:26.544000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330313231633834316137373734616630663265353932653736323734 Jul 10 00:48:26.544000 audit[2716]: AVC avc: denied { perfmon } for pid=2716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:26.544000 audit[2716]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2705 pid=2716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:26.544000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330313231633834316137373734616630663265353932653736323734 Jul 10 00:48:26.544000 audit[2716]: AVC avc: denied { bpf } for pid=2716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:26.544000 audit[2716]: AVC avc: denied { bpf } for pid=2716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:26.544000 audit[2716]: AVC avc: denied { bpf } for pid=2716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:26.544000 audit[2716]: AVC avc: denied { perfmon } for pid=2716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:26.544000 audit[2716]: AVC avc: denied { perfmon } for pid=2716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:26.544000 audit[2716]: AVC avc: denied { perfmon } for pid=2716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:26.544000 audit[2716]: AVC avc: denied { perfmon } for pid=2716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:26.544000 audit[2716]: AVC avc: denied { perfmon } for pid=2716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:26.544000 audit[2716]: AVC avc: denied { bpf } for pid=2716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:26.544000 audit[2716]: AVC avc: denied { bpf } for pid=2716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:26.544000 audit: BPF prog-id=109 op=LOAD Jul 10 00:48:26.544000 audit[2716]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001df6b0 items=0 ppid=2705 pid=2716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:26.544000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330313231633834316137373734616630663265353932653736323734 Jul 10 00:48:26.545000 audit[2716]: AVC avc: denied { bpf } for pid=2716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:26.545000 audit[2716]: AVC avc: denied { bpf } for pid=2716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:26.545000 audit[2716]: AVC avc: denied { perfmon } for pid=2716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:26.545000 audit[2716]: AVC avc: denied { perfmon } for pid=2716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:26.545000 audit[2716]: AVC avc: denied { perfmon } for pid=2716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:26.545000 audit[2716]: AVC avc: denied { perfmon } for pid=2716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:26.545000 audit[2716]: AVC avc: denied { perfmon } for pid=2716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:26.545000 audit[2716]: AVC avc: denied { bpf } for pid=2716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:26.545000 audit[2716]: AVC avc: denied { bpf } for pid=2716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:26.545000 audit: BPF prog-id=110 op=LOAD Jul 10 00:48:26.545000 audit[2716]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001df6f8 items=0 ppid=2705 pid=2716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:26.545000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330313231633834316137373734616630663265353932653736323734 Jul 10 00:48:26.545000 audit: BPF prog-id=110 op=UNLOAD Jul 10 00:48:26.545000 audit: BPF prog-id=109 op=UNLOAD Jul 10 00:48:26.545000 audit[2716]: AVC avc: denied { bpf } for pid=2716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:26.545000 audit[2716]: AVC avc: denied { bpf } for pid=2716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:26.545000 audit[2716]: AVC avc: denied { bpf } for pid=2716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:26.545000 audit[2716]: AVC avc: denied { perfmon } for pid=2716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:26.545000 audit[2716]: AVC avc: denied { perfmon } for pid=2716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:26.545000 audit[2716]: AVC avc: denied { perfmon } for pid=2716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:26.545000 audit[2716]: AVC avc: denied { perfmon } for pid=2716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:26.545000 audit[2716]: AVC avc: denied { perfmon } for pid=2716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:26.545000 audit[2716]: AVC avc: denied { bpf } for pid=2716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:26.545000 audit[2716]: AVC avc: denied { bpf } for pid=2716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:26.545000 audit: BPF prog-id=111 op=LOAD Jul 10 00:48:26.545000 audit[2716]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001dfb08 items=0 ppid=2705 pid=2716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:26.545000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330313231633834316137373734616630663265353932653736323734 Jul 10 00:48:26.547599 systemd-resolved[1135]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 10 00:48:26.555782 env[1199]: time="2025-07-10T00:48:26.555732795Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6ghr7,Uid:36da2ccb-1a46-4dff-99a7-99fa203d27fa,Namespace:calico-system,Attempt:1,} returns sandbox id \"c0121c841a7774af0f2e592e762745eb8d039b6169dca3dba92d3c1cb1bb1614\"" Jul 10 00:48:26.562647 kubelet[1436]: E0710 00:48:26.562605 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:27.563391 kubelet[1436]: E0710 00:48:27.563328 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:28.553898 systemd-networkd[1025]: cali9313fe8d25a: Gained IPv6LL Jul 10 00:48:28.564481 kubelet[1436]: E0710 00:48:28.564379 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:28.745121 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1048763726.mount: Deactivated successfully. Jul 10 00:48:29.564749 kubelet[1436]: E0710 00:48:29.564709 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:30.565407 kubelet[1436]: E0710 00:48:30.565350 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:30.974614 env[1199]: time="2025-07-10T00:48:30.974499261Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:48:30.976480 env[1199]: time="2025-07-10T00:48:30.976443349Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f6422896ca84c9af48d5417d6b7a573bf6b38f81edc15538907d987fc658d909,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:48:30.980422 env[1199]: time="2025-07-10T00:48:30.980381245Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:48:30.981927 env[1199]: time="2025-07-10T00:48:30.981891409Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:30bb68e656e0665bce700e67d2756f68bdca3345fa1099a32bfdb8febcf621cd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:48:30.982550 env[1199]: time="2025-07-10T00:48:30.982518835Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:f6422896ca84c9af48d5417d6b7a573bf6b38f81edc15538907d987fc658d909\"" Jul 10 00:48:30.983842 env[1199]: time="2025-07-10T00:48:30.983804517Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.2\"" Jul 10 00:48:30.984617 env[1199]: time="2025-07-10T00:48:30.984590644Z" level=info msg="CreateContainer within sandbox \"2ac319311d35b16aec9c009db5d2e01e2b76282af526d70a813356f5a59131b3\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Jul 10 00:48:30.996445 env[1199]: time="2025-07-10T00:48:30.996390605Z" level=info msg="CreateContainer within sandbox \"2ac319311d35b16aec9c009db5d2e01e2b76282af526d70a813356f5a59131b3\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"8f3d22267af3dd703580c954ed245a18acc9719d54fca9860ca6d03ba1ba114f\"" Jul 10 00:48:30.996962 env[1199]: time="2025-07-10T00:48:30.996907425Z" level=info msg="StartContainer for \"8f3d22267af3dd703580c954ed245a18acc9719d54fca9860ca6d03ba1ba114f\"" Jul 10 00:48:31.012070 systemd[1]: Started cri-containerd-8f3d22267af3dd703580c954ed245a18acc9719d54fca9860ca6d03ba1ba114f.scope. Jul 10 00:48:31.027674 kernel: kauditd_printk_skb: 170 callbacks suppressed Jul 10 00:48:31.027774 kernel: audit: type=1400 audit(1752108511.023:721): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:31.027798 kernel: audit: type=1400 audit(1752108511.023:722): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:31.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:31.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:31.030378 kernel: audit: type=1400 audit(1752108511.023:723): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:31.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:31.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:31.035952 kernel: audit: type=1400 audit(1752108511.023:724): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:31.035993 kernel: audit: type=1400 audit(1752108511.023:725): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:31.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:31.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:31.041633 kernel: audit: type=1400 audit(1752108511.023:726): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:31.041684 kernel: audit: type=1400 audit(1752108511.023:727): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:31.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:31.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:31.047185 kernel: audit: type=1400 audit(1752108511.023:728): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:31.047320 kernel: audit: type=1400 audit(1752108511.023:729): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:31.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:31.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:31.052608 kernel: audit: type=1400 audit(1752108511.024:730): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:31.027000 audit: BPF prog-id=112 op=LOAD Jul 10 00:48:31.027000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:31.027000 audit[2747]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2496 pid=2747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:31.027000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866336432323236376166336464373033353830633935346564323435 Jul 10 00:48:31.027000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:31.027000 audit[2747]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2496 pid=2747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:31.027000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866336432323236376166336464373033353830633935346564323435 Jul 10 00:48:31.027000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:31.027000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:31.027000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:31.027000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:31.027000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:31.027000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:31.027000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:31.027000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:31.027000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:31.027000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:31.027000 audit: BPF prog-id=113 op=LOAD Jul 10 00:48:31.027000 audit[2747]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000255d10 items=0 ppid=2496 pid=2747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:31.027000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866336432323236376166336464373033353830633935346564323435 Jul 10 00:48:31.033000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:31.033000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:31.033000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:31.033000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:31.033000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:31.033000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:31.033000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:31.033000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:31.033000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:31.033000 audit: BPF prog-id=114 op=LOAD Jul 10 00:48:31.033000 audit[2747]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000255d58 items=0 ppid=2496 pid=2747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:31.033000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866336432323236376166336464373033353830633935346564323435 Jul 10 00:48:31.038000 audit: BPF prog-id=114 op=UNLOAD Jul 10 00:48:31.038000 audit: BPF prog-id=113 op=UNLOAD Jul 10 00:48:31.038000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:31.038000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:31.038000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:31.038000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:31.038000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:31.038000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:31.038000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:31.038000 audit[2747]: AVC avc: denied { perfmon } for pid=2747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:31.038000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:31.038000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:31.038000 audit: BPF prog-id=115 op=LOAD Jul 10 00:48:31.038000 audit[2747]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003c2168 items=0 ppid=2496 pid=2747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:31.038000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866336432323236376166336464373033353830633935346564323435 Jul 10 00:48:31.063314 env[1199]: time="2025-07-10T00:48:31.063272116Z" level=info msg="StartContainer for \"8f3d22267af3dd703580c954ed245a18acc9719d54fca9860ca6d03ba1ba114f\" returns successfully" Jul 10 00:48:31.183606 kubelet[1436]: I0710 00:48:31.183539 1436 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-8587fbcb89-7z2fh" podStartSLOduration=12.876020068 podStartE2EDuration="19.183523502s" podCreationTimestamp="2025-07-10 00:48:12 +0000 UTC" firstStartedPulling="2025-07-10 00:48:24.675980019 +0000 UTC m=+25.742266282" lastFinishedPulling="2025-07-10 00:48:30.983483444 +0000 UTC m=+32.049769716" observedRunningTime="2025-07-10 00:48:31.183480492 +0000 UTC m=+32.249766764" watchObservedRunningTime="2025-07-10 00:48:31.183523502 +0000 UTC m=+32.249809774" Jul 10 00:48:31.565813 kubelet[1436]: E0710 00:48:31.565778 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:32.566111 kubelet[1436]: E0710 00:48:32.566064 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:33.566267 kubelet[1436]: E0710 00:48:33.566213 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:33.641883 env[1199]: time="2025-07-10T00:48:33.641831178Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:48:33.643635 env[1199]: time="2025-07-10T00:48:33.643588881Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5509118eed617ef04ca00f5a095bfd0a4cd1cf69edcfcf9bedf0edb641be51dd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:48:33.645246 env[1199]: time="2025-07-10T00:48:33.645208802Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:48:33.646938 env[1199]: time="2025-07-10T00:48:33.646893213Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:ec6b10660962e7caad70c47755049fad68f9fc2f7064e8bc7cb862583e02cc2b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:48:33.647391 env[1199]: time="2025-07-10T00:48:33.647348613Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.2\" returns image reference \"sha256:5509118eed617ef04ca00f5a095bfd0a4cd1cf69edcfcf9bedf0edb641be51dd\"" Jul 10 00:48:33.648550 env[1199]: time="2025-07-10T00:48:33.648507008Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.2\"" Jul 10 00:48:33.649557 env[1199]: time="2025-07-10T00:48:33.649511251Z" level=info msg="CreateContainer within sandbox \"798f3d5a1afd2450d322de77d326f65b7741b3ed963b32623a9f2a6ce4e717cd\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Jul 10 00:48:33.663507 env[1199]: time="2025-07-10T00:48:33.663470431Z" level=info msg="CreateContainer within sandbox \"798f3d5a1afd2450d322de77d326f65b7741b3ed963b32623a9f2a6ce4e717cd\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"a7d96c1ec5135b609fd6740789dd2aeea5a45a6c0793249dfb06e5d087d27577\"" Jul 10 00:48:33.663910 env[1199]: time="2025-07-10T00:48:33.663870153Z" level=info msg="StartContainer for \"a7d96c1ec5135b609fd6740789dd2aeea5a45a6c0793249dfb06e5d087d27577\"" Jul 10 00:48:33.685200 systemd[1]: Started cri-containerd-a7d96c1ec5135b609fd6740789dd2aeea5a45a6c0793249dfb06e5d087d27577.scope. Jul 10 00:48:33.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:33.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:33.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:33.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:33.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:33.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:33.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:33.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:33.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:33.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:33.693000 audit: BPF prog-id=116 op=LOAD Jul 10 00:48:33.693000 audit[2811]: AVC avc: denied { bpf } for pid=2811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:33.693000 audit[2811]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2599 pid=2811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:33.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137643936633165633531333562363039666436373430373839646432 Jul 10 00:48:33.694000 audit[2811]: AVC avc: denied { perfmon } for pid=2811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:33.694000 audit[2811]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2599 pid=2811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:33.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137643936633165633531333562363039666436373430373839646432 Jul 10 00:48:33.694000 audit[2811]: AVC avc: denied { bpf } for pid=2811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:33.694000 audit[2811]: AVC avc: denied { bpf } for pid=2811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:33.694000 audit[2811]: AVC avc: denied { bpf } for pid=2811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:33.694000 audit[2811]: AVC avc: denied { perfmon } for pid=2811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:33.694000 audit[2811]: AVC avc: denied { perfmon } for pid=2811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:33.694000 audit[2811]: AVC avc: denied { perfmon } for pid=2811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:33.694000 audit[2811]: AVC avc: denied { perfmon } for pid=2811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:33.694000 audit[2811]: AVC avc: denied { perfmon } for pid=2811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:33.694000 audit[2811]: AVC avc: denied { bpf } for pid=2811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:33.694000 audit[2811]: AVC avc: denied { bpf } for pid=2811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:33.694000 audit: BPF prog-id=117 op=LOAD Jul 10 00:48:33.694000 audit[2811]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003e40d0 items=0 ppid=2599 pid=2811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:33.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137643936633165633531333562363039666436373430373839646432 Jul 10 00:48:33.694000 audit[2811]: AVC avc: denied { bpf } for pid=2811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:33.694000 audit[2811]: AVC avc: denied { bpf } for pid=2811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:33.694000 audit[2811]: AVC avc: denied { perfmon } for pid=2811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:33.694000 audit[2811]: AVC avc: denied { perfmon } for pid=2811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:33.694000 audit[2811]: AVC avc: denied { perfmon } for pid=2811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:33.694000 audit[2811]: AVC avc: denied { perfmon } for pid=2811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:33.694000 audit[2811]: AVC avc: denied { perfmon } for pid=2811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:33.694000 audit[2811]: AVC avc: denied { bpf } for pid=2811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:33.694000 audit[2811]: AVC avc: denied { bpf } for pid=2811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:33.694000 audit: BPF prog-id=118 op=LOAD Jul 10 00:48:33.694000 audit[2811]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003e4118 items=0 ppid=2599 pid=2811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:33.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137643936633165633531333562363039666436373430373839646432 Jul 10 00:48:33.694000 audit: BPF prog-id=118 op=UNLOAD Jul 10 00:48:33.694000 audit: BPF prog-id=117 op=UNLOAD Jul 10 00:48:33.694000 audit[2811]: AVC avc: denied { bpf } for pid=2811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:33.694000 audit[2811]: AVC avc: denied { bpf } for pid=2811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:33.694000 audit[2811]: AVC avc: denied { bpf } for pid=2811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:33.694000 audit[2811]: AVC avc: denied { perfmon } for pid=2811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:33.694000 audit[2811]: AVC avc: denied { perfmon } for pid=2811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:33.694000 audit[2811]: AVC avc: denied { perfmon } for pid=2811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:33.694000 audit[2811]: AVC avc: denied { perfmon } for pid=2811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:33.694000 audit[2811]: AVC avc: denied { perfmon } for pid=2811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:33.694000 audit[2811]: AVC avc: denied { bpf } for pid=2811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:33.694000 audit[2811]: AVC avc: denied { bpf } for pid=2811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:33.694000 audit: BPF prog-id=119 op=LOAD Jul 10 00:48:33.694000 audit[2811]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003e4528 items=0 ppid=2599 pid=2811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:33.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137643936633165633531333562363039666436373430373839646432 Jul 10 00:48:33.718238 env[1199]: time="2025-07-10T00:48:33.718178860Z" level=info msg="StartContainer for \"a7d96c1ec5135b609fd6740789dd2aeea5a45a6c0793249dfb06e5d087d27577\" returns successfully" Jul 10 00:48:34.196615 kubelet[1436]: I0710 00:48:34.196555 1436 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-67c56776df-gs6gv" podStartSLOduration=13.879350652 podStartE2EDuration="22.196537266s" podCreationTimestamp="2025-07-10 00:48:12 +0000 UTC" firstStartedPulling="2025-07-10 00:48:25.331105943 +0000 UTC m=+26.397392215" lastFinishedPulling="2025-07-10 00:48:33.648292547 +0000 UTC m=+34.714578829" observedRunningTime="2025-07-10 00:48:34.196356924 +0000 UTC m=+35.262643196" watchObservedRunningTime="2025-07-10 00:48:34.196537266 +0000 UTC m=+35.262823538" Jul 10 00:48:34.209000 audit[2846]: NETFILTER_CFG table=filter:94 family=2 entries=10 op=nft_register_rule pid=2846 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:48:34.209000 audit[2846]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffc30abe090 a2=0 a3=7ffc30abe07c items=0 ppid=1662 pid=2846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:34.209000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:48:34.214000 audit[2846]: NETFILTER_CFG table=nat:95 family=2 entries=38 op=nft_register_rule pid=2846 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:48:34.214000 audit[2846]: SYSCALL arch=c000003e syscall=46 success=yes exit=12004 a0=3 a1=7ffc30abe090 a2=0 a3=7ffc30abe07c items=0 ppid=1662 pid=2846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:34.214000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:48:34.567171 kubelet[1436]: E0710 00:48:34.567117 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:34.703000 audit[2822]: AVC avc: denied { watch } for pid=2822 comm="apiserver" path="/calico-apiserver-certs/..2025_07_10_00_48_12.2317855979/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c102,c185 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c102,c185 tclass=file permissive=0 Jul 10 00:48:34.703000 audit[2822]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0001184a0 a2=fc6 a3=0 items=0 ppid=2599 pid=2822 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c102,c185 key=(null) Jul 10 00:48:34.703000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 10 00:48:35.189451 kubelet[1436]: I0710 00:48:35.189412 1436 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 10 00:48:35.520305 env[1199]: time="2025-07-10T00:48:35.520248026Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:48:35.522157 env[1199]: time="2025-07-10T00:48:35.522113842Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c7fd1cc652979d89a51bbcc125e28e90c9815c0bd8f922a5bd36eed4e1927c6d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:48:35.523676 env[1199]: time="2025-07-10T00:48:35.523641839Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:48:35.525055 env[1199]: time="2025-07-10T00:48:35.525020887Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e570128aa8067a2f06b96d3cc98afa2e0a4b9790b435ee36ca051c8e72aeb8d0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:48:35.525490 env[1199]: time="2025-07-10T00:48:35.525456271Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.2\" returns image reference \"sha256:c7fd1cc652979d89a51bbcc125e28e90c9815c0bd8f922a5bd36eed4e1927c6d\"" Jul 10 00:48:35.527312 env[1199]: time="2025-07-10T00:48:35.527280195Z" level=info msg="CreateContainer within sandbox \"c0121c841a7774af0f2e592e762745eb8d039b6169dca3dba92d3c1cb1bb1614\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Jul 10 00:48:35.540720 env[1199]: time="2025-07-10T00:48:35.540681850Z" level=info msg="CreateContainer within sandbox \"c0121c841a7774af0f2e592e762745eb8d039b6169dca3dba92d3c1cb1bb1614\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"0c993f3f184a3b2f573c91106c16fa1248f476ca23733c4914142d1eedfed781\"" Jul 10 00:48:35.541069 env[1199]: time="2025-07-10T00:48:35.541013393Z" level=info msg="StartContainer for \"0c993f3f184a3b2f573c91106c16fa1248f476ca23733c4914142d1eedfed781\"" Jul 10 00:48:35.556374 systemd[1]: Started cri-containerd-0c993f3f184a3b2f573c91106c16fa1248f476ca23733c4914142d1eedfed781.scope. Jul 10 00:48:35.567349 kubelet[1436]: E0710 00:48:35.567293 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:35.567000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:35.567000 audit[2855]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fb5ea8b8a18 items=0 ppid=2705 pid=2855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:35.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063393933663366313834613362326635373363393131303663313666 Jul 10 00:48:35.567000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:35.567000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:35.567000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:35.567000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:35.567000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:35.567000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:35.567000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:35.567000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:35.567000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:35.567000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:35.567000 audit: BPF prog-id=120 op=LOAD Jul 10 00:48:35.567000 audit[2855]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0000dfba8 items=0 ppid=2705 pid=2855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:35.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063393933663366313834613362326635373363393131303663313666 Jul 10 00:48:35.567000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:35.567000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:35.567000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:35.567000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:35.567000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:35.567000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:35.567000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:35.567000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:35.567000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:35.567000 audit: BPF prog-id=121 op=LOAD Jul 10 00:48:35.567000 audit[2855]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0000dfbf8 items=0 ppid=2705 pid=2855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:35.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063393933663366313834613362326635373363393131303663313666 Jul 10 00:48:35.567000 audit: BPF prog-id=121 op=UNLOAD Jul 10 00:48:35.567000 audit: BPF prog-id=120 op=UNLOAD Jul 10 00:48:35.567000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:35.567000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:35.567000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:35.567000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:35.567000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:35.567000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:35.567000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:35.567000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:35.567000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:35.567000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:35.567000 audit: BPF prog-id=122 op=LOAD Jul 10 00:48:35.567000 audit[2855]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0000dfc88 items=0 ppid=2705 pid=2855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:35.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063393933663366313834613362326635373363393131303663313666 Jul 10 00:48:35.580489 env[1199]: time="2025-07-10T00:48:35.580424435Z" level=info msg="StartContainer for \"0c993f3f184a3b2f573c91106c16fa1248f476ca23733c4914142d1eedfed781\" returns successfully" Jul 10 00:48:35.581856 env[1199]: time="2025-07-10T00:48:35.581821547Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2\"" Jul 10 00:48:36.388000 audit[2886]: NETFILTER_CFG table=filter:96 family=2 entries=22 op=nft_register_rule pid=2886 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:48:36.392621 kernel: kauditd_printk_skb: 156 callbacks suppressed Jul 10 00:48:36.392694 kernel: audit: type=1325 audit(1752108516.388:766): table=filter:96 family=2 entries=22 op=nft_register_rule pid=2886 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:48:36.392722 kernel: audit: type=1300 audit(1752108516.388:766): arch=c000003e syscall=46 success=yes exit=12688 a0=3 a1=7fff69166f60 a2=0 a3=7fff69166f4c items=0 ppid=1662 pid=2886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:36.388000 audit[2886]: SYSCALL arch=c000003e syscall=46 success=yes exit=12688 a0=3 a1=7fff69166f60 a2=0 a3=7fff69166f4c items=0 ppid=1662 pid=2886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:36.388000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:48:36.399267 kernel: audit: type=1327 audit(1752108516.388:766): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:48:36.401000 audit[2886]: NETFILTER_CFG table=nat:97 family=2 entries=24 op=nft_register_rule pid=2886 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:48:36.401000 audit[2886]: SYSCALL arch=c000003e syscall=46 success=yes exit=7308 a0=3 a1=7fff69166f60 a2=0 a3=0 items=0 ppid=1662 pid=2886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:36.408839 kernel: audit: type=1325 audit(1752108516.401:767): table=nat:97 family=2 entries=24 op=nft_register_rule pid=2886 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:48:36.408883 kernel: audit: type=1300 audit(1752108516.401:767): arch=c000003e syscall=46 success=yes exit=7308 a0=3 a1=7fff69166f60 a2=0 a3=0 items=0 ppid=1662 pid=2886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:36.408903 kernel: audit: type=1327 audit(1752108516.401:767): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:48:36.401000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:48:36.420000 audit[2888]: NETFILTER_CFG table=filter:98 family=2 entries=34 op=nft_register_rule pid=2888 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:48:36.420000 audit[2888]: SYSCALL arch=c000003e syscall=46 success=yes exit=12688 a0=3 a1=7fff93462b80 a2=0 a3=7fff93462b6c items=0 ppid=1662 pid=2888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:36.427624 kernel: audit: type=1325 audit(1752108516.420:768): table=filter:98 family=2 entries=34 op=nft_register_rule pid=2888 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:48:36.427671 kernel: audit: type=1300 audit(1752108516.420:768): arch=c000003e syscall=46 success=yes exit=12688 a0=3 a1=7fff93462b80 a2=0 a3=7fff93462b6c items=0 ppid=1662 pid=2888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:36.427692 kernel: audit: type=1327 audit(1752108516.420:768): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:48:36.420000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:48:36.431000 audit[2888]: NETFILTER_CFG table=nat:99 family=2 entries=24 op=nft_register_rule pid=2888 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:48:36.431000 audit[2888]: SYSCALL arch=c000003e syscall=46 success=yes exit=7308 a0=3 a1=7fff93462b80 a2=0 a3=0 items=0 ppid=1662 pid=2888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:36.434440 kernel: audit: type=1325 audit(1752108516.431:769): table=nat:99 family=2 entries=24 op=nft_register_rule pid=2888 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:48:36.431000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:48:36.439976 systemd[1]: Created slice kubepods-besteffort-pod4d477b08_cb4f_443c_9961_f439e598d7ac.slice. Jul 10 00:48:36.481922 kubelet[1436]: I0710 00:48:36.481884 1436 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/4d477b08-cb4f-443c-9961-f439e598d7ac-data\") pod \"nfs-server-provisioner-0\" (UID: \"4d477b08-cb4f-443c-9961-f439e598d7ac\") " pod="default/nfs-server-provisioner-0" Jul 10 00:48:36.482080 kubelet[1436]: I0710 00:48:36.481935 1436 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9j7km\" (UniqueName: \"kubernetes.io/projected/4d477b08-cb4f-443c-9961-f439e598d7ac-kube-api-access-9j7km\") pod \"nfs-server-provisioner-0\" (UID: \"4d477b08-cb4f-443c-9961-f439e598d7ac\") " pod="default/nfs-server-provisioner-0" Jul 10 00:48:36.567429 kubelet[1436]: E0710 00:48:36.567388 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:36.742959 env[1199]: time="2025-07-10T00:48:36.742899992Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:4d477b08-cb4f-443c-9961-f439e598d7ac,Namespace:default,Attempt:0,}" Jul 10 00:48:36.854913 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 10 00:48:36.855024 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Jul 10 00:48:36.852408 systemd-networkd[1025]: cali60e51b789ff: Link UP Jul 10 00:48:36.855197 systemd-networkd[1025]: cali60e51b789ff: Gained carrier Jul 10 00:48:36.869617 env[1199]: 2025-07-10 00:48:36.800 [INFO][2892] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.143-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 4d477b08-cb4f-443c-9961-f439e598d7ac 1393 0 2025-07-10 00:48:36 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.0.0.143 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="261215b83861b64da7b0e79de638912cf9e787eb75dd321ed1b1e1a6093b76df" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.143-k8s-nfs--server--provisioner--0-" Jul 10 00:48:36.869617 env[1199]: 2025-07-10 00:48:36.800 [INFO][2892] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="261215b83861b64da7b0e79de638912cf9e787eb75dd321ed1b1e1a6093b76df" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.143-k8s-nfs--server--provisioner--0-eth0" Jul 10 00:48:36.869617 env[1199]: 2025-07-10 00:48:36.820 [INFO][2908] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="261215b83861b64da7b0e79de638912cf9e787eb75dd321ed1b1e1a6093b76df" HandleID="k8s-pod-network.261215b83861b64da7b0e79de638912cf9e787eb75dd321ed1b1e1a6093b76df" Workload="10.0.0.143-k8s-nfs--server--provisioner--0-eth0" Jul 10 00:48:36.869617 env[1199]: 2025-07-10 00:48:36.820 [INFO][2908] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="261215b83861b64da7b0e79de638912cf9e787eb75dd321ed1b1e1a6093b76df" HandleID="k8s-pod-network.261215b83861b64da7b0e79de638912cf9e787eb75dd321ed1b1e1a6093b76df" Workload="10.0.0.143-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000139420), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.143", "pod":"nfs-server-provisioner-0", "timestamp":"2025-07-10 00:48:36.820390344 +0000 UTC"}, Hostname:"10.0.0.143", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 10 00:48:36.869617 env[1199]: 2025-07-10 00:48:36.820 [INFO][2908] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:48:36.869617 env[1199]: 2025-07-10 00:48:36.820 [INFO][2908] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:48:36.869617 env[1199]: 2025-07-10 00:48:36.820 [INFO][2908] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.143' Jul 10 00:48:36.869617 env[1199]: 2025-07-10 00:48:36.826 [INFO][2908] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.261215b83861b64da7b0e79de638912cf9e787eb75dd321ed1b1e1a6093b76df" host="10.0.0.143" Jul 10 00:48:36.869617 env[1199]: 2025-07-10 00:48:36.830 [INFO][2908] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.143" Jul 10 00:48:36.869617 env[1199]: 2025-07-10 00:48:36.834 [INFO][2908] ipam/ipam.go 511: Trying affinity for 192.168.66.0/26 host="10.0.0.143" Jul 10 00:48:36.869617 env[1199]: 2025-07-10 00:48:36.835 [INFO][2908] ipam/ipam.go 158: Attempting to load block cidr=192.168.66.0/26 host="10.0.0.143" Jul 10 00:48:36.869617 env[1199]: 2025-07-10 00:48:36.837 [INFO][2908] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.66.0/26 host="10.0.0.143" Jul 10 00:48:36.869617 env[1199]: 2025-07-10 00:48:36.837 [INFO][2908] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.66.0/26 handle="k8s-pod-network.261215b83861b64da7b0e79de638912cf9e787eb75dd321ed1b1e1a6093b76df" host="10.0.0.143" Jul 10 00:48:36.869617 env[1199]: 2025-07-10 00:48:36.838 [INFO][2908] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.261215b83861b64da7b0e79de638912cf9e787eb75dd321ed1b1e1a6093b76df Jul 10 00:48:36.869617 env[1199]: 2025-07-10 00:48:36.843 [INFO][2908] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.66.0/26 handle="k8s-pod-network.261215b83861b64da7b0e79de638912cf9e787eb75dd321ed1b1e1a6093b76df" host="10.0.0.143" Jul 10 00:48:36.869617 env[1199]: 2025-07-10 00:48:36.848 [INFO][2908] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.66.4/26] block=192.168.66.0/26 handle="k8s-pod-network.261215b83861b64da7b0e79de638912cf9e787eb75dd321ed1b1e1a6093b76df" host="10.0.0.143" Jul 10 00:48:36.869617 env[1199]: 2025-07-10 00:48:36.848 [INFO][2908] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.66.4/26] handle="k8s-pod-network.261215b83861b64da7b0e79de638912cf9e787eb75dd321ed1b1e1a6093b76df" host="10.0.0.143" Jul 10 00:48:36.869617 env[1199]: 2025-07-10 00:48:36.848 [INFO][2908] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:48:36.869617 env[1199]: 2025-07-10 00:48:36.848 [INFO][2908] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.66.4/26] IPv6=[] ContainerID="261215b83861b64da7b0e79de638912cf9e787eb75dd321ed1b1e1a6093b76df" HandleID="k8s-pod-network.261215b83861b64da7b0e79de638912cf9e787eb75dd321ed1b1e1a6093b76df" Workload="10.0.0.143-k8s-nfs--server--provisioner--0-eth0" Jul 10 00:48:36.870156 env[1199]: 2025-07-10 00:48:36.850 [INFO][2892] cni-plugin/k8s.go 418: Populated endpoint ContainerID="261215b83861b64da7b0e79de638912cf9e787eb75dd321ed1b1e1a6093b76df" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.143-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"4d477b08-cb4f-443c-9961-f439e598d7ac", ResourceVersion:"1393", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 48, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.66.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:48:36.870156 env[1199]: 2025-07-10 00:48:36.850 [INFO][2892] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.66.4/32] ContainerID="261215b83861b64da7b0e79de638912cf9e787eb75dd321ed1b1e1a6093b76df" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.143-k8s-nfs--server--provisioner--0-eth0" Jul 10 00:48:36.870156 env[1199]: 2025-07-10 00:48:36.850 [INFO][2892] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="261215b83861b64da7b0e79de638912cf9e787eb75dd321ed1b1e1a6093b76df" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.143-k8s-nfs--server--provisioner--0-eth0" Jul 10 00:48:36.870156 env[1199]: 2025-07-10 00:48:36.855 [INFO][2892] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="261215b83861b64da7b0e79de638912cf9e787eb75dd321ed1b1e1a6093b76df" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.143-k8s-nfs--server--provisioner--0-eth0" Jul 10 00:48:36.870352 env[1199]: 2025-07-10 00:48:36.855 [INFO][2892] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="261215b83861b64da7b0e79de638912cf9e787eb75dd321ed1b1e1a6093b76df" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.143-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"4d477b08-cb4f-443c-9961-f439e598d7ac", ResourceVersion:"1393", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 48, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"261215b83861b64da7b0e79de638912cf9e787eb75dd321ed1b1e1a6093b76df", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.66.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"52:3f:2b:72:08:e7", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:48:36.870352 env[1199]: 2025-07-10 00:48:36.868 [INFO][2892] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="261215b83861b64da7b0e79de638912cf9e787eb75dd321ed1b1e1a6093b76df" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.143-k8s-nfs--server--provisioner--0-eth0" Jul 10 00:48:36.879719 env[1199]: time="2025-07-10T00:48:36.879647520Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 10 00:48:36.879719 env[1199]: time="2025-07-10T00:48:36.879721527Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 10 00:48:36.879917 env[1199]: time="2025-07-10T00:48:36.879745816Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 10 00:48:36.880631 env[1199]: time="2025-07-10T00:48:36.880581886Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/261215b83861b64da7b0e79de638912cf9e787eb75dd321ed1b1e1a6093b76df pid=2932 runtime=io.containerd.runc.v2 Jul 10 00:48:36.879000 audit[2938]: NETFILTER_CFG table=filter:100 family=2 entries=44 op=nft_register_chain pid=2938 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 00:48:36.879000 audit[2938]: SYSCALL arch=c000003e syscall=46 success=yes exit=21944 a0=3 a1=7ffc01b26dc0 a2=0 a3=7ffc01b26dac items=0 ppid=2233 pid=2938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:36.879000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 00:48:36.899679 systemd[1]: Started cri-containerd-261215b83861b64da7b0e79de638912cf9e787eb75dd321ed1b1e1a6093b76df.scope. Jul 10 00:48:36.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:36.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:36.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:36.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:36.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:36.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:36.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:36.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:36.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:36.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:36.907000 audit: BPF prog-id=123 op=LOAD Jul 10 00:48:36.907000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:36.907000 audit[2943]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2932 pid=2943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:36.907000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236313231356238333836316236346461376230653739646536333839 Jul 10 00:48:36.907000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:36.907000 audit[2943]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2932 pid=2943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:36.907000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236313231356238333836316236346461376230653739646536333839 Jul 10 00:48:36.907000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:36.907000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:36.907000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:36.907000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:36.907000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:36.907000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:36.907000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:36.907000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:36.907000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:36.907000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:36.907000 audit: BPF prog-id=124 op=LOAD Jul 10 00:48:36.907000 audit[2943]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000383420 items=0 ppid=2932 pid=2943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:36.907000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236313231356238333836316236346461376230653739646536333839 Jul 10 00:48:36.907000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:36.907000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:36.907000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:36.907000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:36.907000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:36.907000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:36.907000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:36.907000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:36.907000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:36.907000 audit: BPF prog-id=125 op=LOAD Jul 10 00:48:36.907000 audit[2943]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000383468 items=0 ppid=2932 pid=2943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:36.907000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236313231356238333836316236346461376230653739646536333839 Jul 10 00:48:36.908000 audit: BPF prog-id=125 op=UNLOAD Jul 10 00:48:36.908000 audit: BPF prog-id=124 op=UNLOAD Jul 10 00:48:36.908000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:36.908000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:36.908000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:36.908000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:36.908000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:36.908000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:36.908000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:36.908000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:36.908000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:36.908000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:36.908000 audit: BPF prog-id=126 op=LOAD Jul 10 00:48:36.908000 audit[2943]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000383878 items=0 ppid=2932 pid=2943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:36.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236313231356238333836316236346461376230653739646536333839 Jul 10 00:48:36.910114 systemd-resolved[1135]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 10 00:48:36.929956 env[1199]: time="2025-07-10T00:48:36.929908859Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:4d477b08-cb4f-443c-9961-f439e598d7ac,Namespace:default,Attempt:0,} returns sandbox id \"261215b83861b64da7b0e79de638912cf9e787eb75dd321ed1b1e1a6093b76df\"" Jul 10 00:48:37.127958 env[1199]: time="2025-07-10T00:48:37.127809082Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:48:37.129906 env[1199]: time="2025-07-10T00:48:37.129865538Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9e48822a4fe26f4ed9231b361fdd1357ea3567f1fc0a8db4d616622fe570a866,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:48:37.131181 env[1199]: time="2025-07-10T00:48:37.131122341Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:48:37.132469 env[1199]: time="2025-07-10T00:48:37.132437322Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:8fec2de12dfa51bae89d941938a07af2598eb8bfcab55d0dded1d9c193d7b99f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:48:37.132980 env[1199]: time="2025-07-10T00:48:37.132936142Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.2\" returns image reference \"sha256:9e48822a4fe26f4ed9231b361fdd1357ea3567f1fc0a8db4d616622fe570a866\"" Jul 10 00:48:37.134081 env[1199]: time="2025-07-10T00:48:37.134049435Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Jul 10 00:48:37.134913 env[1199]: time="2025-07-10T00:48:37.134868172Z" level=info msg="CreateContainer within sandbox \"c0121c841a7774af0f2e592e762745eb8d039b6169dca3dba92d3c1cb1bb1614\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Jul 10 00:48:37.148156 env[1199]: time="2025-07-10T00:48:37.148120995Z" level=info msg="CreateContainer within sandbox \"c0121c841a7774af0f2e592e762745eb8d039b6169dca3dba92d3c1cb1bb1614\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"bd97634616bb39bc5f62d3a6b77d25c5146080a74bb45c67c5d9fcfe0b99da8d\"" Jul 10 00:48:37.148594 env[1199]: time="2025-07-10T00:48:37.148565025Z" level=info msg="StartContainer for \"bd97634616bb39bc5f62d3a6b77d25c5146080a74bb45c67c5d9fcfe0b99da8d\"" Jul 10 00:48:37.164537 systemd[1]: Started cri-containerd-bd97634616bb39bc5f62d3a6b77d25c5146080a74bb45c67c5d9fcfe0b99da8d.scope. Jul 10 00:48:37.177000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:37.177000 audit[2976]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fbd84db4688 items=0 ppid=2705 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:37.177000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264393736333436313662623339626335663632643361366237376432 Jul 10 00:48:37.177000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:37.177000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:37.177000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:37.177000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:37.177000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:37.177000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:37.177000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:37.177000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:37.177000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:37.177000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:37.177000 audit: BPF prog-id=127 op=LOAD Jul 10 00:48:37.177000 audit[2976]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002935b8 items=0 ppid=2705 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:37.177000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264393736333436313662623339626335663632643361366237376432 Jul 10 00:48:37.177000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:37.177000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:37.177000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:37.177000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:37.177000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:37.177000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:37.177000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:37.177000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:37.177000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:37.177000 audit: BPF prog-id=128 op=LOAD Jul 10 00:48:37.177000 audit[2976]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000293608 items=0 ppid=2705 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:37.177000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264393736333436313662623339626335663632643361366237376432 Jul 10 00:48:37.177000 audit: BPF prog-id=128 op=UNLOAD Jul 10 00:48:37.177000 audit: BPF prog-id=127 op=UNLOAD Jul 10 00:48:37.177000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:37.177000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:37.177000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:37.177000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:37.177000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:37.177000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:37.177000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:37.177000 audit[2976]: AVC avc: denied { perfmon } for pid=2976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:37.177000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:37.177000 audit[2976]: AVC avc: denied { bpf } for pid=2976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:37.177000 audit: BPF prog-id=129 op=LOAD Jul 10 00:48:37.177000 audit[2976]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000293698 items=0 ppid=2705 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:37.177000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264393736333436313662623339626335663632643361366237376432 Jul 10 00:48:37.227809 env[1199]: time="2025-07-10T00:48:37.227753308Z" level=info msg="StartContainer for \"bd97634616bb39bc5f62d3a6b77d25c5146080a74bb45c67c5d9fcfe0b99da8d\" returns successfully" Jul 10 00:48:37.567848 kubelet[1436]: E0710 00:48:37.567796 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:38.073256 kubelet[1436]: I0710 00:48:38.073196 1436 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Jul 10 00:48:38.073256 kubelet[1436]: I0710 00:48:38.073253 1436 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Jul 10 00:48:38.263006 kubelet[1436]: I0710 00:48:38.262933 1436 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-6ghr7" podStartSLOduration=27.686113924 podStartE2EDuration="38.262915104s" podCreationTimestamp="2025-07-10 00:48:00 +0000 UTC" firstStartedPulling="2025-07-10 00:48:26.557003166 +0000 UTC m=+27.623289438" lastFinishedPulling="2025-07-10 00:48:37.133804346 +0000 UTC m=+38.200090618" observedRunningTime="2025-07-10 00:48:38.262560304 +0000 UTC m=+39.328846576" watchObservedRunningTime="2025-07-10 00:48:38.262915104 +0000 UTC m=+39.329201376" Jul 10 00:48:38.276635 systemd-networkd[1025]: cali60e51b789ff: Gained IPv6LL Jul 10 00:48:38.494000 audit[3008]: NETFILTER_CFG table=filter:101 family=2 entries=33 op=nft_register_rule pid=3008 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:48:38.494000 audit[3008]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffc8c8cb5e0 a2=0 a3=7ffc8c8cb5cc items=0 ppid=1662 pid=3008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:38.494000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:48:38.499000 audit[3008]: NETFILTER_CFG table=nat:102 family=2 entries=31 op=nft_register_chain pid=3008 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:48:38.499000 audit[3008]: SYSCALL arch=c000003e syscall=46 success=yes exit=10884 a0=3 a1=7ffc8c8cb5e0 a2=0 a3=7ffc8c8cb5cc items=0 ppid=1662 pid=3008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:38.499000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:48:38.568183 kubelet[1436]: E0710 00:48:38.568138 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:39.515768 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4127422188.mount: Deactivated successfully. Jul 10 00:48:39.543777 kubelet[1436]: E0710 00:48:39.543734 1436 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:39.568302 kubelet[1436]: E0710 00:48:39.568265 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:40.105578 update_engine[1184]: I0710 00:48:40.105500 1184 update_attempter.cc:509] Updating boot flags... Jul 10 00:48:40.569468 kubelet[1436]: E0710 00:48:40.569384 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:41.569951 kubelet[1436]: E0710 00:48:41.569880 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:42.107870 env[1199]: time="2025-07-10T00:48:42.107806047Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:48:42.109833 env[1199]: time="2025-07-10T00:48:42.109780262Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:48:42.111463 env[1199]: time="2025-07-10T00:48:42.111431869Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:48:42.113446 env[1199]: time="2025-07-10T00:48:42.113413369Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:48:42.114283 env[1199]: time="2025-07-10T00:48:42.114246239Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Jul 10 00:48:42.116601 env[1199]: time="2025-07-10T00:48:42.116566364Z" level=info msg="CreateContainer within sandbox \"261215b83861b64da7b0e79de638912cf9e787eb75dd321ed1b1e1a6093b76df\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Jul 10 00:48:42.129710 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1532972406.mount: Deactivated successfully. Jul 10 00:48:42.130840 env[1199]: time="2025-07-10T00:48:42.130790351Z" level=info msg="CreateContainer within sandbox \"261215b83861b64da7b0e79de638912cf9e787eb75dd321ed1b1e1a6093b76df\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"b2b881d77d24630e3fc921d9b2bfe62d85e60fccdcf97bc4132e7f27a6c96b68\"" Jul 10 00:48:42.131374 env[1199]: time="2025-07-10T00:48:42.131335351Z" level=info msg="StartContainer for \"b2b881d77d24630e3fc921d9b2bfe62d85e60fccdcf97bc4132e7f27a6c96b68\"" Jul 10 00:48:42.148926 systemd[1]: Started cri-containerd-b2b881d77d24630e3fc921d9b2bfe62d85e60fccdcf97bc4132e7f27a6c96b68.scope. Jul 10 00:48:42.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:42.159466 kernel: kauditd_printk_skb: 111 callbacks suppressed Jul 10 00:48:42.159741 kernel: audit: type=1400 audit(1752108522.157:797): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:42.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:42.164899 kernel: audit: type=1400 audit(1752108522.157:798): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:42.164941 kernel: audit: type=1400 audit(1752108522.157:799): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:42.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:42.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:42.170431 kernel: audit: type=1400 audit(1752108522.157:800): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:42.170524 kernel: audit: type=1400 audit(1752108522.157:801): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:42.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:42.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:42.176297 kernel: audit: type=1400 audit(1752108522.157:802): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:42.176362 kernel: audit: type=1400 audit(1752108522.157:803): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:42.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:42.179183 kernel: audit: type=1400 audit(1752108522.157:804): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:42.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:42.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:42.184731 kernel: audit: type=1400 audit(1752108522.157:805): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:42.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:42.187565 kernel: audit: type=1400 audit(1752108522.158:806): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:42.158000 audit: BPF prog-id=130 op=LOAD Jul 10 00:48:42.158000 audit[3043]: AVC avc: denied { bpf } for pid=3043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:42.158000 audit[3043]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2932 pid=3043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:42.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232623838316437376432343633306533666339323164396232626665 Jul 10 00:48:42.158000 audit[3043]: AVC avc: denied { perfmon } for pid=3043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:42.158000 audit[3043]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2932 pid=3043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:42.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232623838316437376432343633306533666339323164396232626665 Jul 10 00:48:42.158000 audit[3043]: AVC avc: denied { bpf } for pid=3043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:42.158000 audit[3043]: AVC avc: denied { bpf } for pid=3043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:42.158000 audit[3043]: AVC avc: denied { bpf } for pid=3043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:42.158000 audit[3043]: AVC avc: denied { perfmon } for pid=3043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:42.158000 audit[3043]: AVC avc: denied { perfmon } for pid=3043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:42.158000 audit[3043]: AVC avc: denied { perfmon } for pid=3043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:42.158000 audit[3043]: AVC avc: denied { perfmon } for pid=3043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:42.158000 audit[3043]: AVC avc: denied { perfmon } for pid=3043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:42.158000 audit[3043]: AVC avc: denied { bpf } for pid=3043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:42.158000 audit[3043]: AVC avc: denied { bpf } for pid=3043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:42.158000 audit: BPF prog-id=131 op=LOAD Jul 10 00:48:42.158000 audit[3043]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000309390 items=0 ppid=2932 pid=3043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:42.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232623838316437376432343633306533666339323164396232626665 Jul 10 00:48:42.161000 audit[3043]: AVC avc: denied { bpf } for pid=3043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:42.161000 audit[3043]: AVC avc: denied { bpf } for pid=3043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:42.161000 audit[3043]: AVC avc: denied { perfmon } for pid=3043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:42.161000 audit[3043]: AVC avc: denied { perfmon } for pid=3043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:42.161000 audit[3043]: AVC avc: denied { perfmon } for pid=3043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:42.161000 audit[3043]: AVC avc: denied { perfmon } for pid=3043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:42.161000 audit[3043]: AVC avc: denied { perfmon } for pid=3043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:42.161000 audit[3043]: AVC avc: denied { bpf } for pid=3043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:42.161000 audit[3043]: AVC avc: denied { bpf } for pid=3043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:42.161000 audit: BPF prog-id=132 op=LOAD Jul 10 00:48:42.161000 audit[3043]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003093d8 items=0 ppid=2932 pid=3043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:42.161000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232623838316437376432343633306533666339323164396232626665 Jul 10 00:48:42.163000 audit: BPF prog-id=132 op=UNLOAD Jul 10 00:48:42.163000 audit: BPF prog-id=131 op=UNLOAD Jul 10 00:48:42.163000 audit[3043]: AVC avc: denied { bpf } for pid=3043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:42.163000 audit[3043]: AVC avc: denied { bpf } for pid=3043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:42.163000 audit[3043]: AVC avc: denied { bpf } for pid=3043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:42.163000 audit[3043]: AVC avc: denied { perfmon } for pid=3043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:42.163000 audit[3043]: AVC avc: denied { perfmon } for pid=3043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:42.163000 audit[3043]: AVC avc: denied { perfmon } for pid=3043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:42.163000 audit[3043]: AVC avc: denied { perfmon } for pid=3043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:42.163000 audit[3043]: AVC avc: denied { perfmon } for pid=3043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:42.163000 audit[3043]: AVC avc: denied { bpf } for pid=3043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:42.163000 audit[3043]: AVC avc: denied { bpf } for pid=3043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:42.163000 audit: BPF prog-id=133 op=LOAD Jul 10 00:48:42.163000 audit[3043]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003097e8 items=0 ppid=2932 pid=3043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:42.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232623838316437376432343633306533666339323164396232626665 Jul 10 00:48:42.193229 env[1199]: time="2025-07-10T00:48:42.193179974Z" level=info msg="StartContainer for \"b2b881d77d24630e3fc921d9b2bfe62d85e60fccdcf97bc4132e7f27a6c96b68\" returns successfully" Jul 10 00:48:42.230000 audit[3071]: AVC avc: denied { search } for pid=3071 comm="rpcbind" name="crypto" dev="proc" ino=22165 scontext=system_u:system_r:svirt_lxc_net_t:s0:c286,c940 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 10 00:48:42.230000 audit[3071]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f3d040d90c0 a2=0 a3=0 items=0 ppid=3053 pid=3071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c286,c940 key=(null) Jul 10 00:48:42.230000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Jul 10 00:48:42.252391 kubelet[1436]: I0710 00:48:42.252345 1436 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.068126494 podStartE2EDuration="6.252325667s" podCreationTimestamp="2025-07-10 00:48:36 +0000 UTC" firstStartedPulling="2025-07-10 00:48:36.931047894 +0000 UTC m=+37.997334166" lastFinishedPulling="2025-07-10 00:48:42.115247067 +0000 UTC m=+43.181533339" observedRunningTime="2025-07-10 00:48:42.25183037 +0000 UTC m=+43.318116632" watchObservedRunningTime="2025-07-10 00:48:42.252325667 +0000 UTC m=+43.318611939" Jul 10 00:48:42.262000 audit[3077]: AVC avc: denied { search } for pid=3077 comm="dbus-daemon" name="crypto" dev="proc" ino=22165 scontext=system_u:system_r:svirt_lxc_net_t:s0:c286,c940 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 10 00:48:42.262000 audit[3077]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fc8f89e10c0 a2=0 a3=0 items=0 ppid=3053 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c286,c940 key=(null) Jul 10 00:48:42.262000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Jul 10 00:48:42.264000 audit[3078]: NETFILTER_CFG table=filter:103 family=2 entries=20 op=nft_register_rule pid=3078 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:48:42.264000 audit[3078]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffdae15c7d0 a2=0 a3=7ffdae15c7bc items=0 ppid=1662 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:42.264000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:48:42.265000 audit[3079]: AVC avc: denied { watch } for pid=3079 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537698 scontext=system_u:system_r:svirt_lxc_net_t:s0:c286,c940 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c286,c940 tclass=dir permissive=0 Jul 10 00:48:42.265000 audit[3079]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55ae7ff65b30 a2=2c8 a3=7ffc0c30913c items=0 ppid=3053 pid=3079 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c286,c940 key=(null) Jul 10 00:48:42.265000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Jul 10 00:48:42.268000 audit[3080]: AVC avc: denied { read } for pid=3080 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=25491 scontext=system_u:system_r:svirt_lxc_net_t:s0:c286,c940 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Jul 10 00:48:42.268000 audit[3080]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f944a43f320 a1=80000 a2=d a3=7ffcfe3550e0 items=0 ppid=3053 pid=3080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c286,c940 key=(null) Jul 10 00:48:42.268000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Jul 10 00:48:42.269000 audit[3080]: AVC avc: denied { search } for pid=3080 comm="ganesha.nfsd" name="crypto" dev="proc" ino=22165 scontext=system_u:system_r:svirt_lxc_net_t:s0:c286,c940 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Jul 10 00:48:42.269000 audit[3080]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f94499930c0 a2=0 a3=0 items=0 ppid=3053 pid=3080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c286,c940 key=(null) Jul 10 00:48:42.269000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Jul 10 00:48:42.272000 audit[3078]: NETFILTER_CFG table=nat:104 family=2 entries=110 op=nft_register_chain pid=3078 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:48:42.272000 audit[3078]: SYSCALL arch=c000003e syscall=46 success=yes exit=50988 a0=3 a1=7ffdae15c7d0 a2=0 a3=7ffdae15c7bc items=0 ppid=1662 pid=3078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:42.272000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:48:42.571056 kubelet[1436]: E0710 00:48:42.571013 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:43.571802 kubelet[1436]: E0710 00:48:43.571721 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:44.307133 kubelet[1436]: I0710 00:48:44.307080 1436 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 10 00:48:44.330000 audit[3099]: NETFILTER_CFG table=filter:105 family=2 entries=8 op=nft_register_rule pid=3099 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:48:44.330000 audit[3099]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffdda94bf70 a2=0 a3=7ffdda94bf5c items=0 ppid=1662 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:44.330000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:48:44.336000 audit[3099]: NETFILTER_CFG table=nat:106 family=2 entries=68 op=nft_register_chain pid=3099 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:48:44.336000 audit[3099]: SYSCALL arch=c000003e syscall=46 success=yes exit=23876 a0=3 a1=7ffdda94bf70 a2=0 a3=7ffdda94bf5c items=0 ppid=1662 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:44.336000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:48:44.350000 audit[3101]: NETFILTER_CFG table=filter:107 family=2 entries=8 op=nft_register_rule pid=3101 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:48:44.350000 audit[3101]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffc4d9cd480 a2=0 a3=7ffc4d9cd46c items=0 ppid=1662 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:44.350000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:48:44.356000 audit[3101]: NETFILTER_CFG table=nat:108 family=2 entries=68 op=nft_unregister_chain pid=3101 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:48:44.356000 audit[3101]: SYSCALL arch=c000003e syscall=46 success=yes exit=22116 a0=3 a1=7ffc4d9cd480 a2=0 a3=7ffc4d9cd46c items=0 ppid=1662 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:44.356000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:48:44.572998 kubelet[1436]: E0710 00:48:44.572799 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:45.373000 audit[3103]: NETFILTER_CFG table=filter:109 family=2 entries=8 op=nft_register_rule pid=3103 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:48:45.373000 audit[3103]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffd766f7730 a2=0 a3=7ffd766f771c items=0 ppid=1662 pid=3103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:45.373000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:48:45.380000 audit[3103]: NETFILTER_CFG table=nat:110 family=2 entries=64 op=nft_register_rule pid=3103 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 10 00:48:45.380000 audit[3103]: SYSCALL arch=c000003e syscall=46 success=yes exit=21988 a0=3 a1=7ffd766f7730 a2=0 a3=7ffd766f771c items=0 ppid=1662 pid=3103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:45.380000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 10 00:48:45.573167 kubelet[1436]: E0710 00:48:45.573108 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:46.574058 kubelet[1436]: E0710 00:48:46.573987 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:47.574660 kubelet[1436]: E0710 00:48:47.574588 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:48.574799 kubelet[1436]: E0710 00:48:48.574740 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:49.575026 kubelet[1436]: E0710 00:48:49.574967 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:50.575923 kubelet[1436]: E0710 00:48:50.575867 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:51.461120 systemd[1]: Created slice kubepods-besteffort-pod3cade658_ce8e_4e1a_9409_2e619a3d7386.slice. Jul 10 00:48:51.568480 kubelet[1436]: I0710 00:48:51.568442 1436 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-6ead6ef2-e8be-43ef-acb4-85103347227f\" (UniqueName: \"kubernetes.io/nfs/3cade658-ce8e-4e1a-9409-2e619a3d7386-pvc-6ead6ef2-e8be-43ef-acb4-85103347227f\") pod \"test-pod-1\" (UID: \"3cade658-ce8e-4e1a-9409-2e619a3d7386\") " pod="default/test-pod-1" Jul 10 00:48:51.568556 kubelet[1436]: I0710 00:48:51.568486 1436 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-clqph\" (UniqueName: \"kubernetes.io/projected/3cade658-ce8e-4e1a-9409-2e619a3d7386-kube-api-access-clqph\") pod \"test-pod-1\" (UID: \"3cade658-ce8e-4e1a-9409-2e619a3d7386\") " pod="default/test-pod-1" Jul 10 00:48:51.575994 kubelet[1436]: E0710 00:48:51.575963 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:51.677000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.680567 kernel: Failed to create system directory netfs Jul 10 00:48:51.680615 kernel: kauditd_printk_skb: 86 callbacks suppressed Jul 10 00:48:51.680640 kernel: audit: type=1400 audit(1752108531.677:828): avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.680664 kernel: Failed to create system directory netfs Jul 10 00:48:51.677000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.684828 kernel: audit: type=1400 audit(1752108531.677:828): avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.684873 kernel: Failed to create system directory netfs Jul 10 00:48:51.685510 kernel: audit: type=1400 audit(1752108531.677:828): avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.677000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.677000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.693468 kernel: Failed to create system directory netfs Jul 10 00:48:51.693496 kernel: audit: type=1400 audit(1752108531.677:828): avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.677000 audit[3133]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55e06ef745e0 a1=153bc a2=55e06278e2b0 a3=5 items=0 ppid=71 pid=3133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:51.701540 kernel: audit: type=1300 audit(1752108531.677:828): arch=c000003e syscall=175 success=yes exit=0 a0=55e06ef745e0 a1=153bc a2=55e06278e2b0 a3=5 items=0 ppid=71 pid=3133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:51.677000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 10 00:48:51.703074 kernel: audit: type=1327 audit(1752108531.677:828): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 10 00:48:51.699000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.707702 kernel: Failed to create system directory fscache Jul 10 00:48:51.707744 kernel: audit: type=1400 audit(1752108531.699:829): avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.707765 kernel: Failed to create system directory fscache Jul 10 00:48:51.707778 kernel: audit: type=1400 audit(1752108531.699:829): avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.699000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.711435 kernel: Failed to create system directory fscache Jul 10 00:48:51.711470 kernel: audit: type=1400 audit(1752108531.699:829): avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.699000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.715542 kernel: Failed to create system directory fscache Jul 10 00:48:51.715587 kernel: audit: type=1400 audit(1752108531.699:829): avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.699000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.719224 kernel: Failed to create system directory fscache Jul 10 00:48:51.699000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.699000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.720614 kernel: Failed to create system directory fscache Jul 10 00:48:51.720643 kernel: Failed to create system directory fscache Jul 10 00:48:51.699000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.699000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.722062 kernel: Failed to create system directory fscache Jul 10 00:48:51.722084 kernel: Failed to create system directory fscache Jul 10 00:48:51.699000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.699000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.723501 kernel: Failed to create system directory fscache Jul 10 00:48:51.723578 kernel: Failed to create system directory fscache Jul 10 00:48:51.699000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.699000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.724935 kernel: Failed to create system directory fscache Jul 10 00:48:51.724968 kernel: Failed to create system directory fscache Jul 10 00:48:51.699000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.699000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.726522 kernel: Failed to create system directory fscache Jul 10 00:48:51.699000 audit[3133]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55e06f1899c0 a1=4c0fc a2=55e06278e2b0 a3=5 items=0 ppid=71 pid=3133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:51.699000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 10 00:48:51.728433 kernel: FS-Cache: Loaded Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.758458 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.758493 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.758507 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.759820 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.759858 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.761897 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.761939 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.761956 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.762576 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.763958 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.764003 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.766016 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.766050 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.766064 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.767433 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.767483 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.768787 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.768806 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.770860 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.770889 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.770903 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.772927 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.772956 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.772972 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.775039 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.775076 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.775091 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.776425 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.776467 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.777781 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.777811 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.779872 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.779898 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.779912 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.781980 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.782023 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.782041 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.784034 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.784076 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.784093 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.785442 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.785474 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.786930 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.786970 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.788957 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.788982 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.788999 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.791006 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.791034 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.791050 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.793059 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.793103 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.793118 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.793736 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.795781 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.795809 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.795823 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.797849 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.797883 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.797905 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.798533 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.799908 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.799934 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.801957 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.801983 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.801997 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.804020 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.804055 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.804078 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.806082 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.806109 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.806124 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.807430 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.807453 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.808795 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.808814 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.810855 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.810881 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.810897 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.812929 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.812965 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.812988 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.814965 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.814987 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.815001 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.817024 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.817059 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.817080 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.819078 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.819102 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.819117 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.820451 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.820478 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.821814 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.821848 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.823878 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.823901 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.823922 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.825940 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.825988 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.826003 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.827994 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.828025 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.828042 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.830062 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.830080 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.830100 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.831436 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.831456 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.832800 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.832852 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.834848 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.834869 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.834885 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.836902 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.836953 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.836969 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.838944 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.838969 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.838996 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.841031 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.841056 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.841071 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.843087 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.843122 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.843144 kernel: Failed to create system directory sunrpc Jul 10 00:48:51.747000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.853604 kernel: RPC: Registered named UNIX socket transport module. Jul 10 00:48:51.853639 kernel: RPC: Registered udp transport module. Jul 10 00:48:51.853661 kernel: RPC: Registered tcp transport module. Jul 10 00:48:51.855174 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Jul 10 00:48:51.747000 audit[3133]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55e06f1d5ad0 a1=1a81bc a2=55e06278e2b0 a3=5 items=6 ppid=71 pid=3133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:51.747000 audit: CWD cwd="/" Jul 10 00:48:51.747000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:48:51.747000 audit: PATH item=1 name=(null) inode=25651 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:48:51.747000 audit: PATH item=2 name=(null) inode=25651 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:48:51.747000 audit: PATH item=3 name=(null) inode=25652 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:48:51.747000 audit: PATH item=4 name=(null) inode=25651 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:48:51.747000 audit: PATH item=5 name=(null) inode=25653 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 10 00:48:51.747000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.888626 kernel: Failed to create system directory nfs Jul 10 00:48:51.888656 kernel: Failed to create system directory nfs Jul 10 00:48:51.888670 kernel: Failed to create system directory nfs Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.889937 kernel: Failed to create system directory nfs Jul 10 00:48:51.889970 kernel: Failed to create system directory nfs Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.891896 kernel: Failed to create system directory nfs Jul 10 00:48:51.891925 kernel: Failed to create system directory nfs Jul 10 00:48:51.891939 kernel: Failed to create system directory nfs Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.893868 kernel: Failed to create system directory nfs Jul 10 00:48:51.893942 kernel: Failed to create system directory nfs Jul 10 00:48:51.893975 kernel: Failed to create system directory nfs Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.895802 kernel: Failed to create system directory nfs Jul 10 00:48:51.895822 kernel: Failed to create system directory nfs Jul 10 00:48:51.895836 kernel: Failed to create system directory nfs Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.897770 kernel: Failed to create system directory nfs Jul 10 00:48:51.897793 kernel: Failed to create system directory nfs Jul 10 00:48:51.897815 kernel: Failed to create system directory nfs Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.899739 kernel: Failed to create system directory nfs Jul 10 00:48:51.899758 kernel: Failed to create system directory nfs Jul 10 00:48:51.899771 kernel: Failed to create system directory nfs Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.901781 kernel: Failed to create system directory nfs Jul 10 00:48:51.901800 kernel: Failed to create system directory nfs Jul 10 00:48:51.901820 kernel: Failed to create system directory nfs Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.903738 kernel: Failed to create system directory nfs Jul 10 00:48:51.903763 kernel: Failed to create system directory nfs Jul 10 00:48:51.903778 kernel: Failed to create system directory nfs Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.905065 kernel: Failed to create system directory nfs Jul 10 00:48:51.905087 kernel: Failed to create system directory nfs Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.907050 kernel: Failed to create system directory nfs Jul 10 00:48:51.907089 kernel: Failed to create system directory nfs Jul 10 00:48:51.907113 kernel: Failed to create system directory nfs Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.909002 kernel: Failed to create system directory nfs Jul 10 00:48:51.909022 kernel: Failed to create system directory nfs Jul 10 00:48:51.909035 kernel: Failed to create system directory nfs Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.910977 kernel: Failed to create system directory nfs Jul 10 00:48:51.910997 kernel: Failed to create system directory nfs Jul 10 00:48:51.911010 kernel: Failed to create system directory nfs Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.912966 kernel: Failed to create system directory nfs Jul 10 00:48:51.913000 kernel: Failed to create system directory nfs Jul 10 00:48:51.913014 kernel: Failed to create system directory nfs Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.914948 kernel: Failed to create system directory nfs Jul 10 00:48:51.914986 kernel: Failed to create system directory nfs Jul 10 00:48:51.915002 kernel: Failed to create system directory nfs Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.916916 kernel: Failed to create system directory nfs Jul 10 00:48:51.916952 kernel: Failed to create system directory nfs Jul 10 00:48:51.916966 kernel: Failed to create system directory nfs Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.918875 kernel: Failed to create system directory nfs Jul 10 00:48:51.918897 kernel: Failed to create system directory nfs Jul 10 00:48:51.918911 kernel: Failed to create system directory nfs Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.920857 kernel: Failed to create system directory nfs Jul 10 00:48:51.920948 kernel: Failed to create system directory nfs Jul 10 00:48:51.920971 kernel: Failed to create system directory nfs Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.922824 kernel: Failed to create system directory nfs Jul 10 00:48:51.922910 kernel: Failed to create system directory nfs Jul 10 00:48:51.922935 kernel: Failed to create system directory nfs Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.924806 kernel: Failed to create system directory nfs Jul 10 00:48:51.924831 kernel: Failed to create system directory nfs Jul 10 00:48:51.924854 kernel: Failed to create system directory nfs Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.880000 audit[3133]: AVC avc: denied { confidentiality } for pid=3133 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.926776 kernel: Failed to create system directory nfs Jul 10 00:48:51.926817 kernel: Failed to create system directory nfs Jul 10 00:48:51.880000 audit[3133]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55e06f3f6af0 a1=16ec44 a2=55e06278e2b0 a3=5 items=0 ppid=71 pid=3133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:51.880000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Jul 10 00:48:51.948452 kernel: FS-Cache: Netfs 'nfs' registered for caching Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.985478 kernel: Failed to create system directory nfs4 Jul 10 00:48:51.985538 kernel: Failed to create system directory nfs4 Jul 10 00:48:51.985593 kernel: Failed to create system directory nfs4 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.987891 kernel: Failed to create system directory nfs4 Jul 10 00:48:51.987930 kernel: Failed to create system directory nfs4 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.989559 kernel: Failed to create system directory nfs4 Jul 10 00:48:51.989579 kernel: Failed to create system directory nfs4 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.990890 kernel: Failed to create system directory nfs4 Jul 10 00:48:51.990913 kernel: Failed to create system directory nfs4 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.992907 kernel: Failed to create system directory nfs4 Jul 10 00:48:51.992953 kernel: Failed to create system directory nfs4 Jul 10 00:48:51.992967 kernel: Failed to create system directory nfs4 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.994907 kernel: Failed to create system directory nfs4 Jul 10 00:48:51.994930 kernel: Failed to create system directory nfs4 Jul 10 00:48:51.994949 kernel: Failed to create system directory nfs4 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.996951 kernel: Failed to create system directory nfs4 Jul 10 00:48:51.996986 kernel: Failed to create system directory nfs4 Jul 10 00:48:51.997000 kernel: Failed to create system directory nfs4 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.998987 kernel: Failed to create system directory nfs4 Jul 10 00:48:51.999007 kernel: Failed to create system directory nfs4 Jul 10 00:48:51.999020 kernel: Failed to create system directory nfs4 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:52.001078 kernel: Failed to create system directory nfs4 Jul 10 00:48:52.001098 kernel: Failed to create system directory nfs4 Jul 10 00:48:52.001112 kernel: Failed to create system directory nfs4 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:52.002443 kernel: Failed to create system directory nfs4 Jul 10 00:48:52.002464 kernel: Failed to create system directory nfs4 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:52.003804 kernel: Failed to create system directory nfs4 Jul 10 00:48:52.003839 kernel: Failed to create system directory nfs4 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:52.005842 kernel: Failed to create system directory nfs4 Jul 10 00:48:52.005877 kernel: Failed to create system directory nfs4 Jul 10 00:48:52.005901 kernel: Failed to create system directory nfs4 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:52.007894 kernel: Failed to create system directory nfs4 Jul 10 00:48:52.007917 kernel: Failed to create system directory nfs4 Jul 10 00:48:52.007931 kernel: Failed to create system directory nfs4 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:52.009956 kernel: Failed to create system directory nfs4 Jul 10 00:48:52.009985 kernel: Failed to create system directory nfs4 Jul 10 00:48:52.010000 kernel: Failed to create system directory nfs4 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:52.012008 kernel: Failed to create system directory nfs4 Jul 10 00:48:52.012051 kernel: Failed to create system directory nfs4 Jul 10 00:48:52.012074 kernel: Failed to create system directory nfs4 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:52.014052 kernel: Failed to create system directory nfs4 Jul 10 00:48:52.014087 kernel: Failed to create system directory nfs4 Jul 10 00:48:52.014110 kernel: Failed to create system directory nfs4 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:52.015501 kernel: Failed to create system directory nfs4 Jul 10 00:48:52.015538 kernel: Failed to create system directory nfs4 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:52.016892 kernel: Failed to create system directory nfs4 Jul 10 00:48:52.016928 kernel: Failed to create system directory nfs4 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:52.018937 kernel: Failed to create system directory nfs4 Jul 10 00:48:52.018961 kernel: Failed to create system directory nfs4 Jul 10 00:48:52.018981 kernel: Failed to create system directory nfs4 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:52.021061 kernel: Failed to create system directory nfs4 Jul 10 00:48:52.021079 kernel: Failed to create system directory nfs4 Jul 10 00:48:52.021106 kernel: Failed to create system directory nfs4 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:52.022435 kernel: Failed to create system directory nfs4 Jul 10 00:48:52.022497 kernel: Failed to create system directory nfs4 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:52.023790 kernel: Failed to create system directory nfs4 Jul 10 00:48:52.023842 kernel: Failed to create system directory nfs4 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:52.025825 kernel: Failed to create system directory nfs4 Jul 10 00:48:52.025875 kernel: Failed to create system directory nfs4 Jul 10 00:48:52.025903 kernel: Failed to create system directory nfs4 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:52.027848 kernel: Failed to create system directory nfs4 Jul 10 00:48:52.027874 kernel: Failed to create system directory nfs4 Jul 10 00:48:52.027904 kernel: Failed to create system directory nfs4 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:52.029972 kernel: Failed to create system directory nfs4 Jul 10 00:48:52.029998 kernel: Failed to create system directory nfs4 Jul 10 00:48:52.030013 kernel: Failed to create system directory nfs4 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:52.032034 kernel: Failed to create system directory nfs4 Jul 10 00:48:52.032056 kernel: Failed to create system directory nfs4 Jul 10 00:48:52.032077 kernel: Failed to create system directory nfs4 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:52.034068 kernel: Failed to create system directory nfs4 Jul 10 00:48:52.034102 kernel: Failed to create system directory nfs4 Jul 10 00:48:52.034116 kernel: Failed to create system directory nfs4 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:52.035416 kernel: Failed to create system directory nfs4 Jul 10 00:48:52.035444 kernel: Failed to create system directory nfs4 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:52.036745 kernel: Failed to create system directory nfs4 Jul 10 00:48:52.036764 kernel: Failed to create system directory nfs4 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:52.038779 kernel: Failed to create system directory nfs4 Jul 10 00:48:52.038808 kernel: Failed to create system directory nfs4 Jul 10 00:48:52.038826 kernel: Failed to create system directory nfs4 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:52.040785 kernel: Failed to create system directory nfs4 Jul 10 00:48:52.040804 kernel: Failed to create system directory nfs4 Jul 10 00:48:52.040818 kernel: Failed to create system directory nfs4 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:52.042826 kernel: Failed to create system directory nfs4 Jul 10 00:48:52.042859 kernel: Failed to create system directory nfs4 Jul 10 00:48:52.042873 kernel: Failed to create system directory nfs4 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:52.044862 kernel: Failed to create system directory nfs4 Jul 10 00:48:52.044908 kernel: Failed to create system directory nfs4 Jul 10 00:48:52.044926 kernel: Failed to create system directory nfs4 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:52.046898 kernel: Failed to create system directory nfs4 Jul 10 00:48:52.046935 kernel: Failed to create system directory nfs4 Jul 10 00:48:52.046949 kernel: Failed to create system directory nfs4 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:52.048932 kernel: Failed to create system directory nfs4 Jul 10 00:48:52.048959 kernel: Failed to create system directory nfs4 Jul 10 00:48:52.048974 kernel: Failed to create system directory nfs4 Jul 10 00:48:51.972000 audit[3138]: AVC avc: denied { confidentiality } for pid=3138 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:52.190569 kernel: NFS: Registering the id_resolver key type Jul 10 00:48:52.190623 kernel: Key type id_resolver registered Jul 10 00:48:52.190645 kernel: Key type id_legacy registered Jul 10 00:48:51.972000 audit[3138]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f65286d8010 a1=20956c a2=5566d65f92b0 a3=5 items=0 ppid=71 pid=3138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:51.972000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Jul 10 00:48:52.201000 audit[3139]: AVC avc: denied { confidentiality } for pid=3139 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:52.201000 audit[3139]: AVC avc: denied { confidentiality } for pid=3139 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:52.201000 audit[3139]: AVC avc: denied { confidentiality } for pid=3139 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:52.206007 kernel: Failed to create system directory rpcgss Jul 10 00:48:52.206053 kernel: Failed to create system directory rpcgss Jul 10 00:48:52.206068 kernel: Failed to create system directory rpcgss Jul 10 00:48:52.206081 kernel: Failed to create system directory rpcgss Jul 10 00:48:52.201000 audit[3139]: AVC avc: denied { confidentiality } for pid=3139 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:52.201000 audit[3139]: AVC avc: denied { confidentiality } for pid=3139 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:52.201000 audit[3139]: AVC avc: denied { confidentiality } for pid=3139 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:52.208205 kernel: Failed to create system directory rpcgss Jul 10 00:48:52.208227 kernel: Failed to create system directory rpcgss Jul 10 00:48:52.208241 kernel: Failed to create system directory rpcgss Jul 10 00:48:52.201000 audit[3139]: AVC avc: denied { confidentiality } for pid=3139 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:52.201000 audit[3139]: AVC avc: denied { confidentiality } for pid=3139 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:52.209616 kernel: Failed to create system directory rpcgss Jul 10 00:48:52.209645 kernel: Failed to create system directory rpcgss Jul 10 00:48:52.201000 audit[3139]: AVC avc: denied { confidentiality } for pid=3139 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:52.201000 audit[3139]: AVC avc: denied { confidentiality } for pid=3139 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:52.211001 kernel: Failed to create system directory rpcgss Jul 10 00:48:52.211029 kernel: Failed to create system directory rpcgss Jul 10 00:48:52.201000 audit[3139]: AVC avc: denied { confidentiality } for pid=3139 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:52.201000 audit[3139]: AVC avc: denied { confidentiality } for pid=3139 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:52.201000 audit[3139]: AVC avc: denied { confidentiality } for pid=3139 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:52.213075 kernel: Failed to create system directory rpcgss Jul 10 00:48:52.213109 kernel: Failed to create system directory rpcgss Jul 10 00:48:52.213132 kernel: Failed to create system directory rpcgss Jul 10 00:48:52.201000 audit[3139]: AVC avc: denied { confidentiality } for pid=3139 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:52.201000 audit[3139]: AVC avc: denied { confidentiality } for pid=3139 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:52.214455 kernel: Failed to create system directory rpcgss Jul 10 00:48:52.214490 kernel: Failed to create system directory rpcgss Jul 10 00:48:52.201000 audit[3139]: AVC avc: denied { confidentiality } for pid=3139 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:52.201000 audit[3139]: AVC avc: denied { confidentiality } for pid=3139 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:52.215817 kernel: Failed to create system directory rpcgss Jul 10 00:48:52.215839 kernel: Failed to create system directory rpcgss Jul 10 00:48:52.201000 audit[3139]: AVC avc: denied { confidentiality } for pid=3139 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:52.201000 audit[3139]: AVC avc: denied { confidentiality } for pid=3139 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:52.201000 audit[3139]: AVC avc: denied { confidentiality } for pid=3139 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:52.217900 kernel: Failed to create system directory rpcgss Jul 10 00:48:52.217922 kernel: Failed to create system directory rpcgss Jul 10 00:48:52.217945 kernel: Failed to create system directory rpcgss Jul 10 00:48:52.201000 audit[3139]: AVC avc: denied { confidentiality } for pid=3139 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:52.201000 audit[3139]: AVC avc: denied { confidentiality } for pid=3139 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:52.201000 audit[3139]: AVC avc: denied { confidentiality } for pid=3139 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:52.219993 kernel: Failed to create system directory rpcgss Jul 10 00:48:52.220031 kernel: Failed to create system directory rpcgss Jul 10 00:48:52.220055 kernel: Failed to create system directory rpcgss Jul 10 00:48:52.201000 audit[3139]: AVC avc: denied { confidentiality } for pid=3139 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:52.201000 audit[3139]: AVC avc: denied { confidentiality } for pid=3139 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:52.201000 audit[3139]: AVC avc: denied { confidentiality } for pid=3139 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Jul 10 00:48:52.222061 kernel: Failed to create system directory rpcgss Jul 10 00:48:52.222121 kernel: Failed to create system directory rpcgss Jul 10 00:48:52.201000 audit[3139]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f4fe34f8010 a1=70bac a2=5650d5bc92b0 a3=5 items=0 ppid=71 pid=3139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:52.201000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Jul 10 00:48:52.234617 nfsidmap[3149]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Jul 10 00:48:52.237963 nfsidmap[3152]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Jul 10 00:48:52.246000 audit[1255]: AVC avc: denied { watch_reads } for pid=1255 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 10 00:48:52.246000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 10 00:48:52.246000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 10 00:48:52.246000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 10 00:48:52.246000 audit[1255]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55c4ed6a7160 a2=10 a3=5900e130ea2959 items=0 ppid=1 pid=1255 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:52.246000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 10 00:48:52.246000 audit[1255]: AVC avc: denied { watch_reads } for pid=1255 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 10 00:48:52.246000 audit[1255]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55c4ed6a7160 a2=10 a3=5900e130ea2959 items=0 ppid=1 pid=1255 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:52.246000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 10 00:48:52.246000 audit[1255]: AVC avc: denied { watch_reads } for pid=1255 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Jul 10 00:48:52.246000 audit[1255]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55c4ed6a7160 a2=10 a3=5900e130ea2959 items=0 ppid=1 pid=1255 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:52.246000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Jul 10 00:48:52.364211 env[1199]: time="2025-07-10T00:48:52.364164533Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:3cade658-ce8e-4e1a-9409-2e619a3d7386,Namespace:default,Attempt:0,}" Jul 10 00:48:52.459736 systemd-networkd[1025]: cali5ec59c6bf6e: Link UP Jul 10 00:48:52.461812 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 10 00:48:52.461854 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Jul 10 00:48:52.461977 systemd-networkd[1025]: cali5ec59c6bf6e: Gained carrier Jul 10 00:48:52.471281 env[1199]: 2025-07-10 00:48:52.410 [INFO][3156] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.143-k8s-test--pod--1-eth0 default 3cade658-ce8e-4e1a-9409-2e619a3d7386 1508 0 2025-07-10 00:48:36 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.143 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="b45f0552006fa7ab3b49b4a02ac42a8f8f2788005fd48646f75639668a9e4f33" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.143-k8s-test--pod--1-" Jul 10 00:48:52.471281 env[1199]: 2025-07-10 00:48:52.410 [INFO][3156] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="b45f0552006fa7ab3b49b4a02ac42a8f8f2788005fd48646f75639668a9e4f33" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.143-k8s-test--pod--1-eth0" Jul 10 00:48:52.471281 env[1199]: 2025-07-10 00:48:52.430 [INFO][3170] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b45f0552006fa7ab3b49b4a02ac42a8f8f2788005fd48646f75639668a9e4f33" HandleID="k8s-pod-network.b45f0552006fa7ab3b49b4a02ac42a8f8f2788005fd48646f75639668a9e4f33" Workload="10.0.0.143-k8s-test--pod--1-eth0" Jul 10 00:48:52.471281 env[1199]: 2025-07-10 00:48:52.430 [INFO][3170] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b45f0552006fa7ab3b49b4a02ac42a8f8f2788005fd48646f75639668a9e4f33" HandleID="k8s-pod-network.b45f0552006fa7ab3b49b4a02ac42a8f8f2788005fd48646f75639668a9e4f33" Workload="10.0.0.143-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00021f640), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.143", "pod":"test-pod-1", "timestamp":"2025-07-10 00:48:52.430451233 +0000 UTC"}, Hostname:"10.0.0.143", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 10 00:48:52.471281 env[1199]: 2025-07-10 00:48:52.430 [INFO][3170] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:48:52.471281 env[1199]: 2025-07-10 00:48:52.430 [INFO][3170] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:48:52.471281 env[1199]: 2025-07-10 00:48:52.430 [INFO][3170] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.143' Jul 10 00:48:52.471281 env[1199]: 2025-07-10 00:48:52.436 [INFO][3170] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.b45f0552006fa7ab3b49b4a02ac42a8f8f2788005fd48646f75639668a9e4f33" host="10.0.0.143" Jul 10 00:48:52.471281 env[1199]: 2025-07-10 00:48:52.440 [INFO][3170] ipam/ipam.go 394: Looking up existing affinities for host host="10.0.0.143" Jul 10 00:48:52.471281 env[1199]: 2025-07-10 00:48:52.443 [INFO][3170] ipam/ipam.go 511: Trying affinity for 192.168.66.0/26 host="10.0.0.143" Jul 10 00:48:52.471281 env[1199]: 2025-07-10 00:48:52.445 [INFO][3170] ipam/ipam.go 158: Attempting to load block cidr=192.168.66.0/26 host="10.0.0.143" Jul 10 00:48:52.471281 env[1199]: 2025-07-10 00:48:52.447 [INFO][3170] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.66.0/26 host="10.0.0.143" Jul 10 00:48:52.471281 env[1199]: 2025-07-10 00:48:52.447 [INFO][3170] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.66.0/26 handle="k8s-pod-network.b45f0552006fa7ab3b49b4a02ac42a8f8f2788005fd48646f75639668a9e4f33" host="10.0.0.143" Jul 10 00:48:52.471281 env[1199]: 2025-07-10 00:48:52.448 [INFO][3170] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.b45f0552006fa7ab3b49b4a02ac42a8f8f2788005fd48646f75639668a9e4f33 Jul 10 00:48:52.471281 env[1199]: 2025-07-10 00:48:52.451 [INFO][3170] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.66.0/26 handle="k8s-pod-network.b45f0552006fa7ab3b49b4a02ac42a8f8f2788005fd48646f75639668a9e4f33" host="10.0.0.143" Jul 10 00:48:52.471281 env[1199]: 2025-07-10 00:48:52.455 [INFO][3170] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.66.5/26] block=192.168.66.0/26 handle="k8s-pod-network.b45f0552006fa7ab3b49b4a02ac42a8f8f2788005fd48646f75639668a9e4f33" host="10.0.0.143" Jul 10 00:48:52.471281 env[1199]: 2025-07-10 00:48:52.455 [INFO][3170] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.66.5/26] handle="k8s-pod-network.b45f0552006fa7ab3b49b4a02ac42a8f8f2788005fd48646f75639668a9e4f33" host="10.0.0.143" Jul 10 00:48:52.471281 env[1199]: 2025-07-10 00:48:52.455 [INFO][3170] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:48:52.471281 env[1199]: 2025-07-10 00:48:52.455 [INFO][3170] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.66.5/26] IPv6=[] ContainerID="b45f0552006fa7ab3b49b4a02ac42a8f8f2788005fd48646f75639668a9e4f33" HandleID="k8s-pod-network.b45f0552006fa7ab3b49b4a02ac42a8f8f2788005fd48646f75639668a9e4f33" Workload="10.0.0.143-k8s-test--pod--1-eth0" Jul 10 00:48:52.471281 env[1199]: 2025-07-10 00:48:52.457 [INFO][3156] cni-plugin/k8s.go 418: Populated endpoint ContainerID="b45f0552006fa7ab3b49b4a02ac42a8f8f2788005fd48646f75639668a9e4f33" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.143-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"3cade658-ce8e-4e1a-9409-2e619a3d7386", ResourceVersion:"1508", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 48, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.66.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:48:52.471940 env[1199]: 2025-07-10 00:48:52.457 [INFO][3156] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.66.5/32] ContainerID="b45f0552006fa7ab3b49b4a02ac42a8f8f2788005fd48646f75639668a9e4f33" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.143-k8s-test--pod--1-eth0" Jul 10 00:48:52.471940 env[1199]: 2025-07-10 00:48:52.457 [INFO][3156] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="b45f0552006fa7ab3b49b4a02ac42a8f8f2788005fd48646f75639668a9e4f33" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.143-k8s-test--pod--1-eth0" Jul 10 00:48:52.471940 env[1199]: 2025-07-10 00:48:52.463 [INFO][3156] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b45f0552006fa7ab3b49b4a02ac42a8f8f2788005fd48646f75639668a9e4f33" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.143-k8s-test--pod--1-eth0" Jul 10 00:48:52.471940 env[1199]: 2025-07-10 00:48:52.463 [INFO][3156] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="b45f0552006fa7ab3b49b4a02ac42a8f8f2788005fd48646f75639668a9e4f33" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.143-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"3cade658-ce8e-4e1a-9409-2e619a3d7386", ResourceVersion:"1508", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 48, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"b45f0552006fa7ab3b49b4a02ac42a8f8f2788005fd48646f75639668a9e4f33", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.66.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"ea:48:ad:fb:0c:4b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:48:52.471940 env[1199]: 2025-07-10 00:48:52.469 [INFO][3156] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="b45f0552006fa7ab3b49b4a02ac42a8f8f2788005fd48646f75639668a9e4f33" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.143-k8s-test--pod--1-eth0" Jul 10 00:48:52.480757 env[1199]: time="2025-07-10T00:48:52.480699737Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 10 00:48:52.480757 env[1199]: time="2025-07-10T00:48:52.480735253Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 10 00:48:52.480757 env[1199]: time="2025-07-10T00:48:52.480746136Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 10 00:48:52.481043 env[1199]: time="2025-07-10T00:48:52.480982477Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b45f0552006fa7ab3b49b4a02ac42a8f8f2788005fd48646f75639668a9e4f33 pid=3194 runtime=io.containerd.runc.v2 Jul 10 00:48:52.480000 audit[3196]: NETFILTER_CFG table=filter:111 family=2 entries=44 op=nft_register_chain pid=3196 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 10 00:48:52.480000 audit[3196]: SYSCALL arch=c000003e syscall=46 success=yes exit=21524 a0=3 a1=7ffe68020cf0 a2=0 a3=7ffe68020cdc items=0 ppid=2233 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:52.480000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 10 00:48:52.491569 systemd[1]: Started cri-containerd-b45f0552006fa7ab3b49b4a02ac42a8f8f2788005fd48646f75639668a9e4f33.scope. Jul 10 00:48:52.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.501000 audit: BPF prog-id=134 op=LOAD Jul 10 00:48:52.502000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.502000 audit[3207]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3194 pid=3207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:52.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234356630353532303036666137616233623439623461303261633432 Jul 10 00:48:52.502000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.502000 audit[3207]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3194 pid=3207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:52.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234356630353532303036666137616233623439623461303261633432 Jul 10 00:48:52.502000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.502000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.502000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.502000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.502000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.502000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.502000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.502000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.502000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.502000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.502000 audit: BPF prog-id=135 op=LOAD Jul 10 00:48:52.502000 audit[3207]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000e1ce0 items=0 ppid=3194 pid=3207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:52.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234356630353532303036666137616233623439623461303261633432 Jul 10 00:48:52.502000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.502000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.502000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.502000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.502000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.502000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.502000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.502000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.502000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.502000 audit: BPF prog-id=136 op=LOAD Jul 10 00:48:52.502000 audit[3207]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000e1d28 items=0 ppid=3194 pid=3207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:52.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234356630353532303036666137616233623439623461303261633432 Jul 10 00:48:52.502000 audit: BPF prog-id=136 op=UNLOAD Jul 10 00:48:52.502000 audit: BPF prog-id=135 op=UNLOAD Jul 10 00:48:52.502000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.502000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.502000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.502000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.502000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.502000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.502000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.502000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.502000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.502000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.502000 audit: BPF prog-id=137 op=LOAD Jul 10 00:48:52.502000 audit[3207]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003e4138 items=0 ppid=3194 pid=3207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:52.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234356630353532303036666137616233623439623461303261633432 Jul 10 00:48:52.503769 systemd-resolved[1135]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 10 00:48:52.524234 env[1199]: time="2025-07-10T00:48:52.524184052Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:3cade658-ce8e-4e1a-9409-2e619a3d7386,Namespace:default,Attempt:0,} returns sandbox id \"b45f0552006fa7ab3b49b4a02ac42a8f8f2788005fd48646f75639668a9e4f33\"" Jul 10 00:48:52.525907 env[1199]: time="2025-07-10T00:48:52.525864545Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Jul 10 00:48:52.576828 kubelet[1436]: E0710 00:48:52.576784 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:52.902103 env[1199]: time="2025-07-10T00:48:52.901984605Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:48:52.903965 env[1199]: time="2025-07-10T00:48:52.903940823Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:f6422896ca84c9af48d5417d6b7a573bf6b38f81edc15538907d987fc658d909,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:48:52.905583 env[1199]: time="2025-07-10T00:48:52.905560967Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:48:52.907029 env[1199]: time="2025-07-10T00:48:52.906980477Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:30bb68e656e0665bce700e67d2756f68bdca3345fa1099a32bfdb8febcf621cd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 10 00:48:52.907607 env[1199]: time="2025-07-10T00:48:52.907574386Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:f6422896ca84c9af48d5417d6b7a573bf6b38f81edc15538907d987fc658d909\"" Jul 10 00:48:52.912748 env[1199]: time="2025-07-10T00:48:52.912699041Z" level=info msg="CreateContainer within sandbox \"b45f0552006fa7ab3b49b4a02ac42a8f8f2788005fd48646f75639668a9e4f33\" for container &ContainerMetadata{Name:test,Attempt:0,}" Jul 10 00:48:52.926506 env[1199]: time="2025-07-10T00:48:52.926467693Z" level=info msg="CreateContainer within sandbox \"b45f0552006fa7ab3b49b4a02ac42a8f8f2788005fd48646f75639668a9e4f33\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"cc56940b0654ac166a98c06a4b185685b805a037de7f7e703c8521eb7878a72c\"" Jul 10 00:48:52.926941 env[1199]: time="2025-07-10T00:48:52.926911174Z" level=info msg="StartContainer for \"cc56940b0654ac166a98c06a4b185685b805a037de7f7e703c8521eb7878a72c\"" Jul 10 00:48:52.942942 systemd[1]: Started cri-containerd-cc56940b0654ac166a98c06a4b185685b805a037de7f7e703c8521eb7878a72c.scope. Jul 10 00:48:52.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.951000 audit: BPF prog-id=138 op=LOAD Jul 10 00:48:52.951000 audit[3237]: AVC avc: denied { bpf } for pid=3237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.951000 audit[3237]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3194 pid=3237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:52.951000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363353639343062303635346163313636613938633036613462313835 Jul 10 00:48:52.951000 audit[3237]: AVC avc: denied { perfmon } for pid=3237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.951000 audit[3237]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3194 pid=3237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:52.951000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363353639343062303635346163313636613938633036613462313835 Jul 10 00:48:52.951000 audit[3237]: AVC avc: denied { bpf } for pid=3237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.951000 audit[3237]: AVC avc: denied { bpf } for pid=3237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.951000 audit[3237]: AVC avc: denied { bpf } for pid=3237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.951000 audit[3237]: AVC avc: denied { perfmon } for pid=3237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.951000 audit[3237]: AVC avc: denied { perfmon } for pid=3237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.951000 audit[3237]: AVC avc: denied { perfmon } for pid=3237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.951000 audit[3237]: AVC avc: denied { perfmon } for pid=3237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.951000 audit[3237]: AVC avc: denied { perfmon } for pid=3237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.951000 audit[3237]: AVC avc: denied { bpf } for pid=3237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.951000 audit[3237]: AVC avc: denied { bpf } for pid=3237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.951000 audit: BPF prog-id=139 op=LOAD Jul 10 00:48:52.951000 audit[3237]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002c5df0 items=0 ppid=3194 pid=3237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:52.951000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363353639343062303635346163313636613938633036613462313835 Jul 10 00:48:52.951000 audit[3237]: AVC avc: denied { bpf } for pid=3237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.951000 audit[3237]: AVC avc: denied { bpf } for pid=3237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.951000 audit[3237]: AVC avc: denied { perfmon } for pid=3237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.951000 audit[3237]: AVC avc: denied { perfmon } for pid=3237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.951000 audit[3237]: AVC avc: denied { perfmon } for pid=3237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.951000 audit[3237]: AVC avc: denied { perfmon } for pid=3237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.951000 audit[3237]: AVC avc: denied { perfmon } for pid=3237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.951000 audit[3237]: AVC avc: denied { bpf } for pid=3237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.951000 audit[3237]: AVC avc: denied { bpf } for pid=3237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.951000 audit: BPF prog-id=140 op=LOAD Jul 10 00:48:52.951000 audit[3237]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002c5e38 items=0 ppid=3194 pid=3237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:52.951000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363353639343062303635346163313636613938633036613462313835 Jul 10 00:48:52.951000 audit: BPF prog-id=140 op=UNLOAD Jul 10 00:48:52.951000 audit: BPF prog-id=139 op=UNLOAD Jul 10 00:48:52.951000 audit[3237]: AVC avc: denied { bpf } for pid=3237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.951000 audit[3237]: AVC avc: denied { bpf } for pid=3237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.951000 audit[3237]: AVC avc: denied { bpf } for pid=3237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.951000 audit[3237]: AVC avc: denied { perfmon } for pid=3237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.951000 audit[3237]: AVC avc: denied { perfmon } for pid=3237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.951000 audit[3237]: AVC avc: denied { perfmon } for pid=3237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.951000 audit[3237]: AVC avc: denied { perfmon } for pid=3237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.951000 audit[3237]: AVC avc: denied { perfmon } for pid=3237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.951000 audit[3237]: AVC avc: denied { bpf } for pid=3237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.951000 audit[3237]: AVC avc: denied { bpf } for pid=3237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 10 00:48:52.951000 audit: BPF prog-id=141 op=LOAD Jul 10 00:48:52.951000 audit[3237]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000390248 items=0 ppid=3194 pid=3237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 10 00:48:52.951000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363353639343062303635346163313636613938633036613462313835 Jul 10 00:48:52.963960 env[1199]: time="2025-07-10T00:48:52.963924709Z" level=info msg="StartContainer for \"cc56940b0654ac166a98c06a4b185685b805a037de7f7e703c8521eb7878a72c\" returns successfully" Jul 10 00:48:53.271703 kubelet[1436]: I0710 00:48:53.271641 1436 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=16.888486838 podStartE2EDuration="17.271623645s" podCreationTimestamp="2025-07-10 00:48:36 +0000 UTC" firstStartedPulling="2025-07-10 00:48:52.525426927 +0000 UTC m=+53.591713199" lastFinishedPulling="2025-07-10 00:48:52.908563734 +0000 UTC m=+53.974850006" observedRunningTime="2025-07-10 00:48:53.271481275 +0000 UTC m=+54.337767547" watchObservedRunningTime="2025-07-10 00:48:53.271623645 +0000 UTC m=+54.337909917" Jul 10 00:48:53.577082 kubelet[1436]: E0710 00:48:53.577000 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:54.148554 systemd-networkd[1025]: cali5ec59c6bf6e: Gained IPv6LL Jul 10 00:48:54.577960 kubelet[1436]: E0710 00:48:54.577902 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:55.578193 kubelet[1436]: E0710 00:48:55.578149 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:56.578410 kubelet[1436]: E0710 00:48:56.578367 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:57.578957 kubelet[1436]: E0710 00:48:57.578908 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:58.579465 kubelet[1436]: E0710 00:48:58.579389 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:59.543767 kubelet[1436]: E0710 00:48:59.543708 1436 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:59.568087 env[1199]: time="2025-07-10T00:48:59.568048117Z" level=info msg="StopPodSandbox for \"c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4\"" Jul 10 00:48:59.580317 kubelet[1436]: E0710 00:48:59.580255 1436 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Jul 10 00:48:59.624334 env[1199]: 2025-07-10 00:48:59.598 [WARNING][3298] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-calico--apiserver--67c56776df--gs6gv-eth0", GenerateName:"calico-apiserver-67c56776df-", Namespace:"calico-apiserver", SelfLink:"", UID:"d227c798-038b-4a53-9200-e2ed59b1bceb", ResourceVersion:"1448", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 48, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"67c56776df", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"798f3d5a1afd2450d322de77d326f65b7741b3ed963b32623a9f2a6ce4e717cd", Pod:"calico-apiserver-67c56776df-gs6gv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.66.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali4f046377295", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:48:59.624334 env[1199]: 2025-07-10 00:48:59.598 [INFO][3298] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4" Jul 10 00:48:59.624334 env[1199]: 2025-07-10 00:48:59.598 [INFO][3298] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4" iface="eth0" netns="" Jul 10 00:48:59.624334 env[1199]: 2025-07-10 00:48:59.598 [INFO][3298] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4" Jul 10 00:48:59.624334 env[1199]: 2025-07-10 00:48:59.598 [INFO][3298] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4" Jul 10 00:48:59.624334 env[1199]: 2025-07-10 00:48:59.614 [INFO][3307] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4" HandleID="k8s-pod-network.c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4" Workload="10.0.0.143-k8s-calico--apiserver--67c56776df--gs6gv-eth0" Jul 10 00:48:59.624334 env[1199]: 2025-07-10 00:48:59.614 [INFO][3307] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:48:59.624334 env[1199]: 2025-07-10 00:48:59.614 [INFO][3307] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:48:59.624334 env[1199]: 2025-07-10 00:48:59.620 [WARNING][3307] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4" HandleID="k8s-pod-network.c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4" Workload="10.0.0.143-k8s-calico--apiserver--67c56776df--gs6gv-eth0" Jul 10 00:48:59.624334 env[1199]: 2025-07-10 00:48:59.620 [INFO][3307] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4" HandleID="k8s-pod-network.c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4" Workload="10.0.0.143-k8s-calico--apiserver--67c56776df--gs6gv-eth0" Jul 10 00:48:59.624334 env[1199]: 2025-07-10 00:48:59.621 [INFO][3307] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:48:59.624334 env[1199]: 2025-07-10 00:48:59.622 [INFO][3298] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4" Jul 10 00:48:59.624806 env[1199]: time="2025-07-10T00:48:59.624385994Z" level=info msg="TearDown network for sandbox \"c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4\" successfully" Jul 10 00:48:59.624806 env[1199]: time="2025-07-10T00:48:59.624442671Z" level=info msg="StopPodSandbox for \"c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4\" returns successfully" Jul 10 00:48:59.625153 env[1199]: time="2025-07-10T00:48:59.625108196Z" level=info msg="RemovePodSandbox for \"c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4\"" Jul 10 00:48:59.625202 env[1199]: time="2025-07-10T00:48:59.625157327Z" level=info msg="Forcibly stopping sandbox \"c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4\"" Jul 10 00:48:59.681990 env[1199]: 2025-07-10 00:48:59.654 [WARNING][3325] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-calico--apiserver--67c56776df--gs6gv-eth0", GenerateName:"calico-apiserver-67c56776df-", Namespace:"calico-apiserver", SelfLink:"", UID:"d227c798-038b-4a53-9200-e2ed59b1bceb", ResourceVersion:"1448", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 48, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"67c56776df", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"798f3d5a1afd2450d322de77d326f65b7741b3ed963b32623a9f2a6ce4e717cd", Pod:"calico-apiserver-67c56776df-gs6gv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.66.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali4f046377295", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:48:59.681990 env[1199]: 2025-07-10 00:48:59.654 [INFO][3325] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4" Jul 10 00:48:59.681990 env[1199]: 2025-07-10 00:48:59.654 [INFO][3325] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4" iface="eth0" netns="" Jul 10 00:48:59.681990 env[1199]: 2025-07-10 00:48:59.654 [INFO][3325] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4" Jul 10 00:48:59.681990 env[1199]: 2025-07-10 00:48:59.654 [INFO][3325] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4" Jul 10 00:48:59.681990 env[1199]: 2025-07-10 00:48:59.671 [INFO][3334] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4" HandleID="k8s-pod-network.c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4" Workload="10.0.0.143-k8s-calico--apiserver--67c56776df--gs6gv-eth0" Jul 10 00:48:59.681990 env[1199]: 2025-07-10 00:48:59.671 [INFO][3334] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:48:59.681990 env[1199]: 2025-07-10 00:48:59.671 [INFO][3334] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:48:59.681990 env[1199]: 2025-07-10 00:48:59.677 [WARNING][3334] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4" HandleID="k8s-pod-network.c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4" Workload="10.0.0.143-k8s-calico--apiserver--67c56776df--gs6gv-eth0" Jul 10 00:48:59.681990 env[1199]: 2025-07-10 00:48:59.677 [INFO][3334] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4" HandleID="k8s-pod-network.c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4" Workload="10.0.0.143-k8s-calico--apiserver--67c56776df--gs6gv-eth0" Jul 10 00:48:59.681990 env[1199]: 2025-07-10 00:48:59.678 [INFO][3334] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:48:59.681990 env[1199]: 2025-07-10 00:48:59.680 [INFO][3325] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4" Jul 10 00:48:59.682477 env[1199]: time="2025-07-10T00:48:59.682007893Z" level=info msg="TearDown network for sandbox \"c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4\" successfully" Jul 10 00:48:59.685487 env[1199]: time="2025-07-10T00:48:59.685452647Z" level=info msg="RemovePodSandbox \"c09a698dc964a3638170ecdbd8520d48e6d09d0f1c205334abb78424f492abd4\" returns successfully" Jul 10 00:48:59.686175 env[1199]: time="2025-07-10T00:48:59.686136460Z" level=info msg="StopPodSandbox for \"396246d785b8a0333ac9f7e4b6c96716c4db627750267225f3ef407423dd4382\"" Jul 10 00:48:59.742422 env[1199]: 2025-07-10 00:48:59.714 [WARNING][3352] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="396246d785b8a0333ac9f7e4b6c96716c4db627750267225f3ef407423dd4382" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.143-k8s-csi--node--driver--6ghr7-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"36da2ccb-1a46-4dff-99a7-99fa203d27fa", ResourceVersion:"1413", Generation:0, CreationTimestamp:time.Date(2025, time.July, 10, 0, 48, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"57bd658777", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.143", ContainerID:"c0121c841a7774af0f2e592e762745eb8d039b6169dca3dba92d3c1cb1bb1614", Pod:"csi-node-driver-6ghr7", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.66.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali9313fe8d25a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Jul 10 00:48:59.742422 env[1199]: 2025-07-10 00:48:59.714 [INFO][3352] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="396246d785b8a0333ac9f7e4b6c96716c4db627750267225f3ef407423dd4382" Jul 10 00:48:59.742422 env[1199]: 2025-07-10 00:48:59.714 [INFO][3352] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="396246d785b8a0333ac9f7e4b6c96716c4db627750267225f3ef407423dd4382" iface="eth0" netns="" Jul 10 00:48:59.742422 env[1199]: 2025-07-10 00:48:59.714 [INFO][3352] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="396246d785b8a0333ac9f7e4b6c96716c4db627750267225f3ef407423dd4382" Jul 10 00:48:59.742422 env[1199]: 2025-07-10 00:48:59.714 [INFO][3352] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="396246d785b8a0333ac9f7e4b6c96716c4db627750267225f3ef407423dd4382" Jul 10 00:48:59.742422 env[1199]: 2025-07-10 00:48:59.732 [INFO][3361] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="396246d785b8a0333ac9f7e4b6c96716c4db627750267225f3ef407423dd4382" HandleID="k8s-pod-network.396246d785b8a0333ac9f7e4b6c96716c4db627750267225f3ef407423dd4382" Workload="10.0.0.143-k8s-csi--node--driver--6ghr7-eth0" Jul 10 00:48:59.742422 env[1199]: 2025-07-10 00:48:59.732 [INFO][3361] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Jul 10 00:48:59.742422 env[1199]: 2025-07-10 00:48:59.732 [INFO][3361] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Jul 10 00:48:59.742422 env[1199]: 2025-07-10 00:48:59.738 [WARNING][3361] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="396246d785b8a0333ac9f7e4b6c96716c4db627750267225f3ef407423dd4382" HandleID="k8s-pod-network.396246d785b8a0333ac9f7e4b6c96716c4db627750267225f3ef407423dd4382" Workload="10.0.0.143-k8s-csi--node--driver--6ghr7-eth0" Jul 10 00:48:59.742422 env[1199]: 2025-07-10 00:48:59.738 [INFO][3361] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="396246d785b8a0333ac9f7e4b6c96716c4db627750267225f3ef407423dd4382" HandleID="k8s-pod-network.396246d785b8a0333ac9f7e4b6c96716c4db627750267225f3ef407423dd4382" Workload="10.0.0.143-k8s-csi--node--driver--6ghr7-eth0" Jul 10 00:48:59.742422 env[1199]: 2025-07-10 00:48:59.739 [INFO][3361] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Jul 10 00:48:59.742422 env[1199]: 2025-07-10 00:48:59.740 [INFO][3352] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="396246d785b8a0333ac9f7e4b6c96716c4db627750267225f3ef407423dd4382" Jul 10 00:48:59.742808 env[1199]: time="2025-07-10T00:48:59.742465868Z" level=info msg="TearDown network for sandbox \"396246d785b8a0333ac9f7e4b6c96716c4db627750267225f3ef407423dd4382\" successfully" Jul 10 00:48:59.742808 env[1199]: time="2025-07-10T00:48:59.742501712Z" level=info msg="StopPodSandbox for \"396246d785b8a0333ac9f7e4b6c96716c4db627750267225f3ef407423dd4382\" returns successfully" Jul 10 00:48:59.743054 env[1199]: time="2025-07-10T00:48:59.743028981Z" level=info msg="RemovePodSandbox for \"396246d785b8a0333ac9f7e4b6c96716c4db627750267225f3ef407423dd4382\"" Jul 10 00:48:59.743103 env[1199]: time="2025-07-10T00:48:59.743058392Z" level=info msg="Forcibly stopping sandbox \"396246d785b8a0333ac9f7e4b6c96716c4db627750267225f3ef407423dd4382\""